A comprehensive WordPress plugin for managing privacy assessments and data collection documentation.
PiperPrivacy is a product of Varry LLC, specializing in privacy compliance and automation solutions for organizations handling sensitive data. Our Privacy Management Suite streamlines the process of creating, managing, and maintaining privacy documentation, including Privacy Impact Assessments (PIAs), Data Protection Impact Assessments (DPIAs), and privacy threshold analyses.
- Company: Varry LLC DBA PiperPrivacy
- Leadership: Trevor Lowing, Chief Information Officer
- Focus: Privacy Compliance Automation
- Target Market: Organizations with complex privacy compliance needs
- Specialization: Privacy Assessment Automation and Documentation
- Compliance Frameworks: GDPR, CCPA, HIPAA, Privacy Act, and other privacy regulations
- Comprehensive Workflow: End-to-end privacy assessment and documentation management
- Regulatory Alignment: Built-in templates and workflows aligned with major privacy regulations
- Integration Ready: Works seamlessly with existing WordPress infrastructure
- Accessibility Focus: WCAG 2.1 compliant interface for universal access
- Enterprise Support: Dedicated support for enterprise customers
PiperPrivacy implements a structured workflow for managing privacy compliance. The system follows a comprehensive privacy lifecycle:
graph TD
%% Initial Request and Screening
A[New Privacy Request] --> AA[Initial Screening]
AA --> B[Privacy Threshold Assessment]
%% Risk Assessment
B --> C{Risk Level Assessment}
C -->|Low Risk| D[Document Decision]
C -->|Medium Risk| E[Standard PIA]
C -->|High Risk| F[Full PIA + DCD]
%% Low Risk Path
D --> D1[Record Keeping]
D1 --> D2[Annual Review]
%% Medium Risk Path
E --> E1[Data Mapping]
E1 --> E2[Control Assessment]
E2 --> E3[Implementation Plan]
%% High Risk Path
F --> F1[Detailed Data Flow]
F1 --> F2[Risk Analysis]
F2 --> F3[Control Design]
F3 --> F4[DPO Review]
%% Implementation
E3 & F4 --> G[Implementation]
G --> H[Monitoring & Review]
%% Review Cycle
H --> I{Changes Needed?}
I -->|Yes| J[Change Assessment]
J --> B
I -->|No| K[Periodic Review]
K --> H
%% Breach Handling
H --> L{Incident Detected?}
L -->|Yes| M[Breach Assessment]
M --> N[Notification Required?]
N -->|Yes| O[72hr Notification]
N -->|No| P[Document Decision]
O & P --> H
%% Roles and Responsibilities
subgraph Roles
R1[Project Owner]
R2[Privacy Officer]
R3[Data Protection Officer]
R4[System Owner]
end
%% Data Flows
subgraph Data Elements
DE1[Personal Data]
DE2[Special Categories]
DE3[Transfer Mechanisms]
end
%% Data Flow Mapping Process
subgraph "Data Flow Mapping"
DF1[Identify Data Sources]
DF2[Document Collection Points]
DF3[Map Data Transfers]
DF4[Define Retention]
DF1 --> DF2
DF2 --> DF3
DF3 --> DF4
subgraph "Collection Points"
CP1[Web Forms]
CP2[APIs]
CP3[Manual Entry]
CP4[Third Party]
end
subgraph "Storage Locations"
ST1[Local Database]
ST2[Cloud Storage]
ST3[Third Party]
ST4[Backups]
end
subgraph "Transfer Types"
TT1[Internal]
TT2[External EU]
TT3[External non-EU]
TT4[Cloud Services]
end
end
%% Control Implementation Process
subgraph "Control Implementation"
CI1[Technical Controls]
CI2[Organizational Controls]
CI3[Legal Controls]
CI4[Physical Controls]
CI1 --> CI2
CI2 --> CI3
CI3 --> CI4
subgraph "Technical Measures"
TM1[Encryption]
TM2[Access Control]
TM3[Monitoring]
TM4[Backup]
end
subgraph "Documentation"
DOC1[Policies]
DOC2[Procedures]
DOC3[Guidelines]
DOC4[Records]
end
subgraph "Validation"
VAL1[Testing]
VAL2[Audit]
VAL3[Review]
VAL4[Update]
end
end
%% Breach Management Process
subgraph "Breach Management"
BM1[Detection]
BM2[Assessment]
BM3[Containment]
BM4[Investigation]
BM5[Notification]
BM6[Recovery]
BM1 --> BM2
BM2 --> BM3
BM3 --> BM4
BM4 --> BM5
BM5 --> BM6
subgraph "Risk Assessment"
BR1[Data Involved]
BR2[Affected Parties]
BR3[Impact Level]
BR4[Likelihood]
end
subgraph "Notification Process"
NP1[Internal Teams]
NP2[DPA]
NP3[Data Subjects]
NP4[Third Parties]
end
end
%% Review Process
subgraph "Periodic Review"
PR1[Schedule Review]
PR2[Gather Evidence]
PR3[Assess Changes]
PR4[Update Documents]
PR5[Sign Off]
PR1 --> PR2
PR2 --> PR3
PR3 --> PR4
PR4 --> PR5
subgraph "Review Areas"
RA1[Processing Activities]
RA2[Security Measures]
RA3[Documentation]
RA4[Training]
end
end
%% Connect subgraphs to main flow
F1 --> DF1
E1 --> DF1
DF4 --> CI1
CI4 --> G
L -->|Yes| BM1
K --> PR1
%% Styling
classDef request fill:#f9f,stroke:#333,stroke-width:2px
classDef assessment fill:#bbf,stroke:#333,stroke-width:2px
classDef implementation fill:#bfb,stroke:#333,stroke-width:2px
classDef monitoring fill:#fbf,stroke:#333,stroke-width:2px
classDef incident fill:#fbb,stroke:#333,stroke-width:2px
classDef role fill:#ffe,stroke:#333,stroke-width:1px
classDef data fill:#eff,stroke:#333,stroke-width:1px
class A,AA request
class B,C,E,F assessment
class G implementation
class H,K monitoring
class L,M,N,O incident
class R1,R2,R3,R4 role
class DE1,DE2,DE3 data
%% Additional styling for subgraphs
classDef subProcess fill:#e9e9e9,stroke:#666,stroke-width:2px
classDef measureNode fill:#d1e7dd,stroke:#333
classDef processNode fill:#d9e2ef,stroke:#333
class DF1,DF2,DF3,DF4 processNode
class CI1,CI2,CI3,CI4 processNode
class BM1,BM2,BM3,BM4,BM5,BM6 processNode
class PR1,PR2,PR3,PR4,PR5 processNode
class TM1,TM2,TM3,TM4 measureNode
class CP1,CP2,CP3,CP4 measureNode
class ST1,ST2,ST3,ST4 measureNode
class TT1,TT2,TT3,TT4 measureNode
-
Project Owner
- Initiates privacy requests
- Provides project details
- Implements controls
- Maintains documentation
-
Privacy Officer
- Reviews assessments
- Validates risk levels
- Approves controls
- Monitors compliance
-
Data Protection Officer
- Reviews high-risk processing
- Provides expert guidance
- Handles breach notifications
- Ensures regulatory compliance
-
System Owner
- Implements technical controls
- Maintains system documentation
- Monitors system changes
- Reports security incidents
-
Personal Data Categories
- Basic personal information
- Contact details
- Online identifiers
- Location data
-
Special Categories
- Health data
- Biometric data
- Genetic data
- Criminal records
-
Transfer Mechanisms
- Standard contractual clauses
- Binding corporate rules
- Adequacy decisions
- Specific derogations
- Track data collection points
- Manage data retention policies
- Monitor data processing activities
- Automate data deletion workflows
- Conduct Data Protection Impact Assessments (DPIA)
- Risk assessment tools
- Mitigation tracking
- Compliance documentation
- User consent tracking
- Preference management
- Consent records maintenance
- Automated compliance reporting
- Incident response management
- Automated notifications
- Documentation tools
- Authority contact management
- Compliance monitoring
- Documentation management
- Audit logging
- Reporting tools
- WordPress 5.0 or higher
- PHP 8.0 or higher
- Classic Editor plugin
- Meta Box Pro plugin
- Download the latest release from the releases page
- Upload to your WordPress site via the plugin uploader or FTP
- Activate the plugin through the WordPress admin panel
- Install and activate required plugins:
- Classic Editor (set to "Classic Editor" mode)
- Meta Box Pro
For detailed installation instructions, see SETUP.md.
Our documentation is organized into several key areas:
- Setup Guide - Complete installation and configuration
- Contributing Guide - Guidelines for contributors
- Coding Conventions - Code style and standards
- Technical Architecture - System design and components
- API Documentation - REST API endpoints and usage
- Development Notes - Important development information
- Project Status - Current development status and roadmap
- Privacy Collection Requirements - Detailed requirements for privacy data collection
For additional documentation, please visit our documentation portal.
- Local WordPress development environment
- Composer for PHP dependency management
- Xdebug for debugging (optional)
- Clone the repository:
git clone https://github.com/TrevorLowing/PiperPrivacy.git- Install dependencies:
composer installFor development tools including accessibility testing, please see the Piper Privacy Development Tools repository.
For support inquiries, please contact:
- Email: [email protected]
- Website: https://piperprivacy.com/support
For security issues, please email [email protected]
This project is licensed under the GPL v2 License - see the LICENSE file for details.
π Related Documentation
- Technical Implementation: Data Flow Architecture
- API Integration: API Documentation
- Development Guide: Development Notes
- Requirements: Privacy Collection Requirements
The data flow mapping process ensures comprehensive documentation of all personal data processing activities:
-
Identify Data Sources
- Survey all business processes
- Document input channels
- Map data categories
- Identify data controllers/processors
-
Document Collection Points
-
Web Forms
- Contact forms
- Registration pages
- Newsletter signups
- Customer surveys
-
APIs
- Third-party integrations
- Service connections
- Data exchange endpoints
- Webhook configurations
-
Manual Entry
- Customer service inputs
- Internal forms
- Offline collection
- Legacy data migration
-
Third Party
- Vendor integrations
- Partner data sharing
- Public databases
- Purchased datasets
-
-
Storage Locations
-
Local Database
- Primary data storage
- Temporary caches
- Audit logs
- Configuration data
-
Cloud Storage
- Distributed systems
- Backup storage
- Archive systems
- CDN caches
-
Third Party
- SaaS providers
- Analytics platforms
- CRM systems
- Payment processors
-
-
Transfer Types
-
Internal
- Inter-department sharing
- Cross-system transfers
- Process automation
- Reporting systems
-
External EU
- EU vendor transfers
- Partner sharing
- Customer data access
- Regulatory reporting
-
External non-EU
- International transfers
- SCCs implementation
- Adequacy mechanisms
- Transfer impact assessments
-
π Related Documentation
- Security Controls: Technical Architecture
- Implementation Guide: Development Notes
- Coding Standards: Coding Conventions
- Setup Guide: SETUP.md
Systematic approach to implementing privacy and security controls:
-
Technical Controls
-
Encryption
- Data at rest
- Data in transit
- Key management
- Encryption standards
-
Access Control
- Authentication methods
- Authorization levels
- Session management
- Audit logging
-
Monitoring
- Activity logging
- Intrusion detection
- Performance metrics
- Compliance checking
-
Backup
- Backup scheduling
- Retention policies
- Recovery testing
- Secure storage
-
-
Documentation Requirements
-
Policies
- Privacy policies
- Security policies
- Data retention
- Acceptable use
-
Procedures
- Operating procedures
- Incident response
- Change management
- Access requests
-
Guidelines
- Best practices
- Security standards
- Implementation guides
- Training materials
-
π Related Documentation
- Incident Response: Technical Architecture
- API Endpoints: API Documentation
- Development Guide: Development Notes
- Requirements: Privacy Collection Requirements
Comprehensive incident response and breach management workflow:
-
Detection & Assessment
- Incident identification
- Initial classification
- Severity assessment
- Impact evaluation
-
Risk Assessment Components
-
Data Involved
- Data categories
- Volume affected
- Sensitivity level
- Format/accessibility
-
Affected Parties
- Data subjects
- Controllers/processors
- Third parties
- Regulatory bodies
-
-
Notification Process
-
Internal Teams
- Management notification
- Legal consultation
- Technical response
- PR/Communications
-
External Notifications
- DPA (72-hour requirement)
- Data subjects
- Law enforcement
- Insurance providers
-
-
Recovery & Documentation
- Incident containment
- System restoration
- Root cause analysis
- Preventive measures
π Related Documentation
- Review Framework: Technical Architecture
- API Integration: API Documentation
- Project Status: Project Status
- Development Guide: Development Notes
Structured approach to maintaining privacy compliance:
-
Review Planning
- Schedule determination
- Scope definition
- Resource allocation
- Stakeholder engagement
-
Review Areas
-
Processing Activities
- Process changes
- New data flows
- Third-party updates
- Legal basis review
-
Security Measures
- Control effectiveness
- Incident review
- Risk assessment
- Technical updates
-
Documentation
- Policy updates
- Procedure reviews
- Record accuracy
- Version control
-
Training
- Training needs
- Awareness programs
- Compliance updates
- Knowledge assessment
-
-
Evidence Collection
- Processing records
- Audit logs
- Training records
- Incident reports
- Change documentation
-
Update Implementation
- Document revisions
- Process updates
- Control enhancements
- Training refreshes
π For detailed implementation examples and code snippets, refer to:
π For information on integrating these processes into your workflow:
β οΈ For troubleshooting common issues in each process:
- Troubleshooting Guide
- Technical Issues: Development Notes
- API Problems: API Documentation
