Oklahoma City Privacy Impact Assessment Guide
Oklahoma City, Oklahoma requires city departments and vendors to evaluate privacy risks before deploying technology that collects or processes personal data. This guide explains how Privacy Impact Assessments (PIAs) fit into local governance, who is responsible, what to document, and practical steps for city projects that handle personal information. It is oriented to procurement officers, project managers, legal counsel, and privacy champions working with city systems and vendors.
When to do a PIA
Perform a PIA for new technologies or material changes to systems that collect, store, analyze, or share personal data, including cloud services, surveillance systems, mobility platforms, and public-facing portals. Consider PIAs during project planning, procurement, and vendor onboarding to inform contracts and technical controls.
Who is responsible
The primary responsibility typically lies with the City of Oklahoma City Information Technology Department together with the project owner and the City Attorney for legal review. Departments must coordinate with IT to assess technical controls and with contracting staff for vendor obligations.[1]
Core PIA elements
- Project name, scope, and purpose.
- Data types collected and lawful basis for processing.
- Data flows, storage locations, retention schedules, and third-party access.
- Risk assessment and proposed mitigations.
- Accountability: roles, data steward, and contact for privacy inquiries.
Penalties & Enforcement
Specific civil fines or criminal penalties for failure to conduct a PIA or for mishandling personal data are not generally detailed on the city PIA guidance pages; any monetary penalties or enforcement measures will depend on the applicable ordinance, contract terms, and state law. Where the municipal code or contract sets penalties, reference those provisions directly.[2]
Common enforcement mechanisms and processes typically include administrative orders, corrective action plans, contract remedies (including withholding payment or termination), and referral to law enforcement or the City Attorney for civil action. Appeal or review routes often follow administrative procedures managed by the enforcing department; time limits for appeals are set out in the controlling instrument when published or in the municipal code.
- Fine amounts: not specified on the cited page.
- Escalation: first/repeat/continuing offences - not specified on the cited page.
- Non-monetary sanctions: orders to remediate, contract termination, injunctions, and referral for prosecution where applicable.
- Enforcer: City Information Technology Department and City Attorney; complaints can be routed through official department contact pages.[1]
Applications & Forms
There is no single, published universal PIA form on the municipal code pages; departments may use internal templates or procurement forms maintained by IT or contracting services. For specifics, request the department PIA template or procurement checklist from the Information Technology Department or City Clerk.[1]
Implementing PIAs - Practical steps
- Integrate PIA in project kickoff and procurement timelines.
- Require vendors to submit data handling descriptions and security evidence.
- Design technical mitigations: encryption, access controls, and logging.
- Record residual risks and management approval before go-live.
Common violations
- Deploying sensors or cameras without documented privacy review.
- Vendor access to identifiable data without contractual limits.
- Retaining personal data beyond approved retention schedules.
FAQ
- Who must complete a PIA?
- Project owners and departments implementing technology that processes personal data must complete a PIA in coordination with IT and legal when required by city policy or contract.
- How long does a PIA take?
- Duration varies by project complexity; simple PIAs can take days, complex programs may require weeks with stakeholder review.
- Where do I submit the completed PIA?
- Submit to the City Information Technology Department and include it in procurement records; if unsure, contact IT for the submission process.[1]
How-To
- Identify the project scope and list all personal data elements the system will handle.
- Map data flows, third-party access, and storage locations.
- Assess risks and document proposed technical and administrative mitigations.
- Obtain sign-off from the department head, IT security, and City Attorney as required.
- Include PIA terms in vendor contracts and track mitigation implementation.
Key Takeaways
- PIAs reduce privacy risk and inform procurement decisions.
- Coordinate PIA work with IT, legal, and contracting early.
Help and Support / Resources
- City Information Technology Department
- Oklahoma City Code of Ordinances (Municode)
- City privacy and website policy
- City Clerk - records and public filings