PT-5(1): Just-in-time Notice
PT-5(1) requires you to present a privacy notice right where a person is about to provide personally identifiable information (PII) or when a system action will process their PII, so they understand the processing at the moment it matters. Operationalize it by inventorying PII collection points, defining standard just-in-time notice language, implementing delivery in each channel, and retaining evidence.
Key takeaways:
- Put the notice at the point of collection or the point of the PII-related action, not buried in a general privacy policy. 1
- Treat “channel coverage” as the control: web forms, mobile flows, APIs, call centers, paper intake, and internal apps that collect PII. 1
- Evidence is make-or-break: screenshots, UI copy, release tickets, and change control records tied to each collection point.
The pt-5(1): just-in-time notice requirement is a practical control with a simple assessment question behind it: “When an individual provides PII (or a system is about to take a PII-related action), do they get a clear notice right then and there?” NIST frames this as presenting notice “at a time and location where the individual provides [PII] or in conjunction with a data action.” 1
For a Compliance Officer, CCO, or GRC lead, the fastest path to operationalizing PT-5(1) is to stop treating notice as a single document and start treating it as a distributed control implemented across experiences. Your privacy policy can still exist, but PT-5(1) is about contextual notice at the moment of collection or action. This page gives you requirement-level implementation guidance you can assign to product, engineering, and operations teams, and then assess with defensible artifacts.
This guidance applies most directly to federal information systems and contractor systems handling federal data where NIST SP 800-53 Rev. 5 is the governing control set. 2
What PT-5(1) requires (plain-English interpretation)
PT-5(1) means: whenever a person is about to enter PII, upload it, speak it to an agent, or otherwise provide it, you present a notice at that point in the workflow. The same applies when you trigger a “data action” involving their PII (for example, a workflow that shares, verifies, enriches, or otherwise processes PII in a way the person should understand at the time). The notice must be placed where the person will see it in context, not only in a generic policy page. 1
Operator translation: implement just-in-time privacy notices as UI/UX and process controls across each intake channel and each meaningful PII-processing action.
Regulatory text
“Present notice of personally identifiable information processing to individuals at a time and location where the individual provides personally identifiable information or in conjunction with a data action, or {{ insert: param, pt-05.01_odp }}.” 1
What you must do with this text:
- Identify where individuals provide PII (time + location in the user journey).
- Identify “data actions” that process PII and are triggered by an individual action (or occur in a context where notice is expected).
- Present a notice in those exact moments/locations, using the channel’s native mechanism (inline text, modal, IVR script, email preface, paper disclosure, etc.).
- Make the notices consistent with actual processing practices, and keep them current through change control.
Who it applies to (entities and operational context)
Entities:
- Federal information systems implementing NIST SP 800-53 Rev. 5 controls. 2
- Contractor systems handling federal data where NIST 800-53 is flowed down via contract, ATO boundary, or program security requirements. 2
Operational contexts where teams miss PT-5(1):
- Authentication and onboarding flows that collect government identifiers or contact data.
- Support channels (call center, chat, ticketing) where agents request PII to validate identity.
- Third-party integrations that collect PII via embedded widgets or redirects.
- Internal admin consoles where staff enter PII about members, beneficiaries, or customers.
- Batch uploads (CSV) and document intake (scanned forms) that contain PII.
What you actually need to do (step-by-step)
Step 1: Build an “PII collection + data action map” (your control inventory)
Create a table that becomes the system of record for PT-5(1). Minimum columns:
- Channel (web, mobile, API, phone, paper, in-person, internal tool)
- Entry point (screen/form name, endpoint name, script name)
- PII elements collected (types, not values)
- Purpose of processing (why you collect it)
- “Data actions” invoked (verification, sharing, enrichment, storage location)
- Notice mechanism (inline text, checkbox text, modal, verbal script, cover sheet)
- Owner (product/engineering/ops)
- Evidence link (screenshot, script, PDF, ticket)
This table is the fastest way to show an assessor you know where notice is required and how you meet it.
Step 2: Define standard notice components your teams can reuse
Write short, channel-appropriate notice text blocks that teams can insert without legal gymnastics each time. Keep it operational and consistent:
- What PII is being collected (category-level)
- Why it is collected (purpose)
- How it will be used in this step (the “data action” context when applicable)
- Where to find more detail (link to full privacy notice or program notice)
Avoid generic “we care about privacy” language. Assessors look for whether the individual was informed about the processing at the moment of collection/action. 1
Step 3: Implement notices at each collection point and action point
Treat each channel separately:
Web and mobile
- Place the notice directly above/beside the PII fields or submission button.
- If the “data action” occurs on click (for example, “Verify identity”), present a short notice in the same view or in a confirmation modal.
APIs and developer-facing intake
- If an end user provides PII through a client app you control, implement the notice in the client UI.
- If you provide an API to third parties, require downstream notice via contract terms and integration requirements, then test for it during onboarding reviews.
Call center / helpdesk
- Add a just-in-time script: before collecting PII, the agent states a short notice (what is collected and why).
- Update QA scorecards to verify agents deliver the script consistently.
Paper and scanned forms
- Put the notice immediately before signature lines or at the point where PII is entered, not only on a separate “terms” page.
Internal tools
- When staff enter PII about individuals, display a banner or tooltip explaining the processing purpose and any sharing actions that occur after submission.
Step 4: Tie PT-5(1) to change management (so notices stay accurate)
Most PT-5(1) failures are “drift” failures: the product changed, the notice didn’t.
- Add a privacy notice check to SDLC gates for any feature that adds new PII fields or introduces a new PII-related “data action.”
- Require privacy/compliance sign-off in the same ticketing workflow that approves the feature.
- Track the notice copy as versioned text in source control or a controlled CMS, with approvals.
Step 5: Assign ownership and recurring evidence
Make PT-5(1) a named control with:
- Control owner (often Privacy, GRC, or Product Compliance)
- Implementers (Product, Engineering, Support Ops)
- Testers (GRC/IA, internal audit, or privacy assurance)
Daydream (and similar GRC workflows) fits naturally here by mapping PT-5(1) to an owner, an implementation procedure, and recurring evidence artifacts so you can produce proof quickly during an assessment. 1
Required evidence and artifacts to retain
Retain artifacts that prove “time and location” placement, and that they match actual processing:
- Screenshots or screen recordings of each notice at the PII field/action point (dated, with build/version).
- UI copy source (strings file, CMS entry) and approval record.
- Call center scripts and QA checklist results showing script delivery.
- Paper/PDF forms with notice placement highlighted and version-controlled.
- Change requests/PRs demonstrating notice updates when PII collection/actions change.
- Your “PII collection + data action map” table with owners and evidence links.
- Training/KB entries for support staff on when to read the notice.
Common exam/audit questions and hangups
Assessors tend to focus on these:
- “Show me where the notice appears in the workflow, not your privacy policy.”
- “Does the notice appear before the person submits the form or triggers the action?”
- “How do you know you covered every intake channel?”
- “What happens when engineering adds a new PII field?”
- “Is the notice consistent with what the system actually does with the PII?”
Hangup to expect: teams will claim the privacy policy “covers it.” PT-5(1) is explicitly about contextual notice at collection/action. 1
Frequent implementation mistakes (and how to avoid them)
| Mistake | Why it fails PT-5(1) | Fix |
|---|---|---|
| Notice only in footer privacy policy | Wrong time/location | Put short copy at the field/action with a link to the full notice |
| One notice for everything | Misses “data action” context | Add action-specific notices for verification, sharing, or submission steps |
| No coverage for support channels | PII collected off-product | Add scripts, QA checks, and ticket templates |
| Notices not updated after feature changes | Drift creates inaccurate notice | Add SDLC gate + version control + approval workflow |
| Evidence is ad hoc | You can’t prove operation | Maintain a control binder: screenshots, scripts, and change tickets |
Enforcement context and risk implications
NIST SP 800-53 is a control framework, so “enforcement” usually shows up as assessment findings, ATO delays, contract noncompliance, or audit exceptions rather than civil penalties tied directly to PT-5(1). The operational risk is straightforward: absent or poorly placed notice increases the chance of privacy complaints, program oversight findings, and rework late in delivery when a system is preparing for an authorization or external review. 2
Practical 30/60/90-day execution plan
First 30 days (establish control and inventory)
- Assign PT-5(1) control owner and RACI for Product, Engineering, and Support Ops.
- Build the “PII collection + data action map” for your highest-traffic user journeys first.
- Draft standard notice components and get approval for reuse.
- Identify gaps where no notice exists at the point of collection/action.
By 60 days (implement and standardize)
- Ship just-in-time notices in web/mobile for top journeys.
- Implement call center scripts and QA verification steps.
- Add SDLC change gate language: any new PII field or PII-processing action requires a notice review.
- Centralize evidence storage and link artifacts back to the inventory.
By 90 days (prove operation and make it durable)
- Run a control self-test: sample collection points, confirm notice placement, confirm copy accuracy.
- Close remaining channel gaps (paper, internal tools, partner intake).
- Operationalize recurring evidence: release notes, quarterly spot checks, and updated screenshots tied to production versions.
- If you use Daydream, finalize the control record with mapped owners, procedures, and recurring evidence tasks so audit requests are a pull, not a scramble. 1
Frequently Asked Questions
Does a link to the privacy policy satisfy PT-5(1)?
Usually not by itself. PT-5(1) expects notice at the time and location the person provides PII or when a PII-related action occurs; a link can supplement, but you still need contextual notice text in the flow. 1
What counts as a “data action” for just-in-time notice?
Treat it as a user-triggered step that processes PII in a way a person should understand at that moment (for example, identity verification or submitting information to another system). Map these actions in your inventory and place the notice immediately before the action executes. 1
How do we handle just-in-time notice for call centers?
Use a short, mandatory script read before the agent collects PII, and verify delivery through QA scorecards and training. Retain the script version history and QA artifacts as evidence.
Do internal admin tools need PT-5(1) notices if staff collect PII about individuals?
If the tool is a point where individuals’ PII is provided (by staff acting as intake) or where a PII-processing action is triggered, treat it as in scope. Add an in-product notice banner or workflow text tied to the data entry step. 1
What evidence is most persuasive to an assessor?
Dated screenshots (or recordings) showing the notice next to the PII field or action button, plus change tickets that show notice review when PII processing changes. Pair this with your collection/action inventory so coverage is easy to validate.
How do we keep notices consistent across multiple products and teams?
Standardize notice components in a controlled library, require SDLC gate checks for PII changes, and assign a single control owner to approve exceptions. A GRC workflow that tracks owners, procedures, and recurring evidence helps prevent drift. 1
Footnotes
Frequently Asked Questions
Does a link to the privacy policy satisfy PT-5(1)?
Usually not by itself. PT-5(1) expects notice at the time and location the person provides PII or when a PII-related action occurs; a link can supplement, but you still need contextual notice text in the flow. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
What counts as a “data action” for just-in-time notice?
Treat it as a user-triggered step that processes PII in a way a person should understand at that moment (for example, identity verification or submitting information to another system). Map these actions in your inventory and place the notice immediately before the action executes. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
How do we handle just-in-time notice for call centers?
Use a short, mandatory script read before the agent collects PII, and verify delivery through QA scorecards and training. Retain the script version history and QA artifacts as evidence.
Do internal admin tools need PT-5(1) notices if staff collect PII about individuals?
If the tool is a point where individuals’ PII is provided (by staff acting as intake) or where a PII-processing action is triggered, treat it as in scope. Add an in-product notice banner or workflow text tied to the data entry step. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
What evidence is most persuasive to an assessor?
Dated screenshots (or recordings) showing the notice next to the PII field or action button, plus change tickets that show notice review when PII processing changes. Pair this with your collection/action inventory so coverage is easy to validate.
How do we keep notices consistent across multiple products and teams?
Standardize notice components in a controlled library, require SDLC gate checks for PII changes, and assign a single control owner to approve exceptions. A GRC workflow that tracks owners, procedures, and recurring evidence helps prevent drift. (Source: NIST SP 800-53 Rev. 5 OSCAL JSON)
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream