ISO27701 EU Jul 20 v2
ISO27701 EU Jul 20 v2
ISO 27701
Privacy information
management systems
Beyond these local initiatives, there is also ISO 29151, a code of practice for
protecting personally identifiable information (PII). This standard sets out control
objectives, controls and guidelines to protect PII in accordance with an impact and
risk assessment. This is an effective set of guidance, but it does not offer an
externally auditable framework that can offer assurance to third parties. ISO 27701
goes beyond this, setting out management system and control requirements.
While ISO 27701 does not yet have a certification scheme, this is really only a
matter of time. Furthermore, there are interim options for asserting compliance, as
we discuss later in this paper.
IT GOVERNANCE GREEN PAPER | JULY 2020 3
What about ISO 27001? scalable and flexible it is, and how the most common block is the implementer’s
mindset rather than the requirements of the Standard. The risk assessment process
Even though a ‘comprehensive’ information security management system (ISMS) in particular ensures that security controls are chosen on the basis of need and
aligned to ISO/IEC 27001:2013 might already address privacy issues, the requirements suitability, helping the organisation build a cost-effective and practical ISMS.
can be met without fully addressing privacy. This means that certificates of conformity
with ISO 27001 are issued without a guarantee that data protection needs have been Second, a BS 10012 personal information management system’s primary concern is
adequately met. While data protection naturally requires a degree of information data protection. As such, it is not an ideal framework for developing effective
security (the GDPR addresses these as “technical and organisational measures”), it information security measures. It is also of little use if you want to extend your
goes much further than simply protecting the information – the organisation must information security to all of your organisation’s information, not just personal data.
also protect the rights of the data subjects, which cannot be guaranteed through
information security alone.
The ISO 27701 approach
Having a standard that ensures all the relevant privacy issues are factored into a
management system means that the resulting certificate must, by default, cover all A privacy management system is different from an ISMS, but they are closely related.
of those relevant aspects. This also means that a certificate of conformity (when a ISO 27701’s approach recognises that information security (the preservation of the
scheme to provide this is available) gives external stakeholders greater confidence confidentiality, integrity and availability of information) is a key aspect of effective
in your privacy management. privacy management, and that the ISMS requirements documented in ISO 27001 can
support adding sector-specific requirements onto the ISMS without the need for a
new management system specification.
What does this mean for BS 10012?
BS 10012 is still an effective management system standard, especially for ISO 27701 defines the extra requirements for an ISMS to cover privacy and the
organisations in the UK, as it takes into account not only the GDPR but also the UK’s processing of PII. These are supported by additional controls that relate specifically
Data Protection Act and guidance from the Information Commissioner’s Office. This to data protection and privacy. As a new whole, this creates what the Standard calls
may have limited value for external stakeholders, however, especially those outside a privacy information management system (PIMS).
the UK.
Despite this, there is a line of thinking that any organisation that requires privacy ISO 27701
ISO 27001 requirements
assurance will opt for a BS 10012-type solution on the basis that a full ISO 27001 ISMS amendments
is overkill. At IT Governance, we do not subscribe to this view for two key reasons.
ISO 27701 control
ISO 27001 controls
amendments
First, we do not see an ISO 27001-conforming ISMS as burdensome. Through our
many successful engagements to implement ISO 27001, we have demonstrated how
ISO 27701 controls
As already described, the new standard bolts privacy processing requirements Personally identifiable information (PII): ‘personal data’ in the GDPR. ISO
onto an ISMS. Part of this requires that anywhere ISO 27001 says “information 29100 defines this as “information that (a) can be used to identify the PII
security” you instead read “information security and privacy” in all instances. For principal to whom such information relates, or (b) is or might be directly or
example, where ISO 27001 uses “information security performance”, ISO 27701 indirectly linked to a PII principal” (Clause 2.9).
requires you to read it as “information security and privacy performance”.
PII principal: ‘data subject’ in the GDPR. ISO 29100 defines this as a “natural
The Standard then goes on to add privacy-specific requirements to some of the person to whom the personally identifiable information (PII) relates”
clauses in ISO 27001 and the controls in Annex A, and adds some privacy-specific (Clause 2.11).
controls over and above the existing information security (and now privacy)
controls. Finally, it offers guidance that builds on that available in ISO 27002 PII controller: ‘data controller’ in the GDPR. ISO 29100 defines this as the
subject to whether the organisation in question is a data controller and/or data “privacy stakeholder (or privacy stakeholders) that determines the
processor. purposes and means for processing personally identifiable information (PII)
other than natural persons who use data for personal purposes” (Clause
ISO 27701 also builds on the principle of information security by directing the 2.10).
reader to the more expansive privacy principles in ISO/IEC 29100. These cover
a wider range of privacy concerns, including those espoused in data protection PII processor: ‘data processor’ in the GDPR. ISO 29100 defines this as the
regulations internationally. “privacy stakeholder that processes personally identifiable information (PII)
on behalf of and in accordance with the instructions of a PII controller”
(Clause 2.12).
IT GOVERNANCE GREEN PAPER | JULY 2020 5
Another notable addition affects the risk assessment, which will need to take into
account the organisation’s role in relation to PII – that is, whether it is a controller
or a processor, and how that might affect the risks to the PII. Another entry
recognises the existence of the new control sets and allows the organisation to
reconcile its controls against a wider range of controls, including those from ISO
27701.
Controls with a potentially significant impact on privacy and data protection are
given extensive extra guidance. This includes subjects such as removable media,
cryptography and secure development.
IT GOVERNANCE GREEN PAPER | JULY 2020 6
Accredited certification There is a good chance that some ISO 17065-accredited GDPR schemes will include
ISO 27701 certification, but overall they will be more robust and hence more
Article 42 of the GDPR addresses certification schemes, stating that member states, expensive. Those organisations that want to demonstrate a degree of assurance
supervisory authorities, the EDPB and the European Commission should encourage without the expense of an ISO 17065-accredited scheme – even when they become
schemes that demonstrate compliance with the Regulation. available – might opt for ISO 27701 certification as an economical compromise.
ISO 27701 certification will not meet the GDPR’s requirements for a certification Whether accredited certification to ISO 27701 alone will suffice for many
scheme. Article 43 of the GDPR requires that any certification scheme be operated organisations and their interested parties will likely be decided by the market and
under an ISO 17065-accredited scheme. ISO 27701, however, will fall under ISO regulators. Given the broad acceptance of ISO 27001 as a model for information
17021-1 and therefore not meet the GDPR’s requirements. security, it is likely that many markets will accept ISO 27701 certification as adequate
proof that the organisation has taken appropriate steps to meet its data protection
obligations.
Either way, the options for ISO 17021-1-accredited certification to ISO 27701 will
need to evolve, with national accreditation bodies accrediting certification bodies
locally while an international standard that specifies accreditation requirements is
being developed. In the meantime, ISO 27701 can be referenced as a source of
controls in a Statement of Applicability (SoA) and cited as such in an accredited
certificate for ISO 27001 conformance.
IT Governance offers a unique range of ISO 27701 products and services, including standards, books and training courses.
ISO/IEC 27701:2019 – An introduction to privacy Certified ISO 27701 PIMS Lead Auditor Training
information management Course
This book is the ideal guide for anyone This fully accredited, practitioner-led course will
considering a PIMS and wanting to understand teach you how to extend an ISO 27001 audit
how it can benefit their organisation. Get a clear programme and conduct PIMS audits against
and concise overview of the principles of personal ISO/IEC 27701, in line with international data
information management and ISO 27701. protection regimes such as the GDPR.
Conducting a Data Flow Mapping Exercise Under the GDPR A Concise Guide to Data Protection Impact Assessments (DPIAs)
IT GOVERNANCE GREEN PAPER | JULY 2020 9
IT Governance solutions
IT Governance is your one-stop shop for cyber security and IT governance, risk Training
management and compliance (GRC) information, books, tools, training and
We offer training courses from staff awareness and foundation courses, through to
consultancy.
advanced programmes for IT practitioners and certified lead implementers and
auditors.
Our products and services are designed to work harmoniously together so you can
benefit from them individually or use different elements to build something bigger
Our training team organises and runs in-house and public training courses all year
and better.
round, as well as Live Online and self-paced online training courses, covering a
growing number of IT GRC topics.
Books
Visit www.itgovernance.eu/en-ie/training-ie for more information.
We sell sought-after publications covering all areas of corporate and IT governance.
Our publishing team also manages a growing collection of titles that provide practical Consultancy
advice for staff taking part in IT governance projects, suitable for all levels of
knowledge, responsibility and experience. We are an acknowledged world leader in our field. Our experienced consultants, with
multi-sector and multi-standard knowledge and experience, can help you accelerate
Visit www.itgovernance.eu/en-ie/shop/category/it-governance-eu-books to view our your IT GRC projects.
full catalogue.
Visit www.itgovernance.eu/en-ie/consulting-ie for more information.
Toolkits Software
Our unique documentation toolkits are designed to help organisations adapt quickly Our industry-leading software tools, developed with your needs and requirements in
and adopt best practice using customisable template policies, procedures, forms and mind, make information security risk and compliance management straightforward
records. and affordable for all, enabling organisations worldwide to be ISO 27001-compliant.
Visit www.itgovernance.eu/en-ie/documentation-toolkits-ie to view our toolkits. Visit www.itgovernance.eu/en-ie/shop/category/software for more information.
IT Governance is the one-stop shop for cyber security, cyber risk
and privacy management solutions. Contact us if you require
consultancy, books, toolkits, training or software.
@ITGovernanceEU
/it-governance-europe-ltd
@ITGovernanceEU