SlideShare a Scribd company logo
1 of 52
Copyright © 2019 BSI. All rights reserved. IPR02001ENGX v1.0 Sep 2019
ISO/IEC 27701:2019
Security techniques — Extension to ISO/IEC 27001
and ISO/IEC 27002 for Privacy Information
Management – Requirement and guidelines
Course aim
To provide a typical framework for extending your ISO/IEC
27001 information security management system (ISMS)
including the more specific requirements and guidance for
protecting your organization’s personally identifiable
information (PII), together constituting a privacy information
management system (PIMS)
2
Copyright © 2019 BSI. All rights reserved.
August 2019: Final Standard
published
Reminder: Background of ISO/IEC 27701
ISO/IEC 27701 development timeframe:
2018 2019
December 2018: Draft
International Standard (DIS)
made available and open for
public comment for 3 months
June 2019: Final Draft
International Standard (FDIS)
made available
3
Copyright © 2019 BSI. All rights reserved.
Benefits of implementing ISO/IEC 27701
Tailored to
PII
controllers
and
processors
Provides
assurance
and
confidence
Maps to
GDPR and
various
frameworks
Generates
documentary
evidence
Reduces
complexity
4
Copyright © 2019 BSI. All rights reserved.
Reminder: Key terms and alternative terms
5
Copyright © 2019 BSI. All rights reserved.
Terms as used in ISO/IEC 27701 Alternative term
Privacy information management
system (PIMS)
Personal information management
system (PIMS)
Personally identifiable information
(PII)
Personal data
PII principal Data subject
Privacy by design Data protection by design
Privacy by default Data protection by default
PII controller Controller
PII processor Processor
KEY Terms
Term Definition
Personally identifiable
information (PII)
any information that (a) can be used to establish a link
between the information and the natural person to
whom such information relates, or (b) is or can be
directly or indirectly linked to a natural person
Privacy information
management system
(PIMS)
information security management system which
addresses the protection of privacy as potentially
affected by the processing of PII
PII principal natural person to whom the personally identifiable
information (PII) relates
6
Copyright © 2019 BSI. All rights reserved.
KEY Terms
Term Definition
PII controller privacy stakeholder (or privacy stakeholders) that
determines the purposes and means for processing
personally identifiable information (PII) other than
natural persons who use data for personal purposes
PII processor privacy stakeholder that processes personally
identifiable information (PII) on behalf of and in
accordance with the instructions of a PII controller
privacy risk effect of uncertainty on privacy
privacy impact
assessment
PIA
privacy risk
assessment
overall process of identifying, analyzing, evaluating,
consulting, communicating and planning the treatment
of potential privacy impacts with regard to the
processing of personally identifiable information,
framed within an organization's broader risk
management framework
7
Copyright © 2019 BSI. All rights reserved.
Reminder: What is a PIMS?
Privacy Information
Management System (PIMS)
8
Copyright © 2019 BSI. All rights reserved.
PIMS Plan, Do, Check, Act cycle
🗸
🗸
🗸
PLAN DO
ACT CHECK
9
Copyright © 2019 BSI. All rights reserved.
Integration – High level structure
Records
management
requirements
and
expectations
Customers
and
stakeholders
Customers
and
stakeholders
Right
managerial
decisions to
achieve
policy and
expectations
INPUT
Context of
the
organization
Planning
Performance
evaluation
Leadership
Support
Improvement
Operation
OUTPUT
Doc info
10
Copyright © 2019 BSI. All rights reserved.
Contents in ISO/IEC 27701
11
Copyright © 2019 BSI. All rights reserved.
1. Scope
2. Normative Reference
3.Terms, definitions and
abbreviations
12
Copyright © 2019 BSI. All rights reserved.
4 General
13
Copyright © 2019 BSI. All rights reserved.
4 General
14
Copyright © 2019 BSI. All rights reserved.
Clause 5: PIMS-specific
requirements related to
ISO/IEC 27001
Clause 6: PIMS-specific
guidance related to
ISO/IEC 27002
Clause 7: Additional
ISO/IEC 27002 guidance
for PII controllers
Clause 8: Additional
ISO/IEC 27002 guidance
for PII processors
15
Copyright © 2019 BSI. All rights reserved.
16
Copyright © 2019 BSI. All rights reserved.
Annex A- F
Annex Detail
Annex A (informative) PIMS-specific reference control objectives and
controls (PII Controllers)
Annex B (normative) PIMS-specific reference control objectives and
controls (PII Processors)
Annex C (informative) Mapping to ISO/IEC 29100
Table C.1 — Mapping of controls for PII controllers
and ISO/IEC 29100
Table C.2 — Mapping of controls for PII processors
and ISO/IEC 29100
Annex D (informative) Mapping to the General Data Protection Regulation
Annex E (informative) Mapping to ISO/IEC 27018 and ISO/IEC 29151
Annex F (informative) How to apply ISO/IEC 27701 to ISO/IEC 27001 and
ISO/IEC 27002
Clause 5
Clause 5: PIMS-specific requirements related to
ISO/IEC 27001
17
Copyright © 2019 BSI. All rights reserved.
Clause 5.2 Context of the organization
ORGANIZATION
Intended
outcomes of
the PIMS
(e.g.
objectives)
External and
internal factors
(5.2.1)
Purpose
(7.2.1
8.2.2)
Scope
(5.2.3)
Legal and
other
requirements
(5.2.1)
Interested
parties
relevant to
the PIMS
(5.2.2)
External and
internal factors
Determine
Visions, mission, strategic direction etc.
18
Copyright © 2019 BSI. All rights reserved.
Leadership
and
commitment
19
Copyright © 2019 BSI. All rights reserved.
Policy
Organizational
roles,
responsibilities
and
authorities
Embedding
the PIMS in
the
organization’s
culture
Clause 5.3 Leadership
PRIVACY RISK ASSESSMENT
Personal details
Name: *********
Address: *******
***************
Personal details
Name: Carl Smith
Address: 4 Any
Road, Somewhere
5.4.1 Actions
to address
risks and
opportunities
5.4.2
20
Copyright © 2019 BSI. All rights reserved.
Information
security
objectives
and planning
to achieve
them
Clause 5.4 Planning
Clause 5.4.2
Results
measured
and
e
valuated?
Information security
objectives and planning
to achieve them
21
Copyright © 2019 BSI. All rights reserved.
Clause 5.4 Planning
1. Resources
2. Competence
Clause 5.5 Support
22
Copyright © 2019 BSI. All rights reserved.
Clause 5.5 Support
Clause 5.5 Support
STAFF COMMUNICATIONS
PIMS policy
5.5.3 Awareness 5.5.4 Communication 5.5.5 Documented information
23
Copyright © 2019 BSI. All rights reserved.
Personal Information Management System
PIMS policy
Process-specific
policies
Processes Procedures
PIMS plan
Scope
Process
specific
plans
PIMS
objectives
PIMS
Resources
Documents
e.g.
catalogue,
SLAs
Records
24
Copyright © 2019 BSI. All rights reserved.
Clause 5.5.5 Documented information
Clause 5.6 subclauses
25
Copyright © 2019 BSI. All rights reserved.
1.Operational planning
and control (8.1)
2.Information security
risk assessment (8.2)
3.Information security
risk treatment (8.3)
Clause 5.7 Performance evaluation
Clause 5.7.1: Monitoring, measuring,
analysis and evaluation (9.1)
5.7.2 Internal audit (9.2)
5.7.2 Management review (9.3)
26
Copyright © 2019 BSI. All rights reserved.
Clause 5.8.1 and Clause 5.8.2
27
Copyright © 2019 BSI. All rights reserved.
5.8.1 Nonconformity and
corrective action (10.1)
5.8.2 Continual
improvement (10.2)
Clause 6: PIMS-specific guidance related to ISO/IEC
27002
28
Copyright © 2019 BSI. All rights reserved.
Clause 6.2 Information security policies
Commitment to
compliance
PII
requirements
Responsibilities
Boundaries of
scope
Privacy policy
29
Copyright © 2019 BSI. All rights reserved.
6.4.2.2 Information security,
awareness, education and training
Clause 6.4 Human resource security
30
Copyright © 2019 BSI. All rights reserved.
Clear desk Personal
details
S imon
@email.
co.uk
31
Copyright © 2019 BSI. All rights reserved.
6.7.1 Cryptographic controls
6.8.2.7 Secure disposal or re-use of equipment
6.8.2.9 Clear desk and clear screen policy
Clause 6.7 Cryptography and Clause 6.8
Physical and environmental security
Clause 6.13 Information security incident
management
6.13.1 Management of
information security
incidents and improvements
32
Copyright © 2019 BSI. All rights reserved.
NEWS TODAY
Friday 25th October 20XX £0.65
BREACH!
PII leak in top firm
dolor sit amet,
consectetur
adipiscing
Quisque
posuere arcu, et
convallis justo.
Integer sed ex
feugiat,
accumsan est a,
elementum leo.
venenatis Lorem ipsum
tortor in
Vivamus
ornare
tempor.
Sed id lacus a
tortor gravida
maximus quis
elit. sed lacus.
id Nam sit amet
elit vehicula,
vestibulum
eros ut,
hendrerit
metus.
Phasellus
rutrum
How to
recognize a
PII breach/
security
incident
33
Copyright © 2019 BSI. All rights reserved.
Clause 6.13 Information security incident
management
n
al data Personal data
al data
al data Personal data
al data Personal data
al data Personal data
Personal data
Clause 7: Additional ISO/IEC 27002 guidance
for PII controllers
34
Copyright © 2019 BSI. All rights reserved.
GDPR
Article 6
Clause 7.2 Conditions for collection and
processing
1.Identify and
document
purpose
2.Identify
lawful basis
35
Copyright © 2019 BSI. All rights reserved.
Personal data
Personal data
Personal data
Personal data
Clause 7 Obligations to PII principals
36
Copyright © 2019 BSI. All rights reserved.
7.3 Obligations
to PII principals
Clause 7.4 Privacy by design and by default
🗸
🗸
🗸
37
Copyright © 2019 BSI. All rights reserved.
Clause 7.4 Privacy by design and by default
Necessary PII:
Name
DOB
Address
Occupation
Next of kin
Pets




X
X
7.4 Privacy by
38
Copyright © 2019 BSI. All rights reserved.
design and by
default
Clause 8: Additional ISO/IEC 27002 guidance for PII
processors
39
Copyright © 2019 BSI. All rights reserved.
Clause 8 Conditions for collection and
processing
8.2.1 Cooperation
agreement
CONTRACT
40
Copyright © 2019 BSI. All rights reserved.
8.4.2
8.4.2 Return, transfer
or disposal of PII (1)
41
Copyright © 2019 BSI. All rights reserved.
Clause 8.4 Privacy by design and privacy by
default
Summary
Contents in ISO/IEC 27701
42
Copyright © 2019 BSI. All rights reserved.
1. Scope
2. Normative Reference
3.Terms, definitions and
abbreviations
4. General
43
Copyright © 2019 BSI. All rights reserved.
Clause 5: PIMS-specific
requirements related to
ISO/IEC 27001
Clause 6: PIMS-specific
guidance related to
ISO/IEC 27002
Clause 7: Additional
ISO/IEC 27002 guidance
for PII controllers
Clause 8: Additional
ISO/IEC 27002 guidance
for PII processors
44
Copyright © 2019 BSI. All rights reserved.
A
F
D
E
B
C
Annexes
Annexes A-F
45
Copyright © 2019 BSI. All rights reserved.
46
Copyright © 2019 BSI. All rights reserved.
Annex A- F
Annex Detail
Annex A (informative) PIMS-specific reference control objectives and
controls (PII Controllers)
Annex B (normative) PIMS-specific reference control objectives and
controls (PII Processors)
Annex C (informative) Mapping to ISO/IEC 29100
Table C.1 — Mapping of controls for PII controllers
and ISO/IEC 29100
Table C.2 — Mapping of controls for PII processors
and ISO/IEC 29100
Annex D (informative) Mapping to the General Data Protection Regulation
Annex E (informative) Mapping to ISO/IEC 27018 and ISO/IEC 29151
Annex F (informative) How to apply ISO/IEC 27701 to ISO/IEC 27001 and
ISO/IEC 27002
Related Standard
47
Copyright © 2019 BSI. All rights reserved.
Related Standard
48
Copyright © 2019 BSI. All rights reserved.
Implement for PIMS
Understand PIMS
requirement
Privacy Information
Flow
Check ISMS Scope ->
Cover PIMS scope
Study Context of
organization
Implement PIMS Conduct internal audit
Conduct Management
review
49
Copyright © 2019 BSI. All rights reserved.
Certify for PIMS
Already implemented
Verify scope of PIMS
covered by ISMS
Scope
PIMS stage 2 audit
PIMS stage 1 Audit Issue PIMS Certificate
Surveillance –
2nd year
Recertificate
Surveillance –
1st year
Ensure ISMS Certificate is mainained
50
Copyright © 2019 BSI. All rights reserved.
Course review and final questions
51
Copyright © 2019 BSI. All rights reserved.
ISO 27701

More Related Content

What's hot

ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
PECB
 

What's hot (20)

How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
My Gap analysis results between ISO27001: 2022 and 2013 version as of 2022 fall.
 
ISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to knowISO/IEC 27701 vs GDPR: What you need to know
ISO/IEC 27701 vs GDPR: What you need to know
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness TrainingISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
ISO/IEC 27001:2022 (Information Security Management Systems) Awareness Training
 
ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?ISO/IEC 27001:2022 – What are the changes?
ISO/IEC 27001:2022 – What are the changes?
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
ISO/IEC 27701, GDPR, and ePrivacy: How Do They Map?
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
Basic introduction to iso27001
Basic introduction to iso27001Basic introduction to iso27001
Basic introduction to iso27001
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Iso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interpromIso iec 27001 foundation training course by interprom
Iso iec 27001 foundation training course by interprom
 
Project plan for ISO 27001
Project plan for ISO 27001Project plan for ISO 27001
Project plan for ISO 27001
 

Similar to ISO 27701

Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
PECB
 
Cyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdfCyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdf
toncik
 
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docxITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
vrickens
 
Cobit 5 for Information Security
Cobit 5 for Information SecurityCobit 5 for Information Security
Cobit 5 for Information Security
Seto Joseles
 

Similar to ISO 27701 (20)

slide-webninar-kik-r2-2 (1).pdf
slide-webninar-kik-r2-2 (1).pdfslide-webninar-kik-r2-2 (1).pdf
slide-webninar-kik-r2-2 (1).pdf
 
Cobit 5 for information security
Cobit 5 for information securityCobit 5 for information security
Cobit 5 for information security
 
The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...The new frontiers of it in apulia experiences for global security paul dcruz ...
The new frontiers of it in apulia experiences for global security paul dcruz ...
 
ISO 27701 en GDPR - De perfecte combinatie
ISO 27701 en GDPR - De perfecte combinatie ISO 27701 en GDPR - De perfecte combinatie
ISO 27701 en GDPR - De perfecte combinatie
 
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
Aligning ISO/IEC 27032:2023 and ISO/IEC 27701: Strengthening Cybersecurity Re...
 
Cyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdfCyber resolution ban-ana comparing to ana-nas.pdf
Cyber resolution ban-ana comparing to ana-nas.pdf
 
AIOTA Certification.pdf
AIOTA Certification.pdfAIOTA Certification.pdf
AIOTA Certification.pdf
 
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docxITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx
 
20200206 privatum privacy after work - notes 3p
20200206 privatum   privacy after work - notes 3p20200206 privatum   privacy after work - notes 3p
20200206 privatum privacy after work - notes 3p
 
Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementIntroduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT management
 
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdfISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
 
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reillyTech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
 
102 Information security standards and specifications
102 Information security standards and specifications102 Information security standards and specifications
102 Information security standards and specifications
 
Cobit 5 for Information Security
Cobit 5 for Information SecurityCobit 5 for Information Security
Cobit 5 for Information Security
 
Ipen 2019 roma status of privacy engineering standardisation v2
Ipen 2019 roma   status of privacy engineering standardisation v2Ipen 2019 roma   status of privacy engineering standardisation v2
Ipen 2019 roma status of privacy engineering standardisation v2
 
pr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdfpr ISMS Documented Information (lite).pdf
pr ISMS Documented Information (lite).pdf
 
FIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory LandscapeFIDO Authentication in the Shifting Regulatory Landscape
FIDO Authentication in the Shifting Regulatory Landscape
 
Continuous Compliance Monitoring
Continuous Compliance MonitoringContinuous Compliance Monitoring
Continuous Compliance Monitoring
 
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
(ONLINE) ITIL Indonesia Community - Manfaat Penerapan Sistem Manajemen Keaman...
 
Enterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without CompromiseEnterprise-Grade Trust: Collaboration Without Compromise
Enterprise-Grade Trust: Collaboration Without Compromise
 

Recently uploaded

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
allensay1
 

Recently uploaded (20)

Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024Home Furnishings Ecommerce Platform Short Pitch 2024
Home Furnishings Ecommerce Platform Short Pitch 2024
 
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
BADDI 💋 Call Girl 9827461493 Call Girls in Escort service book now
BADDI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowBADDI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
BADDI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
KOLKATA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOLKATA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOLKATA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOLKATA 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service AvailableBankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
Bankura Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Available
 

ISO 27701

  • 1. Copyright © 2019 BSI. All rights reserved. IPR02001ENGX v1.0 Sep 2019 ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for Privacy Information Management – Requirement and guidelines
  • 2. Course aim To provide a typical framework for extending your ISO/IEC 27001 information security management system (ISMS) including the more specific requirements and guidance for protecting your organization’s personally identifiable information (PII), together constituting a privacy information management system (PIMS) 2 Copyright © 2019 BSI. All rights reserved.
  • 3. August 2019: Final Standard published Reminder: Background of ISO/IEC 27701 ISO/IEC 27701 development timeframe: 2018 2019 December 2018: Draft International Standard (DIS) made available and open for public comment for 3 months June 2019: Final Draft International Standard (FDIS) made available 3 Copyright © 2019 BSI. All rights reserved.
  • 4. Benefits of implementing ISO/IEC 27701 Tailored to PII controllers and processors Provides assurance and confidence Maps to GDPR and various frameworks Generates documentary evidence Reduces complexity 4 Copyright © 2019 BSI. All rights reserved.
  • 5. Reminder: Key terms and alternative terms 5 Copyright © 2019 BSI. All rights reserved. Terms as used in ISO/IEC 27701 Alternative term Privacy information management system (PIMS) Personal information management system (PIMS) Personally identifiable information (PII) Personal data PII principal Data subject Privacy by design Data protection by design Privacy by default Data protection by default PII controller Controller PII processor Processor
  • 6. KEY Terms Term Definition Personally identifiable information (PII) any information that (a) can be used to establish a link between the information and the natural person to whom such information relates, or (b) is or can be directly or indirectly linked to a natural person Privacy information management system (PIMS) information security management system which addresses the protection of privacy as potentially affected by the processing of PII PII principal natural person to whom the personally identifiable information (PII) relates 6 Copyright © 2019 BSI. All rights reserved.
  • 7. KEY Terms Term Definition PII controller privacy stakeholder (or privacy stakeholders) that determines the purposes and means for processing personally identifiable information (PII) other than natural persons who use data for personal purposes PII processor privacy stakeholder that processes personally identifiable information (PII) on behalf of and in accordance with the instructions of a PII controller privacy risk effect of uncertainty on privacy privacy impact assessment PIA privacy risk assessment overall process of identifying, analyzing, evaluating, consulting, communicating and planning the treatment of potential privacy impacts with regard to the processing of personally identifiable information, framed within an organization's broader risk management framework 7 Copyright © 2019 BSI. All rights reserved.
  • 8. Reminder: What is a PIMS? Privacy Information Management System (PIMS) 8 Copyright © 2019 BSI. All rights reserved.
  • 9. PIMS Plan, Do, Check, Act cycle 🗸 🗸 🗸 PLAN DO ACT CHECK 9 Copyright © 2019 BSI. All rights reserved.
  • 10. Integration – High level structure Records management requirements and expectations Customers and stakeholders Customers and stakeholders Right managerial decisions to achieve policy and expectations INPUT Context of the organization Planning Performance evaluation Leadership Support Improvement Operation OUTPUT Doc info 10 Copyright © 2019 BSI. All rights reserved.
  • 11. Contents in ISO/IEC 27701 11 Copyright © 2019 BSI. All rights reserved.
  • 12. 1. Scope 2. Normative Reference 3.Terms, definitions and abbreviations 12 Copyright © 2019 BSI. All rights reserved.
  • 13. 4 General 13 Copyright © 2019 BSI. All rights reserved.
  • 14. 4 General 14 Copyright © 2019 BSI. All rights reserved.
  • 15. Clause 5: PIMS-specific requirements related to ISO/IEC 27001 Clause 6: PIMS-specific guidance related to ISO/IEC 27002 Clause 7: Additional ISO/IEC 27002 guidance for PII controllers Clause 8: Additional ISO/IEC 27002 guidance for PII processors 15 Copyright © 2019 BSI. All rights reserved.
  • 16. 16 Copyright © 2019 BSI. All rights reserved. Annex A- F Annex Detail Annex A (informative) PIMS-specific reference control objectives and controls (PII Controllers) Annex B (normative) PIMS-specific reference control objectives and controls (PII Processors) Annex C (informative) Mapping to ISO/IEC 29100 Table C.1 — Mapping of controls for PII controllers and ISO/IEC 29100 Table C.2 — Mapping of controls for PII processors and ISO/IEC 29100 Annex D (informative) Mapping to the General Data Protection Regulation Annex E (informative) Mapping to ISO/IEC 27018 and ISO/IEC 29151 Annex F (informative) How to apply ISO/IEC 27701 to ISO/IEC 27001 and ISO/IEC 27002
  • 17. Clause 5 Clause 5: PIMS-specific requirements related to ISO/IEC 27001 17 Copyright © 2019 BSI. All rights reserved.
  • 18. Clause 5.2 Context of the organization ORGANIZATION Intended outcomes of the PIMS (e.g. objectives) External and internal factors (5.2.1) Purpose (7.2.1 8.2.2) Scope (5.2.3) Legal and other requirements (5.2.1) Interested parties relevant to the PIMS (5.2.2) External and internal factors Determine Visions, mission, strategic direction etc. 18 Copyright © 2019 BSI. All rights reserved.
  • 19. Leadership and commitment 19 Copyright © 2019 BSI. All rights reserved. Policy Organizational roles, responsibilities and authorities Embedding the PIMS in the organization’s culture Clause 5.3 Leadership
  • 20. PRIVACY RISK ASSESSMENT Personal details Name: ********* Address: ******* *************** Personal details Name: Carl Smith Address: 4 Any Road, Somewhere 5.4.1 Actions to address risks and opportunities 5.4.2 20 Copyright © 2019 BSI. All rights reserved. Information security objectives and planning to achieve them Clause 5.4 Planning
  • 21. Clause 5.4.2 Results measured and e valuated? Information security objectives and planning to achieve them 21 Copyright © 2019 BSI. All rights reserved. Clause 5.4 Planning
  • 22. 1. Resources 2. Competence Clause 5.5 Support 22 Copyright © 2019 BSI. All rights reserved.
  • 23. Clause 5.5 Support Clause 5.5 Support STAFF COMMUNICATIONS PIMS policy 5.5.3 Awareness 5.5.4 Communication 5.5.5 Documented information 23 Copyright © 2019 BSI. All rights reserved.
  • 24. Personal Information Management System PIMS policy Process-specific policies Processes Procedures PIMS plan Scope Process specific plans PIMS objectives PIMS Resources Documents e.g. catalogue, SLAs Records 24 Copyright © 2019 BSI. All rights reserved. Clause 5.5.5 Documented information
  • 25. Clause 5.6 subclauses 25 Copyright © 2019 BSI. All rights reserved. 1.Operational planning and control (8.1) 2.Information security risk assessment (8.2) 3.Information security risk treatment (8.3)
  • 26. Clause 5.7 Performance evaluation Clause 5.7.1: Monitoring, measuring, analysis and evaluation (9.1) 5.7.2 Internal audit (9.2) 5.7.2 Management review (9.3) 26 Copyright © 2019 BSI. All rights reserved.
  • 27. Clause 5.8.1 and Clause 5.8.2 27 Copyright © 2019 BSI. All rights reserved. 5.8.1 Nonconformity and corrective action (10.1) 5.8.2 Continual improvement (10.2)
  • 28. Clause 6: PIMS-specific guidance related to ISO/IEC 27002 28 Copyright © 2019 BSI. All rights reserved.
  • 29. Clause 6.2 Information security policies Commitment to compliance PII requirements Responsibilities Boundaries of scope Privacy policy 29 Copyright © 2019 BSI. All rights reserved.
  • 30. 6.4.2.2 Information security, awareness, education and training Clause 6.4 Human resource security 30 Copyright © 2019 BSI. All rights reserved.
  • 31. Clear desk Personal details S imon @email. co.uk 31 Copyright © 2019 BSI. All rights reserved. 6.7.1 Cryptographic controls 6.8.2.7 Secure disposal or re-use of equipment 6.8.2.9 Clear desk and clear screen policy Clause 6.7 Cryptography and Clause 6.8 Physical and environmental security
  • 32. Clause 6.13 Information security incident management 6.13.1 Management of information security incidents and improvements 32 Copyright © 2019 BSI. All rights reserved.
  • 33. NEWS TODAY Friday 25th October 20XX £0.65 BREACH! PII leak in top firm dolor sit amet, consectetur adipiscing Quisque posuere arcu, et convallis justo. Integer sed ex feugiat, accumsan est a, elementum leo. venenatis Lorem ipsum tortor in Vivamus ornare tempor. Sed id lacus a tortor gravida maximus quis elit. sed lacus. id Nam sit amet elit vehicula, vestibulum eros ut, hendrerit metus. Phasellus rutrum How to recognize a PII breach/ security incident 33 Copyright © 2019 BSI. All rights reserved. Clause 6.13 Information security incident management
  • 34. n al data Personal data al data al data Personal data al data Personal data al data Personal data Personal data Clause 7: Additional ISO/IEC 27002 guidance for PII controllers 34 Copyright © 2019 BSI. All rights reserved.
  • 35. GDPR Article 6 Clause 7.2 Conditions for collection and processing 1.Identify and document purpose 2.Identify lawful basis 35 Copyright © 2019 BSI. All rights reserved.
  • 36. Personal data Personal data Personal data Personal data Clause 7 Obligations to PII principals 36 Copyright © 2019 BSI. All rights reserved. 7.3 Obligations to PII principals
  • 37. Clause 7.4 Privacy by design and by default 🗸 🗸 🗸 37 Copyright © 2019 BSI. All rights reserved.
  • 38. Clause 7.4 Privacy by design and by default Necessary PII: Name DOB Address Occupation Next of kin Pets     X X 7.4 Privacy by 38 Copyright © 2019 BSI. All rights reserved. design and by default
  • 39. Clause 8: Additional ISO/IEC 27002 guidance for PII processors 39 Copyright © 2019 BSI. All rights reserved.
  • 40. Clause 8 Conditions for collection and processing 8.2.1 Cooperation agreement CONTRACT 40 Copyright © 2019 BSI. All rights reserved.
  • 41. 8.4.2 8.4.2 Return, transfer or disposal of PII (1) 41 Copyright © 2019 BSI. All rights reserved. Clause 8.4 Privacy by design and privacy by default
  • 42. Summary Contents in ISO/IEC 27701 42 Copyright © 2019 BSI. All rights reserved.
  • 43. 1. Scope 2. Normative Reference 3.Terms, definitions and abbreviations 4. General 43 Copyright © 2019 BSI. All rights reserved.
  • 44. Clause 5: PIMS-specific requirements related to ISO/IEC 27001 Clause 6: PIMS-specific guidance related to ISO/IEC 27002 Clause 7: Additional ISO/IEC 27002 guidance for PII controllers Clause 8: Additional ISO/IEC 27002 guidance for PII processors 44 Copyright © 2019 BSI. All rights reserved.
  • 45. A F D E B C Annexes Annexes A-F 45 Copyright © 2019 BSI. All rights reserved.
  • 46. 46 Copyright © 2019 BSI. All rights reserved. Annex A- F Annex Detail Annex A (informative) PIMS-specific reference control objectives and controls (PII Controllers) Annex B (normative) PIMS-specific reference control objectives and controls (PII Processors) Annex C (informative) Mapping to ISO/IEC 29100 Table C.1 — Mapping of controls for PII controllers and ISO/IEC 29100 Table C.2 — Mapping of controls for PII processors and ISO/IEC 29100 Annex D (informative) Mapping to the General Data Protection Regulation Annex E (informative) Mapping to ISO/IEC 27018 and ISO/IEC 29151 Annex F (informative) How to apply ISO/IEC 27701 to ISO/IEC 27001 and ISO/IEC 27002
  • 47. Related Standard 47 Copyright © 2019 BSI. All rights reserved.
  • 48. Related Standard 48 Copyright © 2019 BSI. All rights reserved.
  • 49. Implement for PIMS Understand PIMS requirement Privacy Information Flow Check ISMS Scope -> Cover PIMS scope Study Context of organization Implement PIMS Conduct internal audit Conduct Management review 49 Copyright © 2019 BSI. All rights reserved.
  • 50. Certify for PIMS Already implemented Verify scope of PIMS covered by ISMS Scope PIMS stage 2 audit PIMS stage 1 Audit Issue PIMS Certificate Surveillance – 2nd year Recertificate Surveillance – 1st year Ensure ISMS Certificate is mainained 50 Copyright © 2019 BSI. All rights reserved.
  • 51. Course review and final questions 51 Copyright © 2019 BSI. All rights reserved.