SlideShare a Scribd company logo
1 of 5
Download to read offline
ISO/IEC 27701
IMPLEMENTATION GUIDE
50,000
GLOBALLY
CERTIFICATES 90TRANSPARENT
Since 2016, within a relatively short period, Data Protection
legislation has been passed both in the UK and in the EU
which shaped the requirements necessary to ensure the
privacy of personal data which is taken by organisations.
Both the EU General Data Protection Regulation (GDPR) and
UK Data Protection Act 2018 (DPA) are now applicable to all
organisations, regardless of sector, in the United Kingdom. The
relative speed at which this legislation has been established has
left some organisations unable to adequately respond, and well
publicised breaches have occurred.
Despite the well signposted roll out of both pieces of legislature,
neither regulation provides specific guidance on what measures
should be taken to ensure compliance with their requirements.
Further, existing standards do not have, in most cases, a robust
enough set of clauses or controls to ensure data privacy is
addressed in full through implementation of management
systems.
The International Organisation for Standardisation (ISO) and
the International Electrotechnical Commission (IEC) have
developed a new standard to provide the necessary guidance
for businesses to effectively address data privacy and ensure
the gap between existing management systems requirements
and privacy data legislation is effectively bridged.
MANAGING PERSONAL
INFORMATION WITH
ISO/IEC 27701
GDPR – An overview of legislation
The GDPR was adopted by the EU in April 2016 and
replaced the EU Data Protection Directive 95/46/EC.
This new legislation has initiated obligations to any
organisation with data processing responsibilities, and
is applicable to organisations outside of the EU too. The
penalties for failure to comply can be severe. Fines of up
to 4% of annual global turnover or €20million await any
organisation which breaches the legislation.
Primarily the goal can be perceived as being an EU data
privacy harmonisation. As previously mentioned any
non-EU entity offering goods or services to individuals
located in the EU are also bound by the requirements
of the GDPR. Business sectors with sizeable personal
data processing requirements are uniquely affected and
ensuring conformity to the legislation is paramount.
Organisations are required to confirm explicit and
unambiguous consent from customers, based on specific
purposes for use of their data and for specific periods
of time. Individuals have the right to request a copy of
all data that is held on them, including an explanation of
how such data is used and if third parties have access.
Individuals may request for their data profile to be passed
to another data processor; furthermore, individuals also
have the right to withdraw consent and to request for
data that is no longer required to be erased.
Data responsible processes or individuals are now
required to have appropriate security controls in
place to ensure confidentiality of the data they hold or
process and have mechanisms in place to measure that
effectiveness.
Notifications of data breaches must be submitted to the
supervisory authority; for the UK this is the Information
Commissioners Office (ICO) within 72 hours of
recognition of a breach being identified. The ICO is the
UK’s independent authority set up to uphold information
rights in the public interest, promoting openness by
public bodies and data privacy for individuals. Further
international data transfer rules from the Data Protection
Directive are continued within the GDPR. Personal
data can be transferred outside of the EU, but only to
countries which are considered to have comparable
protection mechanisms.
Further guidance can be found through the UK
Government Data Protection Act 2018 page.
WHAT IS ISO 27701 AND WHY IS IT NEEDED?
As previously indicated there has been no guidance on how
to effectively implement processes within an organisations
existing structure to adhere to GDPR. ISO 27701:2019
is a privacy extension to the international information
security management standard, ISO 27001
(ISO 27701 Security techniques – Extension to
ISO 27001 and ISO 27002 for privacy information
management – Requirements and guidelines).
ISO 27701 details the requirements for and gives the
required guidance for the establishment, implementation,
maintenance and improvement of a Privacy Information
Management System (PIMS). The standard is based
on the requirements, control objectives and controls of
the ISO 27001 standard, and includes a suite of privacy
requirements, controls and control objectives.
Concepts of information safety are familiar to organisations
which already have an operational Information Security
Management System (ISMS). The new PIMS will ensure
that organisations have comprehensive and universal
data governance which directly map to the legislative
requirements.
Instances of GDPR breaches have been well publicised
and have affected organisations with both national and
global mandates. A recent Capgemini report outlines that
up to 70% of all organisations believe that they are not
currently compliant to GDPR requirements. The severity
of the penalties which organisations attract through non-
compliance has necessitated the creation of this standard.
BOLT ON TO ISO 27001
ISO 27701 differs slightly in that the standard requires
an existing management system to attach to. Not every
clause and control is applicable in all instances.
The requirements of the standard are split in to the four
groups listed below:
1. PIMS requirements related to ISO 27001 are outlined
at clause 5
2. PIMS requirements related to ISO 27002 are outlined
at clause 6
3. PIMS guidance for Personally Identifiable Information
(PII) Controllers are outlined at clause 7
4. PIMS guidance for PII Processers are outlined at
clause 8
Additionally, applicable controls are outlined within Annex
constructs to the main body of the standard.
The following can be used as a guide for relevance:
1. Annex A lists all applicable controls for PII Controllers.
2. Annex B lists all applicable controls for PII Processors.
3. Annex C maps the provisions of ISO 27701
against ISO 29100.
4. Annex D maps the provisions of ISO 27701
against the GDPR.
5. Annex E maps the provisions of ISO 27701
against ISO 27018 and ISO 29151
6. Annex F provides guidance for applying ISO 27701
to ISO 27001 and ISO 27002.
In most circumstances, organisations with existing certification
to ISO 27001 should start at Annex F to understand how the
application of PIMS fits in to their existing ISO 27001 ISMS. This
annex refers to three instances for application of the standard to
protection of privacy of PII principals when processing PII:
• Application of security standards as is
• Additions to security standards
• Refinement of security standards
The clause areas within PIMS extend the requirements of
ISO 27001 to incorporate PII considerations. Clause 5 provides a
PIMS-specific guidance set concerning the information security
requirements in ISO 27001 appropriate to an organisation which
acts as either a PII controller or processor.
The sub-clauses outline detailed requirements. This is perhaps
the most pertinent area for those with existing ISMS to consider
and dwell on requirements.
Detailed below are the additional considerations within clause 5 of the ISO 27701 standard which may be observed as extra
to existing ISMS requirements:
5.1 The requirements of ISO 27001 must be extended to the protection of privacy as potentially affected by the
processing of PII. A glance at Annex F provides a table which gives visual indication of how this will look.
5.2.1 An additional requirement to ISO 27001 clause 4.1 is to outline that an organisation will determine its role as a PII
Controller and/or processer. Additionally external and internal factors that are relevant to context and affect the ability
to achieve outcomes of its PIMS require indication. This includes any relevant legislation adherence already in place
as a consideration within the existing ISMS or contractual requirements which hitherto had been identified in differing
clauses or Annex controls within ISO 27001.
Where an organisation has both PII controller and PII processor roles identified, separate roles must be determined, each
of which will be subject to a separate control set.
5.2.2 A consideration extra to ISO 27001 clause 4.2 is the requirement to include interested parties with responsibilities
associated with the processing of PII. This can include customers, which again is not something which may have
previously been considered in an ISO 27001 ISMS. Additionally requirements which are relevant to the processing of
PII can be determined by legal requirements, contractual obligations or self-identified objectives.
5.2.3 The scope of the ISMS is required by ISO 27001 clause 4.3. Additional PIMS factors for scope include an
organisation including processing of PII. PIMS scope determination, therefore, can require a revision of the ISMS
because of the extension to interpretation of what constitutes information security in ISO 27701 clause 5.1.
5.2.4 Further to ISO 27001 clause 4.4 an organisation is required within the new standard to establish, implement,
maintain and continually improve a PIMS in accordance with the requirements of ISO 27001:2013 Clauses 4 to 10,
extended by the requirements in Clause 5.
5.3 Within ISO 27001, organisations are required to demonstrate commitment to the ISMS through leadership initiatives
and the creation of policies, roles  responsibilities and guidance. Likewise, the PIMS requires a similar input from
the top management along with relevant PIMS specific interpretations as indicated at 5.1 to ISO 27701 which covers
all mirrored aspects of clause 5 of the ISMS.
5.4.1 The requirements of ISO 27001 to address risks and opportunities require augmentation with the considerations
of clause 5.1 in ISO 27701. Furthermore, Information Security risk assessments identified within ISO 27001 are
applicable with the following additional requirements:
1. The organisation shall apply the information security risk assessment process to identify risks associated with the
loss of confidentiality, integrity and availability, within the scope of the PIMS.
2. The organisation shall apply privacy risk assessment process to identify risks related to the processing of PII,
within the scope of the PIMS.
3. The organisation shall ensure throughout the risk assessment processes that the relationship between information
security and PII protection is appropriately managed.
This can be an integrated risk assessment process or parallel processes which are controlled separately; this
depends entirely on the organisation to determine.
Additionally, ISO 27001 clause 6.1.2.d is refined to include an assessment for potential consequences for both
the organisation and PII principals that would result if the risks identified during the 6.1.2.c (ISO 27001) were to
materialise.
Further considerations are given to the Statement of Applicability which would have been generated by the
organisation when implementing the ISO 27001 ISMS. As an organisation would have encountered an “opt out
and justify” approach to produce the SoA in the first instance, likewise for the PIMS, not all control objectives and
controls listed within Annex areas need to be included during PIMS implementation. Justification for exclusion where
controls are not deemed necessary can be identified.
5.4.2 Information security objectives from the organisations ISMS from clause 6.2 augmented by the interpretation of
ISO 27701 clause 5.1 must be considered.
5.5 Support considerations from ISO 27001 at clause 7 are applicable along with the additional interpretation specified
within ISO 27701 clause 5.1.
5.6 Operational consideration from ISO 27001 at clause 8 including risk treatment planning are similarly required by
ISO 27701 along with additional information which is identified through addressing clause 5.1 to the latter standard.
5.7/5.8 Similarly; the Monitoring/Measuring  Improvement considerations which are live within an existing ISMS require
further augmentation from the considerations given to clause 5.1 to ISO 27701.
The processes identified above indicated that clause 5.1 to the new standard is a key point to the
implementation of a PIMS. The extension to the protection of privacy as potentially affected by the
processing of PII is a key element to implementation and guides the consideration given when addressing
the further clause areas of ISO 27701.
ADDITIONAL CONSIDERATIONS
The following table provides a simple overview of the information on the previous page:
ISO 27001 Clause ISO 27701 Extension
5.1
5.2
5.3
7.1
7.4
Top Level Commitment for Privacy Policy and integration of PIMS to the ISMS of an organisation including:
1. Resourcing/Establishment of Roles
2. Communication (Internal/External)
3. Anticipated outcome
4. Control and Guidance
5. Continual Improvement of PIMS
6.2 PIMS/Privacy Objectives
7.2 Competency profiles of individuals assigned to privacy requirements
7.3 Awareness of the PIMS policy and how personnel contribute to the establishment and improvement of the
system
7.5 Documentation for PIMS with additional considerations on information and documentation non-organic to the
organisation.
8.1 PIMS Risk Treatment activation
8.2 PIMS Risk Assessment process
8.3 PIMS Risk Treatment Plan including amendments to existing risk registers
9.1
9.2
9.3
PIMS Performance and analysis of PIMS effectiveness including:
1. Internal Audit
2. Management Review
10 PIMS Continuous Improvement considerations
www.nqa.com

More Related Content

What's hot

ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListSriramITISConsultant
 
NQA ISO 22000 Food Safety Transition Gap Guide
NQA ISO 22000 Food Safety Transition Gap GuideNQA ISO 22000 Food Safety Transition Gap Guide
NQA ISO 22000 Food Safety Transition Gap GuideNQA
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyControlCase
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45
 
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist QuestionsISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questionshimalya sharma
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...himalya sharma
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012Hakem Filiz
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA
 
NQA ISO 50001 Implementation Guide
NQA ISO 50001 Implementation GuideNQA ISO 50001 Implementation Guide
NQA ISO 50001 Implementation GuideNQA
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTGaffri Johnson
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013SAIGlobalAssurance
 

What's hot (18)

ISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_ListISO 27001 Implementation_Documentation_Mandatory_List
ISO 27001 Implementation_Documentation_Mandatory_List
 
27001 2015(+a1)
27001 2015(+a1)27001 2015(+a1)
27001 2015(+a1)
 
NQA ISO 22000 Food Safety Transition Gap Guide
NQA ISO 22000 Food Safety Transition Gap GuideNQA ISO 22000 Food Safety Transition Gap Guide
NQA ISO 22000 Food Safety Transition Gap Guide
 
ISO 27001:2013 - Changes
ISO 27001:2013 -  ChangesISO 27001:2013 -  Changes
ISO 27001:2013 - Changes
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of Privacy
 
we45 ISO-27001 Case Study
we45 ISO-27001 Case Studywe45 ISO-27001 Case Study
we45 ISO-27001 Case Study
 
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist QuestionsISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
ISO 27001 Checklist - ISMS Scope - Clause 4.3 - 38 checklist Questions
 
27001 awareness Training
27001 awareness Training27001 awareness Training
27001 awareness Training
 
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
ISO 27001 Training | ISO 27001 Internal Auditor Training | ISMS Internal Audi...
 
ISMS implementation challenges-KASYS
ISMS implementation challenges-KASYSISMS implementation challenges-KASYS
ISMS implementation challenges-KASYS
 
University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012University iso 27001 bgys intro and certification lami kaya may2012
University iso 27001 bgys intro and certification lami kaya may2012
 
NQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation GuideNQA ISO 27001 Implementation Guide
NQA ISO 27001 Implementation Guide
 
NQA ISO 50001 Implementation Guide
NQA ISO 50001 Implementation GuideNQA ISO 50001 Implementation Guide
NQA ISO 50001 Implementation Guide
 
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCALead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
Lead Auditor Course on ISO 27001:2013 (ISMS) - IRCA
 
ISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENTISO 27001 ISMS MEASUREMENT
ISO 27001 ISMS MEASUREMENT
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Transitioning to iso 27001 2013
Transitioning to iso 27001 2013Transitioning to iso 27001 2013
Transitioning to iso 27001 2013
 
Iso 27001 10_apr_2006
Iso 27001 10_apr_2006Iso 27001 10_apr_2006
Iso 27001 10_apr_2006
 

Similar to NQA ISO 27701 Implementation Guide

GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701PECB
 
Any Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsAny Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsPECB
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information ProtectionPECB
 
Beyond ISO 27001: A Closer Look at ISO 27701 Certification
Beyond ISO 27001: A Closer Look at ISO 27701 CertificationBeyond ISO 27001: A Closer Look at ISO 27701 Certification
Beyond ISO 27001: A Closer Look at ISO 27701 CertificationShyamMishra72
 
Understanding Binding Corporate Rules
Understanding Binding Corporate RulesUnderstanding Binding Corporate Rules
Understanding Binding Corporate RulesJan Dhont
 
NQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA
 
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reillyTech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reillyEvents2018
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paperGraeme Cross
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessMark Baker
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsHubilo
 
All you need to know about GDPR
All you need to know about GDPRAll you need to know about GDPR
All you need to know about GDPRHubilo
 
Achieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceAchieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceTripwire
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection RegulationPete S
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaperJim Wilson
 
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxPECB
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
Data Protection and Data Privacy
Data Protection and Data PrivacyData Protection and Data Privacy
Data Protection and Data PrivacyIT Governance Ltd
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview Ahmed Riad .
 

Similar to NQA ISO 27701 Implementation Guide (20)

GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
GDPR vs US Regulations: Their differences and Commonalities with ISO/IEC 27701
 
AIOTA Certification.pdf
AIOTA Certification.pdfAIOTA Certification.pdf
AIOTA Certification.pdf
 
Any Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO StandardsAny Standard is Better Than None: GDPR and the ISO Standards
Any Standard is Better Than None: GDPR and the ISO Standards
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
Beyond ISO 27001: A Closer Look at ISO 27701 Certification
Beyond ISO 27001: A Closer Look at ISO 27701 CertificationBeyond ISO 27001: A Closer Look at ISO 27701 Certification
Beyond ISO 27001: A Closer Look at ISO 27701 Certification
 
Understanding Binding Corporate Rules
Understanding Binding Corporate RulesUnderstanding Binding Corporate Rules
Understanding Binding Corporate Rules
 
NQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap GuideNQA ISO 9001 to ISO 27001 Gap Guide
NQA ISO 9001 to ISO 27001 Gap Guide
 
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reillyTech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
Tech Connect Live 30th May 2018 ,GDPR Summit Sharon o' reilly
 
Aon GDPR white paper
Aon GDPR white paperAon GDPR white paper
Aon GDPR white paper
 
GDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your businessGDPR- Get the facts and prepare your business
GDPR- Get the facts and prepare your business
 
The Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event ProfessionalsThe Definitive GDPR Guide for Event Professionals
The Definitive GDPR Guide for Event Professionals
 
All you need to know about GDPR
All you need to know about GDPRAll you need to know about GDPR
All you need to know about GDPR
 
Achieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 ComplianceAchieving Effective IT Security with Continuous ISO 27001 Compliance
Achieving Effective IT Security with Continuous ISO 27001 Compliance
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
GDPRIBMWhitePaper
GDPRIBMWhitePaperGDPRIBMWhitePaper
GDPRIBMWhitePaper
 
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptxISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
ISO-IEC 27701 and EU-U.S. Privacy Regulations What’s next.pptx
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
Eurosec'2008 christophe feltus
Eurosec'2008 christophe feltusEurosec'2008 christophe feltus
Eurosec'2008 christophe feltus
 
Data Protection and Data Privacy
Data Protection and Data PrivacyData Protection and Data Privacy
Data Protection and Data Privacy
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 

More from NQA

NQA ISO 27001 27017 27018 27701 Mapping
NQA ISO 27001 27017 27018 27701 MappingNQA ISO 27001 27017 27018 27701 Mapping
NQA ISO 27001 27017 27018 27701 MappingNQA
 
NQA ISO 13485 Introduction Guide
NQA ISO 13485 Introduction GuideNQA ISO 13485 Introduction Guide
NQA ISO 13485 Introduction GuideNQA
 
NQA Measuring Operational Resilience Guide
NQA Measuring Operational Resilience GuideNQA Measuring Operational Resilience Guide
NQA Measuring Operational Resilience GuideNQA
 
NQA ISO 22301 Transition Gap Guide
NQA ISO 22301 Transition Gap GuideNQA ISO 22301 Transition Gap Guide
NQA ISO 22301 Transition Gap GuideNQA
 
NQA Ten Tips for Planning and Preparing
NQA Ten Tips for Planning and PreparingNQA Ten Tips for Planning and Preparing
NQA Ten Tips for Planning and PreparingNQA
 
NQA ISO 13485 Implementation Guide
NQA ISO 13485 Implementation GuideNQA ISO 13485 Implementation Guide
NQA ISO 13485 Implementation GuideNQA
 
NQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA
 
NQA ISO 45001 Implementation Guide
NQA ISO 45001 Implementation GuideNQA ISO 45001 Implementation Guide
NQA ISO 45001 Implementation GuideNQA
 
NQA ISO 45001 Gap Guide
NQA ISO 45001 Gap GuideNQA ISO 45001 Gap Guide
NQA ISO 45001 Gap GuideNQA
 
NQA ISO 22000 Implementation Guide
NQA ISO 22000 Implementation GuideNQA ISO 22000 Implementation Guide
NQA ISO 22000 Implementation GuideNQA
 
NQA ISO 14001 Implementation Guide
NQA ISO 14001 Implementation GuideNQA ISO 14001 Implementation Guide
NQA ISO 14001 Implementation GuideNQA
 
NQA ISO 9001 Implementation Guide
NQA ISO 9001 Implementation GuideNQA ISO 9001 Implementation Guide
NQA ISO 9001 Implementation GuideNQA
 
NQA Journey to Certification
NQA Journey to CertificationNQA Journey to Certification
NQA Journey to CertificationNQA
 
NQA 10 Steps to IMS Guide
NQA 10 Steps to IMS GuideNQA 10 Steps to IMS Guide
NQA 10 Steps to IMS GuideNQA
 
NQA ISO 13485 Gap Guide – what’s changed?
NQA ISO 13485 Gap Guide – what’s changed?NQA ISO 13485 Gap Guide – what’s changed?
NQA ISO 13485 Gap Guide – what’s changed?NQA
 
Certification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQACertification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQANQA
 
Implementing ISO 50001 at the London School of Economics
Implementing ISO 50001 at the London School of EconomicsImplementing ISO 50001 at the London School of Economics
Implementing ISO 50001 at the London School of EconomicsNQA
 
ISO 45001 Current Status of Development from ISO
ISO 45001 Current Status of Development from ISOISO 45001 Current Status of Development from ISO
ISO 45001 Current Status of Development from ISONQA
 
NQA ISO 14001:2015 – Accredited Certification Transition Webinar Slides
NQA ISO 14001:2015 – Accredited Certification Transition Webinar SlidesNQA ISO 14001:2015 – Accredited Certification Transition Webinar Slides
NQA ISO 14001:2015 – Accredited Certification Transition Webinar SlidesNQA
 
Oxford Brookes Case Study - ISO 14001 (Environmental Management)
Oxford Brookes Case Study - ISO 14001 (Environmental Management)Oxford Brookes Case Study - ISO 14001 (Environmental Management)
Oxford Brookes Case Study - ISO 14001 (Environmental Management)NQA
 

More from NQA (20)

NQA ISO 27001 27017 27018 27701 Mapping
NQA ISO 27001 27017 27018 27701 MappingNQA ISO 27001 27017 27018 27701 Mapping
NQA ISO 27001 27017 27018 27701 Mapping
 
NQA ISO 13485 Introduction Guide
NQA ISO 13485 Introduction GuideNQA ISO 13485 Introduction Guide
NQA ISO 13485 Introduction Guide
 
NQA Measuring Operational Resilience Guide
NQA Measuring Operational Resilience GuideNQA Measuring Operational Resilience Guide
NQA Measuring Operational Resilience Guide
 
NQA ISO 22301 Transition Gap Guide
NQA ISO 22301 Transition Gap GuideNQA ISO 22301 Transition Gap Guide
NQA ISO 22301 Transition Gap Guide
 
NQA Ten Tips for Planning and Preparing
NQA Ten Tips for Planning and PreparingNQA Ten Tips for Planning and Preparing
NQA Ten Tips for Planning and Preparing
 
NQA ISO 13485 Implementation Guide
NQA ISO 13485 Implementation GuideNQA ISO 13485 Implementation Guide
NQA ISO 13485 Implementation Guide
 
NQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity ChecklistNQA ISO 22301 Business Continuity Checklist
NQA ISO 22301 Business Continuity Checklist
 
NQA ISO 45001 Implementation Guide
NQA ISO 45001 Implementation GuideNQA ISO 45001 Implementation Guide
NQA ISO 45001 Implementation Guide
 
NQA ISO 45001 Gap Guide
NQA ISO 45001 Gap GuideNQA ISO 45001 Gap Guide
NQA ISO 45001 Gap Guide
 
NQA ISO 22000 Implementation Guide
NQA ISO 22000 Implementation GuideNQA ISO 22000 Implementation Guide
NQA ISO 22000 Implementation Guide
 
NQA ISO 14001 Implementation Guide
NQA ISO 14001 Implementation GuideNQA ISO 14001 Implementation Guide
NQA ISO 14001 Implementation Guide
 
NQA ISO 9001 Implementation Guide
NQA ISO 9001 Implementation GuideNQA ISO 9001 Implementation Guide
NQA ISO 9001 Implementation Guide
 
NQA Journey to Certification
NQA Journey to CertificationNQA Journey to Certification
NQA Journey to Certification
 
NQA 10 Steps to IMS Guide
NQA 10 Steps to IMS GuideNQA 10 Steps to IMS Guide
NQA 10 Steps to IMS Guide
 
NQA ISO 13485 Gap Guide – what’s changed?
NQA ISO 13485 Gap Guide – what’s changed?NQA ISO 13485 Gap Guide – what’s changed?
NQA ISO 13485 Gap Guide – what’s changed?
 
Certification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQACertification Body Approach to ISO 9001:2015 by NQA
Certification Body Approach to ISO 9001:2015 by NQA
 
Implementing ISO 50001 at the London School of Economics
Implementing ISO 50001 at the London School of EconomicsImplementing ISO 50001 at the London School of Economics
Implementing ISO 50001 at the London School of Economics
 
ISO 45001 Current Status of Development from ISO
ISO 45001 Current Status of Development from ISOISO 45001 Current Status of Development from ISO
ISO 45001 Current Status of Development from ISO
 
NQA ISO 14001:2015 – Accredited Certification Transition Webinar Slides
NQA ISO 14001:2015 – Accredited Certification Transition Webinar SlidesNQA ISO 14001:2015 – Accredited Certification Transition Webinar Slides
NQA ISO 14001:2015 – Accredited Certification Transition Webinar Slides
 
Oxford Brookes Case Study - ISO 14001 (Environmental Management)
Oxford Brookes Case Study - ISO 14001 (Environmental Management)Oxford Brookes Case Study - ISO 14001 (Environmental Management)
Oxford Brookes Case Study - ISO 14001 (Environmental Management)
 

Recently uploaded

Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaDelhi Escorts Service
 
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Pooja Nehwal
 
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579diyaspanoida
 
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579diyaspanoida
 
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...aakahthapa70
 
NASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNiteshKumar82226
 
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 60009891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000teencall080
 
KAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CKAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CNiteshKumar82226
 
Call Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near MeCall Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near MeIfra Zohaib
 
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...aakahthapa70
 
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.riyadelhic riyadelhic
 
MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154NiteshKumar82226
 
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...
Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...Goa Call Girls Service Goa escort agency
 
Call Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts ServiceCall Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts ServiceLipikasharma29
 
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Sheetaleventcompany
 
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...riyaescorts54
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...riyasharma00119
 
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North GoaCALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goadelhincr993
 

Recently uploaded (20)

Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe NoidaCall Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
Call Girls In Sector 85 Noida 9711911712 Escorts ServiCe Noida
 
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...Call US  Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
Call US Pooja📞 9892124323 ✅Call Girls In Mira Road ( Mumbai ) secure service...
 
Goa Call Girls 🥰 +91 9540619990 📍Service Girls In Goa
Goa Call Girls 🥰 +91 9540619990 📍Service Girls In GoaGoa Call Girls 🥰 +91 9540619990 📍Service Girls In Goa
Goa Call Girls 🥰 +91 9540619990 📍Service Girls In Goa
 
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
 
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
Best VIP Call Girl Noida Sector 48 Call Me: 8700611579
 
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
Call Girls In {Green Park Delhi} 9667938988 Indian Russian High Profile Girls...
 
NASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALLNASHIK CALL GIRL 92628*71154 NASHIK CALL
NASHIK CALL GIRL 92628*71154 NASHIK CALL
 
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 60009891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
 
KAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA CKAKINADA CALL GIRL 92628/71154 KAKINADA C
KAKINADA CALL GIRL 92628/71154 KAKINADA C
 
Call Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near MeCall Girls | 😏💦 03274100048 | Call Girls Near Me
Call Girls | 😏💦 03274100048 | Call Girls Near Me
 
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
Call Girls In {Laxmi Nagar Delhi} 9667938988 Indian Russian High Profile Girl...
 
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
 
MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154
 
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
9953056974 Call Girls In Ashok Nagar, Escorts (Delhi) NCR.
 
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...
Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...Russian Call Girls  in Goa %(9316020077)# Russian Call Girls  in Goa By Russi...
Russian Call Girls in Goa %(9316020077)# Russian Call Girls in Goa By Russi...
 
Call Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts ServiceCall Girls In Naraina (Delhi) +91-9667422720 Escorts Service
Call Girls In Naraina (Delhi) +91-9667422720 Escorts Service
 
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
Call Girl Rohini ❤️7065000506 Pooja@ Rohini Call Girls Near Me ❤️♀️@ Sexy Cal...
 
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
Hot Vip Call Girls Service In Sector 149,9818099198 Young Female Escorts Serv...
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
 
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North GoaCALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
CALL GIRLS 9999288940 women seeking men Locanto No Advance North Goa
 

NQA ISO 27701 Implementation Guide

  • 2. Since 2016, within a relatively short period, Data Protection legislation has been passed both in the UK and in the EU which shaped the requirements necessary to ensure the privacy of personal data which is taken by organisations. Both the EU General Data Protection Regulation (GDPR) and UK Data Protection Act 2018 (DPA) are now applicable to all organisations, regardless of sector, in the United Kingdom. The relative speed at which this legislation has been established has left some organisations unable to adequately respond, and well publicised breaches have occurred. Despite the well signposted roll out of both pieces of legislature, neither regulation provides specific guidance on what measures should be taken to ensure compliance with their requirements. Further, existing standards do not have, in most cases, a robust enough set of clauses or controls to ensure data privacy is addressed in full through implementation of management systems. The International Organisation for Standardisation (ISO) and the International Electrotechnical Commission (IEC) have developed a new standard to provide the necessary guidance for businesses to effectively address data privacy and ensure the gap between existing management systems requirements and privacy data legislation is effectively bridged. MANAGING PERSONAL INFORMATION WITH ISO/IEC 27701 GDPR – An overview of legislation The GDPR was adopted by the EU in April 2016 and replaced the EU Data Protection Directive 95/46/EC. This new legislation has initiated obligations to any organisation with data processing responsibilities, and is applicable to organisations outside of the EU too. The penalties for failure to comply can be severe. Fines of up to 4% of annual global turnover or €20million await any organisation which breaches the legislation. Primarily the goal can be perceived as being an EU data privacy harmonisation. As previously mentioned any non-EU entity offering goods or services to individuals located in the EU are also bound by the requirements of the GDPR. Business sectors with sizeable personal data processing requirements are uniquely affected and ensuring conformity to the legislation is paramount. Organisations are required to confirm explicit and unambiguous consent from customers, based on specific purposes for use of their data and for specific periods of time. Individuals have the right to request a copy of all data that is held on them, including an explanation of how such data is used and if third parties have access. Individuals may request for their data profile to be passed to another data processor; furthermore, individuals also have the right to withdraw consent and to request for data that is no longer required to be erased. Data responsible processes or individuals are now required to have appropriate security controls in place to ensure confidentiality of the data they hold or process and have mechanisms in place to measure that effectiveness. Notifications of data breaches must be submitted to the supervisory authority; for the UK this is the Information Commissioners Office (ICO) within 72 hours of recognition of a breach being identified. The ICO is the UK’s independent authority set up to uphold information rights in the public interest, promoting openness by public bodies and data privacy for individuals. Further international data transfer rules from the Data Protection Directive are continued within the GDPR. Personal data can be transferred outside of the EU, but only to countries which are considered to have comparable protection mechanisms. Further guidance can be found through the UK Government Data Protection Act 2018 page.
  • 3. WHAT IS ISO 27701 AND WHY IS IT NEEDED? As previously indicated there has been no guidance on how to effectively implement processes within an organisations existing structure to adhere to GDPR. ISO 27701:2019 is a privacy extension to the international information security management standard, ISO 27001 (ISO 27701 Security techniques – Extension to ISO 27001 and ISO 27002 for privacy information management – Requirements and guidelines). ISO 27701 details the requirements for and gives the required guidance for the establishment, implementation, maintenance and improvement of a Privacy Information Management System (PIMS). The standard is based on the requirements, control objectives and controls of the ISO 27001 standard, and includes a suite of privacy requirements, controls and control objectives. Concepts of information safety are familiar to organisations which already have an operational Information Security Management System (ISMS). The new PIMS will ensure that organisations have comprehensive and universal data governance which directly map to the legislative requirements. Instances of GDPR breaches have been well publicised and have affected organisations with both national and global mandates. A recent Capgemini report outlines that up to 70% of all organisations believe that they are not currently compliant to GDPR requirements. The severity of the penalties which organisations attract through non- compliance has necessitated the creation of this standard. BOLT ON TO ISO 27001 ISO 27701 differs slightly in that the standard requires an existing management system to attach to. Not every clause and control is applicable in all instances. The requirements of the standard are split in to the four groups listed below: 1. PIMS requirements related to ISO 27001 are outlined at clause 5 2. PIMS requirements related to ISO 27002 are outlined at clause 6 3. PIMS guidance for Personally Identifiable Information (PII) Controllers are outlined at clause 7 4. PIMS guidance for PII Processers are outlined at clause 8 Additionally, applicable controls are outlined within Annex constructs to the main body of the standard. The following can be used as a guide for relevance: 1. Annex A lists all applicable controls for PII Controllers. 2. Annex B lists all applicable controls for PII Processors. 3. Annex C maps the provisions of ISO 27701 against ISO 29100. 4. Annex D maps the provisions of ISO 27701 against the GDPR. 5. Annex E maps the provisions of ISO 27701 against ISO 27018 and ISO 29151 6. Annex F provides guidance for applying ISO 27701 to ISO 27001 and ISO 27002. In most circumstances, organisations with existing certification to ISO 27001 should start at Annex F to understand how the application of PIMS fits in to their existing ISO 27001 ISMS. This annex refers to three instances for application of the standard to protection of privacy of PII principals when processing PII: • Application of security standards as is • Additions to security standards • Refinement of security standards The clause areas within PIMS extend the requirements of ISO 27001 to incorporate PII considerations. Clause 5 provides a PIMS-specific guidance set concerning the information security requirements in ISO 27001 appropriate to an organisation which acts as either a PII controller or processor. The sub-clauses outline detailed requirements. This is perhaps the most pertinent area for those with existing ISMS to consider and dwell on requirements.
  • 4. Detailed below are the additional considerations within clause 5 of the ISO 27701 standard which may be observed as extra to existing ISMS requirements: 5.1 The requirements of ISO 27001 must be extended to the protection of privacy as potentially affected by the processing of PII. A glance at Annex F provides a table which gives visual indication of how this will look. 5.2.1 An additional requirement to ISO 27001 clause 4.1 is to outline that an organisation will determine its role as a PII Controller and/or processer. Additionally external and internal factors that are relevant to context and affect the ability to achieve outcomes of its PIMS require indication. This includes any relevant legislation adherence already in place as a consideration within the existing ISMS or contractual requirements which hitherto had been identified in differing clauses or Annex controls within ISO 27001. Where an organisation has both PII controller and PII processor roles identified, separate roles must be determined, each of which will be subject to a separate control set. 5.2.2 A consideration extra to ISO 27001 clause 4.2 is the requirement to include interested parties with responsibilities associated with the processing of PII. This can include customers, which again is not something which may have previously been considered in an ISO 27001 ISMS. Additionally requirements which are relevant to the processing of PII can be determined by legal requirements, contractual obligations or self-identified objectives. 5.2.3 The scope of the ISMS is required by ISO 27001 clause 4.3. Additional PIMS factors for scope include an organisation including processing of PII. PIMS scope determination, therefore, can require a revision of the ISMS because of the extension to interpretation of what constitutes information security in ISO 27701 clause 5.1. 5.2.4 Further to ISO 27001 clause 4.4 an organisation is required within the new standard to establish, implement, maintain and continually improve a PIMS in accordance with the requirements of ISO 27001:2013 Clauses 4 to 10, extended by the requirements in Clause 5. 5.3 Within ISO 27001, organisations are required to demonstrate commitment to the ISMS through leadership initiatives and the creation of policies, roles responsibilities and guidance. Likewise, the PIMS requires a similar input from the top management along with relevant PIMS specific interpretations as indicated at 5.1 to ISO 27701 which covers all mirrored aspects of clause 5 of the ISMS. 5.4.1 The requirements of ISO 27001 to address risks and opportunities require augmentation with the considerations of clause 5.1 in ISO 27701. Furthermore, Information Security risk assessments identified within ISO 27001 are applicable with the following additional requirements: 1. The organisation shall apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity and availability, within the scope of the PIMS. 2. The organisation shall apply privacy risk assessment process to identify risks related to the processing of PII, within the scope of the PIMS. 3. The organisation shall ensure throughout the risk assessment processes that the relationship between information security and PII protection is appropriately managed. This can be an integrated risk assessment process or parallel processes which are controlled separately; this depends entirely on the organisation to determine. Additionally, ISO 27001 clause 6.1.2.d is refined to include an assessment for potential consequences for both the organisation and PII principals that would result if the risks identified during the 6.1.2.c (ISO 27001) were to materialise. Further considerations are given to the Statement of Applicability which would have been generated by the organisation when implementing the ISO 27001 ISMS. As an organisation would have encountered an “opt out and justify” approach to produce the SoA in the first instance, likewise for the PIMS, not all control objectives and controls listed within Annex areas need to be included during PIMS implementation. Justification for exclusion where controls are not deemed necessary can be identified. 5.4.2 Information security objectives from the organisations ISMS from clause 6.2 augmented by the interpretation of ISO 27701 clause 5.1 must be considered. 5.5 Support considerations from ISO 27001 at clause 7 are applicable along with the additional interpretation specified within ISO 27701 clause 5.1. 5.6 Operational consideration from ISO 27001 at clause 8 including risk treatment planning are similarly required by ISO 27701 along with additional information which is identified through addressing clause 5.1 to the latter standard. 5.7/5.8 Similarly; the Monitoring/Measuring Improvement considerations which are live within an existing ISMS require further augmentation from the considerations given to clause 5.1 to ISO 27701. The processes identified above indicated that clause 5.1 to the new standard is a key point to the implementation of a PIMS. The extension to the protection of privacy as potentially affected by the processing of PII is a key element to implementation and guides the consideration given when addressing the further clause areas of ISO 27701. ADDITIONAL CONSIDERATIONS
  • 5. The following table provides a simple overview of the information on the previous page: ISO 27001 Clause ISO 27701 Extension 5.1 5.2 5.3 7.1 7.4 Top Level Commitment for Privacy Policy and integration of PIMS to the ISMS of an organisation including: 1. Resourcing/Establishment of Roles 2. Communication (Internal/External) 3. Anticipated outcome 4. Control and Guidance 5. Continual Improvement of PIMS 6.2 PIMS/Privacy Objectives 7.2 Competency profiles of individuals assigned to privacy requirements 7.3 Awareness of the PIMS policy and how personnel contribute to the establishment and improvement of the system 7.5 Documentation for PIMS with additional considerations on information and documentation non-organic to the organisation. 8.1 PIMS Risk Treatment activation 8.2 PIMS Risk Assessment process 8.3 PIMS Risk Treatment Plan including amendments to existing risk registers 9.1 9.2 9.3 PIMS Performance and analysis of PIMS effectiveness including: 1. Internal Audit 2. Management Review 10 PIMS Continuous Improvement considerations www.nqa.com