Topic-specific policies
ISO/IEC 27701


Search this site
 

ISMS templates

< Previous standard      ^ Up a level ^      Next standard >

 

ISO/IEC 27701:2019 < Click to purchase via Amazon — Information technology — Security techniques — Extension to ISO/IEC 27001 and to ISO/IEC 27002 for privacy information management — Requirements and guidelines

 

Abstract

“ISO/IEC 27701 specifies requirements and provides guidance for establishing, implementing, maintaining and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and 27002 for privacy management within the context of the organization. It specifies PIMSrelated requirements and provides guidance for PII controllers and PII processors. It is applicable to all types and sizes of organizations, including public and private companies, government entities and notfor-profit organizations, which are processing PII within an ISMS.”
[Source: SC27 Standing Document 11 (2021)]
 

Introduction

Although there is substantial overlap between information security and privacy management, both fields are broader and go beyond each other. This standard explains how to ‘enhance’ (adapt and extend) an ISO/IEC 27001 Information Security Management System and the associated ISO/IEC 27002 [or other] controls to manage privacy as well as information security.

 

Scope of the standard

The standard specifies a Privacy Information Management System based on ISO/IEC 27001(ISMS), 27002 (security controls) and 29100 (privacy framework). It is applicable to both controllers and processors of Personally Identifiable Information.

‘27701 builds and depends upon ‘27001: organizations need to have an ISMS certified compliant to ‘27001 in order for their PIMS to be certified compliant to ‘27701.  ‘27701 essentially adds ‘privacy’ to ‘27001’s mentions of information security.

 

Content of the standard

In the style of a sector-specific variant of ISO/IEC 27001, the ~70 page standard elaborates on the PIMS-related differences to the 27001 and 27002 standards clause-by-clause.

For example:

    “ISO/IEC 27001:2013, 6.1.3.c) is refined as follows:

    The controls determined in 6.1.3 b) of ISO/IEC 27001:2013 shall be compared with those in ISO/IEC 27001:2013, Annex A and/or Annex B of this document to verify that no necessary controls have been omitted.

    When assessing the applicability of control objectives and controls from ISO/IEC 27001:2013 Annex A for the treatment of risks, the control objectives and controls shall be considered in the context of both risks to information security as well as risks related to the processing of PII, including risks to PII principals.”

 

Status

The first edition was published in 2019. This standard was originally ISO/IEC 27552 during development but was renumbered.

 

Personal notes

Practitioners familiar with ‘the ISO27k way’ should have little difficulty applying the usual information risk management principles to personal information:

  1. Identify privacy-related risks;
  2. Evaluate them;
  3. Decide how to treat them (what, if anything, to do about them);
  4. Treat them (implement the risk-treatment decisions);
  5. Lather, rinse, repeat.

Thanks to the standard elaborating on the requirements, even others ought to be able to have a jolly good stab at it.

An accompanying accreditation standard guides certification auditors to audit a PIMS and issue meaningful certificates for compliance with ‘27701 - see ISO/IEC TS 27006-2.  Note that, as with ‘27001 ISMS certification, the emphasis is on verifying that the management system fulfills all the mandatory requirements of ‘27701 ... which is subtly different from actually having all the appropriate privacy arrangements in place.  For compliance auditors, the challenge is that ‘appropriate’ is not laid out in ‘27701 but is determined by the organisation itself.

 

 

< Previous standard      ^ Up a level ^      Next standard >

Copyright © 2021 IsecT Ltd.