You are on page 1of 9

IT GOVERNANCE | GREEN PAPER

ISO 27701
Privacy information
management systems

Protect Comply Thrive


IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 2

Introduction While there are already some publications and standards that discuss data protection,
many are not international, primarily focusing on data protection requirements and
good practice in specific jurisdictions. The UK’s BS 10012 draws solely from the
Since the introduction of the EU’s General Data Protection Regulation (GDPR), and GDPR and the UK’s Data Protection Act 2018, for instance, which has limited value
the ongoing growth in comparable data protection laws around the world, there has outside the UK. An approach based on international best practice must be capable
been an increasing need for a standard or code of conduct to support compliance. of adapting to other regimes and not impose requirements that hinge on specific
A small number have arisen, but they lack the international recognition necessary to legislation.
truly act as an effective mark of assurance.
Beyond these local initiatives, there is also ISO 29151, a code of practice for
ISO/IEC 27701 (Security techniques – Extension to ISO/IEC 27001 and ISO/ protecting personally identifiable information (PII). This standard sets out control
IEC 27002 for privacy information management – Requirements and guidelines) objectives, controls and guidelines to protect PII in accordance with an impact and
was published in August 2019 and is one of the most anticipated standards in risk assessment. This is an effective set of guidance, but it does not offer an externally
information security and privacy management. It aims to fill the assurance gap and auditable framework that can offer assurance to third parties. ISO 27701 goes beyond
provide a genuinely international approach to data protection as an extension of this, setting out management system and control requirements.
information security.
While ISO 27701 does not yet have a certification scheme, this is really only a matter
This paper provides information about the Standard so that organisations with of time. Furthermore, there are interim options for asserting compliance, as we discuss
a desire to meet their compliance challenges head-on can take advantage of it. later in this paper.
Organisations examining information security and data protection more broadly can
also see how the new standard’s approach might meet their needs. What about ISO 27001?
Why an ISO/IEC privacy management system? Even though a ‘comprehensive’ information security management system
(ISMS) aligned to ISO/IEC 27001:2013 might already address privacy issues, the
requirements can be met without fully addressing privacy. This means that certificates
The International Organization for Standardization (ISO) and the International
of conformity with ISO 27001 are issued without a guarantee that data protection
Electrotechnical Commission (IEC) are recognised internationally as authorities on
needs have been adequately met. While data protection naturally requires a degree
management systems and best practice. ISO/IEC publications carry a great deal of
of information security (the GDPR addresses these as “technical and organisational
weight, and certification to their management system standards through recognised
measures”), it goes much further than simply protecting the information – the
certification schemes is an extremely effective way of both meeting compliance
organisation must also protect the rights of the data subjects, which cannot be
demands and proving your compliance to customers, business partners and
guaranteed through information security alone.
regulators.
Having a standard that ensures all the relevant privacy issues are factored into a
management system means that the resulting certificate must, by default, cover all
of those relevant aspects. This also means that a certificate of conformity (when a
scheme to provide this is available) gives external stakeholders greater confidence in
your privacy management.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 3

What does this mean for BS 10012? The ISO 27701 approach
BS 10012 is still an effective management system standard, especially for
organisations in the UK, as it takes into account not only the GDPR but also the
A privacy management system is different from an ISMS, but they are closely
UK’s Data Protection Act and guidance from the Information Commissioner’s
related. ISO 27701’s approach recognises that information security (the preservation
Office. This may have limited value for external stakeholders, however, especially
of the confidentiality, integrity and availability of information) is a key aspect of
those outside the UK.
effective privacy management, and that the ISMS requirements documented in ISO
27001 can support adding sector-specific requirements onto the ISMS without the
Despite this, there is a line of thinking that any organisation that requires privacy
need for a new management system specification.
assurance will opt for a BS 10012-type solution on the basis that a full ISO 27001
ISMS is overkill. At IT Governance, we do not subscribe to this view for two key
ISO 27701 defines the extra requirements for an ISMS to cover privacy and the
reasons.
processing of PII. These are supported by additional controls that relate specifically
to data protection and privacy. As a new whole, this creates what the Standard calls
First, we do not see an ISO 27001-conforming ISMS as burdensome. Through
a privacy information management system (PIMS).
our many successful engagements to implement ISO 27001, we have
demonstrated how scalable and flexible it is, and how the most common block is
the implementer’s mindset rather than the requirements of the Standard. The risk
assessment process in particular ensures that security controls are chosen on the
basis of need and suitability, helping the organisation build a cost-effective and
practical ISMS. ISO 27001 requirements ISO 27701 amendments

Second, a BS 10012 personal information management system’s primary concern


is data protection. As such, it is not an ideal framework for developing effective
ISO 27001 controls ISO 27701 control amendments
information security measures. It is also of little use if you want to extend your
information security to all of your organisation’s information, not just personal
data.

ISO 27701 controls


IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 4

The ISO 27701 standard PII principal: ‘data subject’ in the GDPR. ISO 29100 defines this as a “natural person
to whom the personally identifiable information (PII) relates” (Clause 2.11).

ISO 27701 was developed by ISO technical committee SC27 with input from 25 PII controller: ‘data controller’ in the GDPR. ISO 29100 defines this as the “privacy
external bodies, including the European Data Protection Board (EDPB). stakeholder (or privacy stakeholders) that determines the purposes and means for
processing personally identifiable information (PII) other than natural persons who
As already described, the new standard bolts privacy processing requirements onto use data for personal purposes” (Clause 2.10).
an ISMS. Part of this requires that anywhere ISO 27001 says “information security”
you instead read “information security and privacy” in all instances. For example, PII processor: ‘data processor’ in the GDPR. ISO 29100 defines this as the “privacy
where ISO 27001 uses “information security performance”, ISO 27701 requires you stakeholder that processes personally identifiable information (PII) on behalf of and
to read it as “information security and privacy performance”. in accordance with the instructions of a PII controller” (Clause 2.12).

The Standard then goes on to add privacy-specific requirements to some of the Structure of ISO 27701
clauses in ISO 27001 and the controls in Annex A, and adds some privacy-specific
controls over and above the existing information security (and now privacy) controls.
Finally, it offers guidance that builds on that available in ISO 27002 subject to Much like other ISO standards, ISO 27701 divides its content by clause, of which
whether the organisation in question is a data controller and/or data processor. Clauses 5–8 set out the additional requirements and amendments to be applied to
ISO 27001, and warrant particular attention.
ISO 27701 also builds on the principle of information security by directing the reader
to the more expansive privacy principles in ISO/IEC 29100. These cover a wider Clause 5: PIMS-specific requirements
range of privacy concerns, including those espoused in data protection regulations
internationally. This clause addresses every clause in ISO 27001 and identifies where additional
content is necessary. The majority of the ISO 27001 clauses remain unchanged, with
Definitions the caveat that ISO 27701 requires the organisation to recognise its need for data
protection within its context, and this context informs all the other requirements.
ISO 27701 takes some of its key definitions from ISO 29100, which uses terms that
differ from some other sources. It is useful to understand these and how they relate Another notable addition affects the risk assessment, which will need to take into
to your legal and regulatory environment. account the organisation’s role in relation to PII – that is, whether it is a controller or
a processor, and how that might affect the risks to the PII. Another entry recognises
Personally identifiable information (PII): ‘personal data’ in the GDPR. ISO 29100 the existence of the new control sets and allows the organisation to reconcile its
defines this as “information that (a) can be used to identify the PII principal to whom controls against a wider range of controls, including those from ISO 27701.
such information relates, or (b) is or might be directly or indirectly linked to a PII
principal” (Clause 2.9).
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 5

Clause 6: PIMS-specific guidance ISO 27701 certification will not meet the GDPR’s requirements for a certification
scheme. Article 43 of the GDPR requires that any certification scheme be operated
This section provides additional content for the control guidance set out in ISO under an ISO 17065-accredited scheme. ISO 27701, however, will fall under ISO
27002. It establishes a top-level amendment that all references to ‘information 17021-1 and therefore not meet the GDPR’s requirements.
security’ should be taken as including protection of privacy.
There is a good chance that an eventual ISO 17065 scheme will include ISO 27701
Controls with a potentially significant impact on privacy and data protection are certification, but overall it will be more robust and hence more expensive. Those
given extensive extra guidance. This includes subjects such as removable media, organisations that want to demonstrate a degree of assurance without the expense
cryptography and secure development. of an ISO 17065-accredited scheme might opt for ISO 27701 certification as an
economical compromise.

Clause 7: Additional guidance for controllers Whether accredited certification to ISO 27701 alone will suffice for many
organisations and their interested parties will likely be decided by the market and
This clause provides guidance on ISO 27701’s Annex A controls, which are specific regulators. Given the broad acceptance of ISO 27001 as a model for information
to privacy for the purposes of PII controllers. These controls address many of the security, it is likely that many markets will accept ISO 27701 certification as adequate
critical areas of data protection and privacy that are not accounted for by the proof that the organisation has taken appropriate steps to meet its data protection
controls provided in ISO 27001. obligations.

Clause 8: Additional guidance for processors Either way, the options for accredited certification to ISO 27701 will need to evolve
as the current schemes do not accommodate it. In the interim, the closest option
This clause provides guidance on ISO 27701’s Annex B controls, which are specific for accredited certification will be referring to ISO 27701 as a source of controls in
to privacy for the purposes of PII processors. These controls address many of the a Statement of Applicability (SoA) cited in an accredited certification document for
critical areas of data protection and privacy that are not accounted for by the ISO 27001.
controls provided in ISO 27001.
This method is currently used to include sector-specific standards in certifications,
but that is changing: a pending amendment to ISO 27006 (which sets out the
Accredited certification accreditation requirements for certification bodies offering certification to ISO
27001) states that this reference can only relate to the source of controls detailed
Article 42 of the GDPR addresses certification schemes, stating that member states, in the SoA; it should not imply conformity to a set of management system
supervisory authorities, the EDPB and the European Commission should encourage requirements.
schemes that demonstrate compliance with the Regulation.
Regardless of the outcome, it is only a matter of time until there is some method
for organisations to demonstrate conformity with ISO 27701. It is likely to become
a popular approach to managing data protection and privacy and demonstrating
that to others, even if certification to the Standard is not formally adopted as a
certification mechanism under the GDPR.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 6

Other papers you may be interested in

Conducting a Data Flow Mapping Exercise Under the GDPR General Data Protection Regulation – A compliance guide

IT GOVERNANCE | GREEN PAPER

EU General Data
Protection Regulation

A compliance guide

Protect Comply Thrive

Useful data protection and privacy resources

IT Governance offers a unique range of data protection and privacy products and services, including books, standards, pocket guides, training courses and professional
consultancy services. We have highlighted a selection on the next page.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 7

Standards Books Toolkits

INTERNATIONAL STANDARD
ISO 27001 Toolkit

ISO/IEC 27701:2019
Accelerate your ISO 27001 project with
Security techniques — Extension to this bestselling toolkit, which includes
ISO/IEC 27001 and ISO 27002 for
privacy information management —
Requirements and guidelines customisable and fully ISO 27001-compliant
documentation templates, dashboards
and gap analysis tools, and direction
and guidance from expert ISO 27001
practitioners.
ISO/IEC ISO/IEC 27001:2013 – EU GDPR – A
27701:2019 ISMS Requirements pocket guide

ISO 27701 provides ISO 27001 provides the This essential guide
guidelines for specification of a best- is the ideal resource GDPR Toolkit
implementing, practice ISMS, which your for anyone wanting
maintaining and organisation can implement a clear primer on the This Toolkit was developed by expert
continually improving to improve the state of its principles of data practitioners and contains more than 80
a PIMS. information security. protection and their EU General Data Protection indispensable policies, procedures, forms,
Regulation (GDPR)

obligations under the Documentation Toolkit schedules and guidance documents to help
GDPR. you achieve and demonstrate compliance
with the Regulation.

Training

ISO 27001 Certified ISMS Certified ISO 27001 ISMS Lead Implementer Live
Foundation Training Course Online Training course
Classroom

ACCREDITED
This fully accredited, practitioner-led course equips you to
CIS F Learn from the experts about ISO 27001 best
lead an ISO/IEC 27001 ISMS implementation project. Win
practice and find out how to achieve compliance
new business by securing your organisation’s information
ISO 17024:2012 certificated

ISO 27001
Certified ISMS with the Standard. This course is led by practitioners
Foundation Training Course assets and reducing data security risks with real-world
offering real-world expertise and insights.
expertise and practical insights.
IT GOVERNANCE GREEN PAPER | SEPTEMBER 2019 8

IT Governance solutions Training

We offer training courses from staff awareness and foundation courses, through
IT Governance writes and publishes extensively on GDPR, data privacy and cyber to advanced programmes for IT practitioners and certified lead implementers and
security, and has developed a range of tools for IT governance, information security auditors.
and regulatory compliance practitioners.
Our training team organises and runs in-house and public training courses all year
IT Governance is your one-stop shop for corporate and IT governance information, round, as well as Live Online and distance-learning courses, covering a growing
books, tools, software, training and consultancy. Our products and services are number of IT GRC topics.
designed to work harmoniously together so you can benefit from them individually
or use different elements to build something bigger and better. Visit www.itgovernance.eu/training or more information.

Books Consultancy

We sell sought-after publications covering all areas of data privacy and cyber risk We are an acknowledged world leader in our field. Our experienced consultants,
management. Our publishing team also manages a growing collection of titles that with multi-sector and multi-standard knowledge and experience, can help you
provide practical advice for staff taking part in IT governance projects, suitable for accelerate your IT GRC projects.
all levels of knowledge, responsibility and experience.
Visit www.itgovernance.eu/consulting for more information.
Visit www.itgovernance.eu/shop/category/itgp-books to view our full catalogue.
Software
Toolkits
Our industry-leading software tools, developed with your needs and requirements in
Our unique documentation toolkits are designed to help organisations adapt quickly mind, make information security risk management straightforward and affordable for
and adopt best practice using customisable template policies, procedures, forms all, enabling organisations worldwide to be ISO 27001-compliant.
and records.
Visit www.itgovernance.eu/software for more information.
Visit www.itgovernance.eu/documentation-toolkits to view and trial our toolkits.
Protect • Comply • Thrive

Europe
IT Governance Europe Ltd, Third Floor t: 00 800 48 484 484
The Boyne Tower Bull Ring, Lagvooren, e: servicecentre@itgovernance.eu
Drogheda, Co. Louth, A92 F682, Ireland w: www.itgovernance.eu

@ITGovernanceEU /it-governance-europe-ltd /ITGovernanceEU

UK USA
IT Governance Ltd, Unit 3, Clive Court, IT Governance USA Inc.
Bartholomew’s Walk, Cambridgeshire Business Park, 420 Lexington Avenue, Suite 300
Ely, CB7 4EA, United Kingdom New York, NY 10170, USA

t: +44 (0)333 800 7000 t: +1 877 317 3454


e: servicecentre@itgovernance.co.uk e: servicecenter@itgovernanceusa.com
w: www.itgovernance.co.uk w: www.itgovernanceusa.com

@ITGovernance
@ITG_USA
/it-governance
/it-governance-usa-inc

/ITGovernanceLtd /ITGovernanceUSA

© 2003–2019 IT Governance Ltd | Acknowledgement of Copyrights | IT Governance Trademark Ownership Notification

You might also like