ISO 27701 Implementation Guide
ISO 27701 Implementation Guide
ISO 27701 Implementation Guide
Implementation Guide
Contents
1 Toolkit support ............................................................................................................. 4
1.1 Email support ................................................................................................................... 4
1.2 Toolkit updates ................................................................................................................ 4
1.3 Review of completed documents ..................................................................................... 4
1.4 Exclusive access to customer discussion group ................................................................ 4
2 Introduction .................................................................................................................. 5
3 The ISO/IEC 27701 Standard ......................................................................................... 6
4 The CertiKit ISO27701 Toolkit ....................................................................................... 9
4.1 How the documents work ................................................................................................ 9
4.2 Last words before you begin .......................................................................................... 10
4.3 Where to start................................................................................................................ 10
4.4 A suggested project plan ................................................................................................ 12
4.5 How the rest of the guide is structured .......................................................................... 13
5 Implementing the ISO/IEC 27701 Standard ................................................................ 14
5.1 Section 0: Introduction................................................................................................... 14
5.2 Section 1: Scope ............................................................................................................. 14
5.3 Section 2: Normative references .................................................................................... 14
5.4 Section 3: Terms and definitions .................................................................................... 14
5.5 Section 4: General .......................................................................................................... 15
5.6 Section 5: PIMS-specific requirements related to ISO/IEC 27001 ................................... 17
5.7 Section 6: PIMS-specific guidance related to ISO/IEC 27002 .......................................... 19
5.8 Section 7: Additional ISO/IEC 27002 guidance for PII controllers ................................... 21
5.9 Section 8: Additional ISO/IEC 27002 guidance for PII processors ................................... 22
5.10 Annex A: PIMS-specific reference control objectives and controls (PII Controllers) ....... 22
5.10.1 A.72 Conditions for collection and processing...................................................................... 22
5.10.2 A.73 Obligations to PII principals ......................................................................................... 23
5.10.3 A.74 Privacy by design and privacy by default ...................................................................... 24
5.10.4 A.75 PII sharing, transfer and disclosure .............................................................................. 24
5.11 Annex B: PIMS-specific reference control objectives and controls (PII Processors) ........ 25
5.11.1 B.82 Conditions for collection and processing ...................................................................... 25
5.11.2 B.83 Obligations to PII principals ......................................................................................... 25
5.11.3 B.84 Privacy by design and privacy by default ...................................................................... 26
5.11.4 B.85 PII sharing, transfer and disclosure .............................................................................. 26
6 Advice for the audit .................................................................................................... 27
6.1 Choosing an auditor ....................................................................................................... 27
6.1.1 Self-certification ...................................................................................................................... 27
6.1.2 Third-party certification ........................................................................................................... 27
www.certikit.com Page 2 of 33
ISO/IEC 27701 Implementation Guide
Tables
Table 1: Additional guidance for ISO27001 Annex A controls ......................................................... 21
www.certikit.com Page 3 of 33
ISO/IEC 27701 Implementation Guide
1 Toolkit support
The CertiKit ISO/IEC 27701 toolkit includes 75+ templates and guides to allow your
organization to align to the requirements of the standard and comes with the following
support.
www.certikit.com Page 4 of 33
ISO/IEC 27701 Implementation Guide
2 Introduction
This concise guide takes you through the process of implementing the ISO/IEC 27701
international standard for privacy information management using the CertiKit ISO/IEC 27701
Toolkit. It provides a recommended route to certification against the standard starting from
a position where the organization has already implemented (and possibly become certified
to) the ISO/IEC 27001 information security standard. Indeed, certification to ISO/IEC 27701
is not an option on its own – ISO/IEC 27001 is a necessary prerequisite to ISO/IEC 27701.
This point will become increasingly clear as we go through the ISO/IEC 27701 standard and
begin to understand its structure.
Of course, every organization is different and there are many valid ways to embed the
disciplines of information privacy. The best way for you may well depend upon factors
including:
View this guide simply as a pointer to where you could start and a broad indication of the
order you could do things in. There is no single “right way” to implement information
privacy; the important thing is that you end up with a Privacy Information Management
System (PIMS) that is relevant and appropriate for your specific organization’s needs.
www.certikit.com Page 5 of 33
ISO/IEC 27701 Implementation Guide
There are many other documents published within the ISO/IEC 27000 series and they
provide useful supporting (and in some cases essential) information for organizations going
for ISO/IEC 27701 certification (or simply using it for guidance). Some of the common ones
are:
It’s worth pointing out that, although useful, none of these are required reading for
certification to the ISO/IEC 27701 standard (except perhaps ISO/IEC 27001) so if you are
limited in time and budget, just a copy of ISO/IEC 27701 itself will suffice (although if you
haven’t purchased the standard yet, we would recommend you look at our ISO27701
Enhanced Gap Assessment Tool as an alternative as it includes all of the requirements in the
standard but in a more useful format).
www.certikit.com Page 6 of 33
ISO/IEC 27701 Implementation Guide
There’s no obligation to go for certification to ISO/IEC 27701 and many organizations choose
to simply use the standard as a set of good practice principles to guide them along the way
to managing their information privacy risks and achieving compliance with relevant privacy
legislation, such as the GDPR (General Data Protection Regulation).
Requirements are often referred to as the “shalls” of the standard because that is the word
usually used by ISO to show that what is being stated is compulsory if an organization is to
be compliant (see section 2.5 below for more on this within ISO27701). The (internal and
external) auditing process is basically an exercise to check whether all the requirements are
being met by the organization. Requirements are not optional and, if they are not being
met, then a “nonconformity” will be raised by the auditor and the organization will need to
address it to gain or keep their certification to the standard (see the section on auditing
later in this guide).
In order to show that the requirements are being met the auditor will need to see some
evidence. This can take many forms and until recently was defined as a combination of
“documents” (evidence of intention such as policies, processes and procedures) and
“records” (evidence that something has been done). Since the introduction of the High-Level
Structure for ISO standards the term “documented information” is generally used instead to
cover anything that is recorded (the official ISO definition is “information required to be
controlled and maintained by an organization and the medium on which it is contained”).
But the point is you need to have something to show the auditor.
This is often a major culture change in many organizations. Just doing something is no
longer enough; you must be able to prove that you did something. This means keeping
records in areas you maybe don’t keep records now; a good example often being meeting
minutes. Meetings happen, things are discussed and decisions are made, but the auditor
won’t just accept your word for it. The auditor will want to see the minutes. Other examples
could be training records – who was trained to do what and when? Privacy impact
assessments – what was assessed, by whom, when and what was the outcome?
If all of this sounds rather onerous, then it’s true, it can mean more work at least in the
short term. But doing information privacy according to the ISO/IEC 27701 standard is about
doing it right. You will be taking advantage of the knowledge of a wide variety of
experienced people who have come together to define the best way to create a PIMS that
works; people from all over the world in a wide variety of industries and organizations large
and small.
From our experience what often happens during the process of implementing an
international standard such as ISO/IEC 27701 is that initially you will put things in place
because the standard says you should. Some of the requirements may seem unnecessary or
over the top. But gradually you will start to see why they are included and the difference it
makes to your organization. After a period, you will begin to implement procedures and
methods that go further than the requirements of the standard because you can see that
www.certikit.com Page 7 of 33
ISO/IEC 27701 Implementation Guide
they would be useful and will provide better protection for your organization. You’ll start to
see that it’s about becoming more proactive in everything you do and in the long term this
reduces the amount of reactive activities necessary. In simple terms, you’ll start to “get it”
(but be patient, it can take a while!).
But in the meantime, you’ll need to create some of that “documented information”. And
that’s where the CertiKit ISO/IEC 27701 Toolkit comes in….
www.certikit.com Page 8 of 33
ISO/IEC 27701 Implementation Guide
To open and edit the documents you will need to use the relevant Microsoft application at
version 2010 or later. For the Microsoft Project file, we have provided the same content in
an Excel spreadsheet also, for people who do not use Microsoft Project.
Each document starts with an “Implementation Guidance” section which describes its
purpose, the specific clauses of the standard it is relevant to, general guidance about
completing and reviewing it and some legal wording about licensing etc. Once read, this
section, together with the CertiKit cover page, may be removed from the final version of the
document.
The layout and headings of each document have been designed to guide you carefully
towards meeting the requirements of the standard and example content has been provided
to illustrate the type of information that should be given in the relevant place. This content
is based upon an understanding of what a “typical” organization might want to say but it is
very likely that your organization will vary from this profile in some ways, so you will need to
think carefully about what content to keep and what to change. The key to using the Toolkit
successfully is to review and update each document in the context of your specific
organization. Do not accept the contents without reading them and thinking about whether
they meet your needs – does the document say what you want it to say, or do you need to
change various aspects to make it match the way you do things? This is particularly relevant
for policies and procedures where there is no “right” answer. The function of the document
content is help you to assess what’s right for you so use due care when considering it.
Where the content is very likely to need to be amended, we have highlighted these sections
but please be aware that other non-highlighted sections may also make sense for you to
update for your organization.
www.certikit.com Page 9 of 33
ISO/IEC 27701 Implementation Guide
As we have said earlier, regard this guide as helpful advice rather than as a detailed set of
instructions to be followed without thought; every organization is different, and the idea of
the Toolkit is that it moulds itself over time to fit your specific needs and priorities.
We also appreciate that you may be limited for time and so we have kept the guidance short
and to the point, covering only what we think you might need to know to achieve
compliance. There are many great books available about information privacy generally and
we recommend that, if you have time, you invest in a few and supplement your knowledge
as much as possible.
But perhaps our single most important piece of advice would be to read the ISO27701
standard itself. There is really no replacement for going straight to the source document if
you want to understand what it’s all about. So, by all means, listen to what other people tell
you about it, but try to take some time out to go to a coffee shop or somewhere equally
comfortable, and read the thing from beginning to end (or at the very least, the relevant
clauses). We believe you will not regret it. Enough said.
The first questions top management are likely to ask about a proposal to become certified
to the ISO/IEC 27701 standard are probably:
www.certikit.com Page 10 of 33
ISO/IEC 27701 Implementation Guide
In order to help answer these questions the CertiKit ISO27701 Toolkit provides certain
resources.
The ISO27701 Gap Assessment Tool is an Excel workbook that breaks down the sections of
the ISO/IEC 27701 standard and provides a way of quantifying to what extent your
organization currently meets the requirements contained within them. By performing this
gap assessment, you will gain a better appreciation of how much work may be involved in
getting to a point where a certification audit is possible. The tool includes a variety of tables
and charts showing an analysis of where your organization meets the standard – and where
work must still be carried out.
However, if you would prefer to have all of the exact requirements of the standard laid out
for you without needing to refer to a copy of the standard document then we provide a
further tool which is a chargeable extra to the Toolkit and available via the CertiKit website.
We can provide this because we have a licensing agreement with the ISO, via BSI, to include
the full contents of the requirements of the standard (for which CertiKit pays a license fee).
The ISO27701 Enhanced Gap Assessment Tool goes several steps further than the default
gap assessment by breaking down the text of the ISO/IEC 27701 standard itself into
individual requirements (with the full text of each requirement) and providing a more
detailed analysis of your conformance. It can also be used to allocate actions against
individual requirements.
The key to making the gap assessment as accurate as possible is to get the right people
involved so that you have a full understanding of what is already in place. The gap
assessment will provide hard figures on how compliant you currently are by area of the
standard and will even show you the position on radar and bar charts to share with top
management.
It’s a good idea to repeat the exercise on a regular basis during your implementation project
in order to assess your level of progress from the original starting point.
The accompanying workbook ISO27701 Assessment Evidence allows you to start to build a
picture of what evidence (including toolkit documents, your own existing documents and
your records) may be appropriate to show conformity. This may help when deciding
whether a requirement is met or not. This can be used in conjunction with the CERTIKIT
ISO27701 Toolkit Index which gives a detailed breakdown of how the documents in the
toolkit map onto the requirements sections of the standard.
Having gained an accurate view of where you are against the standard now, you are then
armed with the relevant information to assess how much effort and time will be required to
achieve certification. This may be used as part of a presentation to top management about
the proposal and a template Privacy Introduction Presentation is provided in the Toolkit for
www.certikit.com Page 11 of 33
ISO/IEC 27701 Implementation Guide
this purpose. Note that budgetary proposals should include the costs of running the PIMS on
an ongoing basis as well as the costs of putting it in place.
As part of your business case, you may also need to obtain costs from one or more external
auditing bodies for a Stage One and Stage Two review and ongoing surveillance audits (see
later section about external auditing).
Having secured top management commitment, you will now need to plan the
implementation of your PIMS. Even if you’re not using a formal project management
method such as PRINCE2® we would still recommend that you do the essentials of defining,
planning and tracking the implementation effort as a specific project.
We have provided a template ISO27701 Project Initiation Document (or PID) which prompts
you to define what you’re trying to achieve, who is involved, timescales, budget, progress
reporting etc. so that everyone is clear from the outset about the scope and management of
the project. This is also useful towards the end of the project when you come to review
whether the project was a success.
Having written the PID, try to ensure it is formally signed off by top management and that
copies of it are made available to everyone involved in the project so that a common
understanding exists in all areas.
The CertiKit ISO27701 Toolkit provides a Microsoft Project® plan as a starting point for your
project (reproduced in Excel for non-Project users). This is fairly high level as the detail will
be specific to your organization, but it gives a good indication as to the rough order that the
project should be approached in.
The main steps along the way to certification are described in more detail later in this guide
and there are some parts that need to be done in a certain order otherwise the right
information won’t be available in later steps.
Once a project manager has been appointed and the project planned and started, it’s a good
idea to keep an eye on the gap assessment you carried out earlier and update it as you
continue your journey towards certification. This updated measurement of your closeness
www.certikit.com Page 12 of 33
ISO/IEC 27701 Implementation Guide
to complete conformity with the standard can be included as part of your regular progress
reports and the CertiKit ISO27701 Toolkit includes a template for these.
The timing of when to go for certification really depends upon your degree of urgency (for
example you may need evidence of certification for a commercial bid or tender) and how
ready you believe the organization to be. Certainly, you will need to be able to show that all
areas of the PIMS have been subject to internal audit before asking your external auditing
body to carry out the stage two (certification) assessment. But you don’t need to wait until
you’re “perfect”, particularly as the certification audit will almost certainly throw up things
you hadn’t thought of or hadn’t previously regarded as important. The Certification
Readiness Checklist provides a simple way to check whether the main components are in
place when considering certification.
As we’ve said earlier, regard this guide as helpful advice rather than as a detailed set of
instructions to be followed without thought; every organization is different, and the idea of
a PIMS is that it moulds itself over time to fit your specific needs and priorities.
We also appreciate that you may be limited for time and so we have kept the guidance short
and to the point, covering only what you need to know to achieve conformity and hopefully
certification. There are many great books available about information privacy and we
recommend that, if you have time, you invest in a few and supplement your knowledge as
much as possible.
www.certikit.com Page 13 of 33
ISO/IEC 27701 Implementation Guide
www.certikit.com Page 14 of 33
ISO/IEC 27701 Implementation Guide
The organization shall determine its role as a PII controller (including as a joint PII controller)
and/or a PII processor.
And:
The organization shall identify and document the specific purposes for which the PII will be
processed.
Are both requirements. The first relates to the management system and the second is a
control. If these requirements have not been met, a nonconformity may be raised during an
audit.
However,
The organization should ensure that the use of mobile devices does not lead to a
compromise of PII.
And:
Roles and responsibilities for the processing of PII should be determined in a transparent
manner.
Are both guidance and so are recommended, but still optional, and a nonconformity can’t
be raised against them at an audit (although an observation might be made perhaps).
Note: CertiKit has had this interpretation confirmed by the British Standards Institute (BSI).
Other words may be used in an ISO standard and their accepted meaning is as follows:
Let’s take each of the clauses of the ISO/IEC 27701 standard and look at what it covers and
whether it contains requirements (which are audited) or guidance (which is not audited).
www.certikit.com Page 15 of 33
ISO/IEC 27701 Implementation Guide
Clause 5 describes how the ISO/IEC 27001 management system must be adapted to cater
for privacy as well as information security. These are requirements. Note that there are in
fact only two parts of the management system that require specific adaption – context and
planning, although there is also a need to look at all areas to include privacy considerations
within them.
Clause 6 provides additional privacy-related guidance for the controls set out in Annex A of
the ISO/IEC 27001 standard, and which are more fully described in the accompanying code
of practice, ISO/IEC 27002. These are recommended enhancements to the control set and
may be considered to be guidance.
Clause 7 sets out guidance for the additional controls for controllers which are listed in
Annex A of ISO/IEC 27701. These controls are over and above those from Annex A of ISO/IEC
27001. However, this is guidance only.
Clause 8 explains similar guidance for the additional controls for processors. Again, this is
guidance, not requirements.
Annex A contains a table setting out the additional controls for PII controllers. These
controls may or may not be applicable in the same way as the controls in Annex A of ISO/IEC
27001 may or may not be applicable (and as detailed in the Statement of Applicability for
ISO/IEC 27001). Where applicable, these controls may be considered as requirements. The
guidance for these is contained in Clause 7 above.
Annex B contains a table setting out the additional controls for PII processors. Again, their
applicability needs to be determined and documented as they may not all apply. Where
applicable, these controls may be considered as requirements. The guidance for these is
contained in Clause 8 above.
The main point to repeat at this time is that certification to an ISO standard is all about
requirements and controls. The guidance does not form part of these requirements and is
not audited against. So, if your organization is looking to become certified to ISO/IEC 27701
(having already been certified to ISO/IEC 27001) then the areas to focus on are:
• Clause 5
• Annex A
• Annex B
... because these contain the requirements and the controls. Clauses 6, 7 and 8 give
guidance in the same way as ISO/IEC 27002 gives guidance for ISO/IEC 27001. To be clear,
for information security an organization becomes certified to ISO/IEC 27001 because that
contains the requirements. An organization does not become certified to ISO/IEC 27002
because that only has guidance. It’s the same for ISO/IEC 27701; stick to the requirements
and controls parts when preparing for certification and don’t feel that you must do
everything that is stated in the guidance sections (although if it’s appropriate and you can,
then by all means go for it).
www.certikit.com Page 16 of 33
ISO/IEC 27701 Implementation Guide
Annexes C, D and E provide a cross-reference of ISO/IEC 27701 onto ISO/IEC 29100 (privacy
framework), the GDPR (the EU General Data Protection Regulation) and the two standards
ISO/IEC 27018 (protection of PII in the cloud) and ISO/IEC 29151 (code of practice for PII
protection).
Annex F gives a little more detail about how the current wording in ISO/IEC 27001 should be
adapted to refer to privacy also.
Lastly in this section, the standard tries to clarify what is meant by the term “customer” in
varying scenarios.
www.certikit.com Page 17 of 33
ISO/IEC 27701 Implementation Guide
in addition to information security ones. The main areas in which these amendments may
result in additional content within your existing ISMS documentation are the following:
www.certikit.com Page 18 of 33
ISO/IEC 27701 Implementation Guide
refer to the CertiKit ISO27001 Toolkit, but if that toolkit has not been used to create the
existing ISMS, then they should also provide enough information to decide where in your
current documentation set the additional information should be placed.
• None
This clause in the ISO/IEC 27701 standard provides PIMS-specific implementation guidance
for a total of thirty-two of the 114 controls set out in ISO/IEC 27002 code of practice, which
are of course the same controls that are listed in Annex A of the ISO/IEC 27001
requirements standard. Remember that these thirty-two items are guidance, not
requirements, so a nonconformity should not be raised at audit if your organization doesn’t
have them in place within your PIMS. Treat this additional guidance in the same way as you
treated the guidance in ISO/IEC 27002 during your project to implement the requirements
of the ISO/IEC 27001 standard. From experience, it’s fair to say that some organizations try
to follow such guidance very carefully, whereas others make no reference at all to the
content of ISO/IEC 27002 (but still become successfully certified to ISO/IEC 27001
nonetheless). This guidance exists to aid your interpretation of the Annex A controls within
ISO/IEC 27001 and provide a fuller explanation of what they could mean in differing
circumstances. The ISO/IEC 27001 Annex A reference controls for which additional guidance
is provided in ISO/IEC 27701 are shown in Table 1 (note that the references used in this
table are from ISO/IEC 27001 Annex A, not the ISO/IEC 27701 standard).
A.5 Information security A.5.1.1 Policies for Policy commitment to terms of legislation and
policies information security contracts with regard to PII.
A.6 Organization of A.6.1.1 Information security Appoint a data protection officer, or similar.
information security roles and responsibilities
A.6.2.1 Mobile device policy Be careful with PII on mobile devices.
A.7 Human resource A.7.2.2 Information security Make employees aware of the consequences
security awareness, education of PII breaches.
and training
A.8 Asset management A.8.2.1 Classification of Explicitly consider PII as part of the
information classification scheme.
A.8.2.2 Labelling of Ensure everyone can recognize PII.
information
www.certikit.com Page 19 of 33
ISO/IEC 27701 Implementation Guide
www.certikit.com Page 20 of 33
ISO/IEC 27701 Implementation Guide
A.16 Information security A.16.1.1 Responsibilities and Make sure that PII breach management and
incident management procedures notification obligations are met.
A.16.1.5 Response to Ensure that PII breach investigation, recording,
information security reporting and notification obligations are met.
incidents The interface between processor and
controller should also be addressed.
A.18 Compliance A.18.1.1 Identification of Identify potential legal sanctions with regard
applicable legislation and to PII processing.
contractual requirements
A.18.1.3 Protection of Retain previous versions of policies such as
records privacy policy when they are updated.
A.18.2.1 Independent Processors should provide customers with
review of information evidence of independent audit where
security appropriate.
A.18.2.3 Technical Include PII considerations when undertaking
compliance review technical reviews.
An auditor might reasonably expect much of this guidance to be in place already as part of
the established ISMS, as PII is but a subset of the information processed within the
organization. However, there are certainly specific areas that are new from ISO/IEC 27701,
such as the appointment of a data protection officer, privacy by design and by default, and
the notification obligations associated with legislation covering PII.
• None
This clause of the ISO/IEC 27701 standard provides more information about the additional
controls for PII controllers that are laid out in Annex A of the same standard (not to be
confused with Annex A of the ISO/IEC 27001 standard). The same comments apply as
before, in that this is guidance and not requirements, so the clause should be read as helpful
expansion of the specific controls in Annex A. The guidance is lengthy, so we don’t cover it in
any detail here; suffice to say that if you don’t understand a control in Annex A then look
here for more help.
www.certikit.com Page 21 of 33
ISO/IEC 27701 Implementation Guide
• None
This clause fulfils the same purpose as Clause 7, but for the controls for PII processors set
out in Annex B of the ISO/IEC 27701 standard. Just to be extra clear, this is also guidance.
www.certikit.com Page 22 of 33
ISO/IEC 27701 Implementation Guide
• Letter to Processors
• Privacy Impact Assessment Process
• Privacy Impact Assessment Report
• Records of Processing Activities
• PII Analysis Form
• PIA Questionnaire
• PII - Initial Questionnaire
• Legitimate Interest Assessment
• Consent Request Form
• Contract Review Tool
• PII Processor Assessment
• Privacy Impact Assessment Tool
The eight controls in this area deal with how and why the PII is collected, including the
lawful basis that is used under the relevant legislation that applies to it. If that basis is
consent, then the methods used to signify consent and the records of it having been given
are covered. The need to conduct a privacy impact assessment (also commonly referred to
as a data protection impact assessment) for new and changed processing is set out.
Relationships with PII processors and those situations where a joint controller situation
applies must be defined, including in contractual terms where appropriate. Lastly, the
keeping of records of processing required to meet the applicable legislation is prescribed.
This is a significant set of controls covering the provision of clear privacy information to PII
principals and how their rights under applicable data protection legislation will be exercised.
These rights are embodied in laws such as the GDPR and typically consist of the right to:
www.certikit.com Page 23 of 33
ISO/IEC 27701 Implementation Guide
This set of nine controls deals with methods surrounding the design of processes and
systems so that privacy is considered from the outset, and as a key part of the way they
work. These are related to the basic principles of much of the relevant legislation, which
requires that:
The smallest of the control groups in Annex A, this set of four controls covers the
requirement to ensure that transfers of PII between countries are covered by a relevant
justification, such as an EU adequacy decision (in the case of the GDPR) or appropriate
standard contractual clauses. It also requires that a list is maintained of the countries to
which PII may be transferred by the organization, and records of such transfers. Account
must be taken of the potential need to liaise with these third parties in the fulfilment of
requests from PII principals to exercise their rights over their data. Lastly, records must be
kept of disclosures of PII to third parties such as law enforcement organizations.
www.certikit.com Page 24 of 33
ISO/IEC 27701 Implementation Guide
The six controls in this section are mainly concerned with the contractual nature of the
relationship between the PII controller and the processor. The contract must cover how the
processor will help the controller to fulfil its relevant privacy obligations, and the purpose of
the processing stated in the contract must be the only form of processing that is undertaken
with that data. Using the data for marketing purposes is generally not allowed unless it is
confirmed that the consent of the PII principal has been obtained. A further control
encourages the processor to keep an eye on the legality of the processing it is being asked
to do, and to let the controller know if there may be a problem. Good communication is also
prescribed so that the controller has all the information it needs from the processor to be
able to show that it is staying compliant. Lastly, the processor must keep appropriate
records of the processing it carries out on behalf of the controller.
• None
www.certikit.com Page 25 of 33
ISO/IEC 27701 Implementation Guide
The single control in this section states that the processor must help the controller to meet
its obligations to PII principals, consisting mainly of their rights under relevant legislation,
including access, erasure and objection to processing.
www.certikit.com Page 26 of 33
ISO/IEC 27701 Implementation Guide
There are many companies that offer certification audits and your choice will obviously
depend upon a variety of factors including where in the world you are based. However,
there are a few general things you need to be aware of before you sign up with any auditor.
6.1.1 Self-certification
The first is to emphasize the fact that ISO standards are not legal documents; the creation,
maintenance and adoption of ISO standards is a voluntary exercise that is co-ordinated by
the ISO. Yes, ISO owns the copyright and sells standards for cash both directly and through
third parties but be assured that you (probably) won’t be breaking any laws if you don’t
quite implement a standard in full. And the same goes for declaring compliance with ISO
standards. You have a choice.
You could simply tell everyone you deal with that you meet the requirements of an ISO
standard. That’s it – no audit fees or uncomfortable visits from people in suits. Just say that
you comply. The trouble with this is that if everyone did it, there would be no way of telling
the difference between good organizations that really had done it properly and less
conscientious ones that just paid the standard lip service. It only takes a few bad apples to
spoil it for everybody. The people that matter to you (e.g. your customers or regulators)
may simply not believe you.
What’s needed is another organization that is trusted to check the auditors and make sure
that they are doing a good job. But how do we know they can be trusted? And so on. What
we end up with is a chain of trust like the way that Public Key Infrastructure (to use an
www.certikit.com Page 27 of 33
ISO/IEC 27701 Implementation Guide
information security analogy) works. At this point we need to introduce you to a few
important definitions:
Certification: This is what happens when you are audited against a standard and you
(hopefully) end up with a certificate to put on the wall (as in “we are certified to ISO/IEC
27701”).
RCB: A Registered Certification Body is basically an auditing company that has been
accredited to carry out certification audits and issue a certificate to say you are compliant
with a standard. Some operate in a single country and some in a lot of countries. This is
what you, as an organization wanting to become certified, need to choose.
Accreditation: This is what the auditors go through to become an RCB and allow them to
carry out certification audits.
OK, now we’ve got those definitions out of the way we need to talk about who does the
accrediting. There are basically two levels, international and national.
IAF: Based in Quebec, Canada, the International Accreditation Forum is the worldwide body
that represents the highest level of trust concerning accreditation of RCBs. They have lots of
strict rules that national accreditation bodies must agree to, embodied in a charter and a
code of conduct. All the national accreditation bodies are members of the IAF.
ANAB: As if there weren’t enough acronyms in the world, here we have an acronym within
an acronym. ANAB stands for the ANSI-ASQ National Accreditation Board. ANSI is the
American National Standards Institute and deals with standards in the USA. ASQ is the
American Society for Quality and although based in the USA, has a more international reach
than ANSI. Put them together and you get ANAB which is the national accreditation body for
the USA and therefore a member of the IAF.
UKAS: The United Kingdom Accreditation Service is the body in the United Kingdom that
accredits RCBs. It is effectively the UK representative of the IAF.
JAS-ANZ: The Joint Accreditation Service of Australia and New Zealand is the IAF member
for these countries.
DAC: The Dubai Accreditation Department is a government department that accredits RCBs
within the United Arab Emirates.
Other IAF Members: There are over 60 other members of the IAF which provide
accreditation services for their respective countries and a full list can be found on the IAF
website so when you have a moment why not look up the member organization for your
country.
The core message here is that whichever RCB you choose to carry out your certification
audit, make sure they are accredited by the IAF member for your country. For the UK that
means UKAS-accredited, the USA ANAB-accredited and so on. Most auditing companies
display the logo of the organization that they are accredited by prominently on their
website so it should be easy to tell.
www.certikit.com Page 28 of 33
ISO/IEC 27701 Implementation Guide
Which standards do they audit? Check the RCB has the capability to audit the standard you
are going for and, if so, how many customers they have for that standard. How long have
they been auditing the standard and how many qualified people do they have?
Do they cover the geographical areas you need? There’s no point in considering an RCB
that can’t cover the geographical area(s) you need. This is particularly relevant if you need
to have more than one office audited, possibly in different countries. They may cover one
country but not another. It’s worth checking whether they feel an onsite visit is needed to
all the offices in scope before you dismiss them.
How long will it take? Officially there is a formula that should be used when calculating how
many days an audit should take. This considers variables such as number of locations and
employees and which standards are involved. However, there is some flexibility in how the
formula is applied so you may get differing estimates from RCBs on how many days will be
needed, which will obviously affect the cost.
How much will it cost? This follows on from the question about time as most RCBs charge
by the hour or day, but rates can vary significantly so a longer audit could be cheaper.
Consider the ongoing certification fees as well as the cost for the stage one and stage two
audits.
What is their availability? Auditors are generally busy people so if you’re in a hurry to get
your organization certified then their availability will be an important factor. How soon can
they do a stage one and when can they come back for the stage two?
What is their reputation? Even amongst accredited RCBs, there are more and less well-
known names. Since a lot of the reason for going for certification is to gain credibility with
your customers and perhaps regulators, consider which RCB would carry most weight with
them.
How good is their administration? A lot of the frustration we see with RCBs is not due to
the quality of their auditors but their administration processes. You need an auditing
company that will arrange the audits professionally and issue your certificate promptly,
providing additional materials to help you advertise your certification. When you contact
them initially, do they return your call and sound knowledgeable?
Do they use contract auditors? Many RCBs use auditors that are not directly employed by
them, which is not necessarily a problem, but it would be useful to understand how much
continuity you will have with the individuals that carry out your audits. Try to avoid having
to describe what your company does to a new auditor every visit as this soaks up time that
you are paying for.
www.certikit.com Page 29 of 33
ISO/IEC 27701 Implementation Guide
Do they have experience of your industry? Some RCBs and auditors specialize in certain
industries and build up a strong knowledge of the issues relevant to their customers. This
can be helpful during the audit as basic industry concepts and terms will be understood and
time will be saved. Check whether they have audited similar organizations in your industry.
Making a good choice based on the above factors can’t guarantee that the certification
process will run smoothly, but by having a good understanding of the accreditation regime
and by asking the right questions early on you will have given yourself the best chance
possible to have a long and happy audit relationship.
Having agreed a price, your chosen external auditor will contact you to arrange the Stage
One review. This is essentially a documentation review and a “getting to know you”
discussion where the exact scope of potential certification is decided. Based on the Stage
One, the external auditor will make a recommendation about your readiness for the Stage
Two – the certification audit itself. It used to be common for there to be at least a three-
month gap between the Stage One and the Stage Two visits, but this is less often the case
nowadays and the two can be quite close together if desired.
For a remote audit, ensure that the online meeting tool you are going to use is agreed and
that everyone involved knows how to use it, including how to share the screen to show the
auditor some documented information. Check that microphones and cameras work and that
the area behind each participant (in view of the camera) is appropriate. If technology such
www.certikit.com Page 30 of 33
ISO/IEC 27701 Implementation Guide
as a mobile phone is going to be used to perform a virtual walkaround of the offices, then
test that first too.
Once the basic arrangements are in place you need to ensure that whoever is going to act as
the auditor’s guide around the PIMS is ready. This means knowing where all of the relevant
documents are and how each of the requirements is met within the documents. Supporting
information such as HR and training records should also be available if required. Anyone
who might be able to help the auditor such as your data protection officer or individual
process managers should be on standby and everyone who is planned to talk to the auditor
should be prepared.
There is no substitute for practice so conduct a mock audit beforehand if you can and
identify any improvements needed before the day. Having obvious signs of privacy-related
activity on display at your location does no harm; this could be performance charts or
posters for raising awareness on the walls.
It’s all about showing the auditor that you are a professional organization that is in control;
you may be surprised how little the auditor feels they need to look at if the overall
impression they are getting is very positive.
Basically, all the auditor is doing is the same exercise as you did yourself when you
performed (and repeated) the gap assessment. It is purely a matter of going through the
requirements of the ISO/IEC 27701 standard and asking to be shown how you meet them.
The auditor will need to record the evidence they have been shown, including any relevant
references such as document titles and versions. They may also want to see the relevant
procedures etc. in action which may mean reviewing the records you keep and possibly
talking to the people who perform the procedures.
If the auditor finds something that does not conform to the requirements of the standard,
they will raise a “nonconformity”. These can be major or minor and, as the names suggest,
these vary in importance.
A major nonconformity may be raised if there is a significant deviation from the standard.
This is often due to a complete section or process not really having been addressed, or
something important that has been documented but there is no evidence that it has been
www.certikit.com Page 31 of 33
ISO/IEC 27701 Implementation Guide
done. Examples might be if no internal auditing has been carried out, no risk assessment
done, or no management reviews held.
A minor nonconformity is a lower-level issue that does not affect the operation of the PIMS
as a whole but means that one or more requirements have not been met. Examples could
be that an improvement has not been evaluated properly, a procedure has not been carried
out as specified or a privacy risk assessment does not follow the documented process.
Some auditors take note of a third level of item often called an “observation” or an
“opportunity for improvement”. These are not nonconformities and so do not affect the
result of the audit but may be useful for improvement purposes.
Once the audit has been completed the auditor will write up the report, often whilst still on
site (or on the same day in the case of a remote audit). They will then tell you the result of
the audit and go through any nonconformities that have been raised. Certification to the
standard is conditional upon any nonconformities being addressed and upon the higher-
level body that regulates the auditors agreeing with his recommendations. This can take a
while to process so, even if you have no nonconformities, officially your organization is not
certified yet.
You will need to produce an action plan to address the nonconformities and if this is
accepted and they are closed off, you will then become certified and the certificate will be
issued for a period of three years. During this time, there will be annual surveillance visits
followed at the three-year mark by a recertification audit.
Certification is really a starting point rather than a result and hopefully as time goes by your
PIMS will mature and improve and start to provide more and more value to the
organization. However, you may find that the resources that were made available for the
implementation now start to disappear and you need to ensure that the essential processes
of the PIMS are maintained. Plans can get out of date very quickly so the performance
evaluation side of the PIMS in particular will become very important; make sure you
continue with the management reviews, exercising and testing controls and internal audits
and this should drive the rest of the PIMS to stay up to date.
www.certikit.com Page 32 of 33
ISO/IEC 27701 Implementation Guide
7 Conclusion
This implementation guide has taken you through the process of positioning your
organization to achieve certification to the ISO/IEC 27701 standard, supported by the
CertiKit ISO27701 Toolkit. Hopefully, you will have seen that most of what is involved is
applied common sense, even if the standard does not always make it sound that way!
We wish you good luck in your work and, as always, we welcome any feedback you wish to
give us via feedback@certikit.com.
www.certikit.com Page 33 of 33