ISO 27701 provides specification and guidance for including personally identifiable information (PII) in the implementation of information security management system. It is referred as ‘Privacy information management system’. ISO 27701 extends the requirements of ISO/IEC 27001:2013 to take into account the protection of privacy of PII principals as potentially affected by the processing of PII, in addition to information security.
In ESA, we have a formal methodology to fulfill and implement ISO 27701/privacy information management system.
The standard requirements can be used by organizations to implement ISO 27701 as an independent assessment or an extension of an existing ISO 27001/ISO 27702 certification.
After we have identified whether an organisation is a controller and/or a processor, we guide an organisation through a step-by-step process of determining applicable requirements and taking them through the journey which has the following broad phases:
This phase involves identification of information sources, and is processing infrastructure that involves personnel, technology, physical infrastructure.
This phase involves performing privacy impact assessment and security risk assessment to determine security and legal loopholes. Identified gaps are provided with detail recommendations.
This phase involves our methodology that involves distribution security responsibility to internal stakeholders, with control policies and transactions that ensures that the PIMS is well embedded in the organisation processes. This also includes nomination of a data protection officer and creating data protection office, for the organisation. In a typical engagement organisation receives 25+ policies and procedures.
This phase involves tracking the client risks, and documentation on a weekly basis till all internal controls are adequately implemented.
This phase involves showcasing client with changes in a given period by providing change specific score of compliance between 0 -100% compliance.
This phase involves verifying the governance system created for the organisation is well in place and ready to declare as PIMS compliant.
© 2020 www.esecurityaudit.com. All rights reserved | Privacy Policy