SlideShare a Scribd company logo
How can ISO 27701 help to
designing, implementing,
operating and improving a privacy
information management system
Prof. Hernan Huwyler, MBA, CPA
January 28th 2020
Agenda
Applications
Controls Preparation
• Additional
control for
privacy
• Priorities
• Implementation
and audit tips
• Tools to manage a privacy system for ISO
27701 and compliance
• Documentation and traceability
• Global policies enforcement
• Single point of control for transfers
• Real-time alerts and incident management
• Internal and external audit management for
vulnerability remediation
Applications
Tools
Data protection
Compliance
• Technical controls
• Enforcing encryption, anonymization,
pseudonymization and tokenization
• Preventing data losses
• Managing user permissions
• Finding and protecting at-risk data on
endpoints and in the cloud
• Preventing virus, malware and ransomware
attacks
• Logging user activities
Applications
Tools
Data protection
Compliance
• Legal controls
• Completing subject access requests
• Keeping a record of processing activities
• Scanning for personal data
• Managing of consents and cookies
• Performing data protection impact
assessments
• Managing 3rd party relationships
Applications
Tools
Data protection
Compliance
• Security risk assessment on personal data
• Starting from
– Objectives in the privacy policy
– Requirements in the privacy laws
– Assets in the record on processing activities
• Models to quantify information security risks
• Probability of successful attacks
• Financial loss per attack related to affected assets
• Priorized action plans
• Investment budget
• Extention of cyber controls
Planning control assessment
• Appoint a privacy officer
• Develop, execute and monitor controls for the privacy program
• Monitor compliance with privacy laws (DPO role)
• Assess the effectiveness of the role
• Independence (from for CISO)
• Reporting to top management
• Expertise in data protection and privacy laws
• Training to employees and top management
• Advice in privacy impact assessments
Planning control assessment
• Update the procedure for data breach management and the
notification protocol
• Update policies that contribute to privacy by design and
privacy by default with
• guidance on personal data protection and the implementation
of the privacy principles in the software development lifecycle
• privacy and personal data protection requirements in the design
phase, which can be based on the output from a privacy risk
assessment and a privacy impact assessment
• data protection checkpoints within project milestones
• required privacy and personal data protection knowledge
• by default minimize processing of personal data
Control on policies
• Ensure to plan for training and awareness sessions
based on privacy incidents and near-misses
• Cover all groups of employees and contractors
managing personal information
• Communicate on privacy breaches
• the legal and reputational consequences for the organization
• the disciplinary consequences for the employee
• the impact on the data subjects
Control on training
• Ensure to classify personal information according
to the overall categories
• GDPR special category data identified in the RoPA a restricted
category
• Link categories to security controls and protocols
• Labeling for data and volumes with personal information
• Restricting removable media with personal information, in
particular, outside premises
Control on data classification
• Focus on the sensible personal information
• Agree the cryptographic controls with processors
• Encrypt personal data in transit
• In physical transfers, such as to offsite backups and data
processors
• In emails
• In particupar, using untrusted networks such as public internet
• Restrict decryption capabilities to authorized
personnel
Control on encryption
• Enhance procedures for registration, de-
registration and certification of users of systems
with personal information
• Avoid reissuing expired and deactivated users
• Agree on the validated users with data controller and document
procedures when processing data on its behalf
• Define the frequency to check unused credentials
• Update user profiles for personal information
Control on user management
• Update procedures for backups with personal
information
• Link backups to the record retention policy and legal
requirement
• Agree backups capabilities with data processors
• Log performed backups on personal information
• Implement integrity controls with restoring personal information
• Erase or de-identify backups with returning unneded data to
controllers
Control on backups
• Update the logging procedures for events related
to the personal information life cycle
• Ensure the completeness of logs > access type, timestap,
additions, modifications and deletions
• Validate users with access to the logs (wich also contains
personal data)
• Protect the logs
• Review the log and alarms on accesses to personal information
• Ensure that the controllers only access to their personal data
managed by the processors (not to data of other clients)
Control on logging
• Incorporate clauses with processors and co-
controllers to define
• minimum technical and organizational measures
• roles and responsibilities
• controls to ensure compliance
• activities by fourth parties
• Audit rights or independent certifications
Control on third parties
• Implement explicit erasure of personal information
• Restrict the printing of documents with personal
information
• Review the confidentially agreements for all the
employees and subcontractors managing personal
data
• Avoid using personal data in testing environments
• Incorporate the new costs of non-compliance with
privacy laws into the information security risk
assessments
Other controls
• Perform a gap analysis between the ISO 27701
requirements and current security audit plans
including those by controllers
• Consider Agile + Scrum for managing the preparation
program
• Test compliance with new controls
• Prepare SMEs for interviews and set time for them to
get ready
• Agree on the accredited certification body with
controllers, marketing and other stakeholders
Preparation for ISO certification
Avoid micro-management
Thanks!
The copyright of this work belongs to The GDPR
Institute® and none of this presentation, either in
part or in whole, in any manner or form, may be
copied, reproduced, transmitted, modified or
distributed or used by other means without
permission from The GDPR Institute®. Carrying out
any unauthorized act in relation to this copyright
notice may result in both a civil claim for damages
and criminal prosecution.
Copyright notice

More Related Content

PPTX
Basic introduction to iso27001
PDF
What is ISO 27001 ISMS
PPTX
Iso 27001 isms presentation
PPTX
Iso 27001 awareness
PPT
ISO 27001 - Information Security Management System
PPTX
27001 awareness Training
PDF
ISO/IEC 27001:2013 An Overview
PPTX
Iso iec 27001 foundation training course by interprom
Basic introduction to iso27001
What is ISO 27001 ISMS
Iso 27001 isms presentation
Iso 27001 awareness
ISO 27001 - Information Security Management System
27001 awareness Training
ISO/IEC 27001:2013 An Overview
Iso iec 27001 foundation training course by interprom

What's hot (20)

PDF
ISO 27005:2022 Overview 221028.pdf
PDF
ISO27001: Implementation & Certification Process Overview
PDF
ISO 27001:2013 Mandatory documents and records
PPTX
ISO 27001 Awareness/TRansition.pptx
PPTX
Implementing ISO27001 2013
PDF
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
PPTX
ISO 27701
PPTX
27001.pptx
PPT
Overview of ISO 27001 ISMS
PDF
ISO 27001_2022 Standard_Presentation.pdf
PDF
NQA - ISO 27001 Implementation Guide
PPS
ISO 27001 2013 isms final overview
PDF
Why ISO27001 For My Organisation
PDF
ISO 27001:2022 What has changed.pdf
PPT
ISO 27001 Benefits
PDF
COBIT 2019 Overview_v1.1.pdf
PDF
How to use ChatGPT for an ISMS implementation.pdf
PPT
ISMS implementation challenges-KASYS
PDF
Information security management system (isms) overview
ISO 27005:2022 Overview 221028.pdf
ISO27001: Implementation & Certification Process Overview
ISO 27001:2013 Mandatory documents and records
ISO 27001 Awareness/TRansition.pptx
Implementing ISO27001 2013
ISO 27001_2022 What has changed 2.0 for ISACA.pdf
ISO 27701
27001.pptx
Overview of ISO 27001 ISMS
ISO 27001_2022 Standard_Presentation.pdf
NQA - ISO 27001 Implementation Guide
ISO 27001 2013 isms final overview
Why ISO27001 For My Organisation
ISO 27001:2022 What has changed.pdf
ISO 27001 Benefits
COBIT 2019 Overview_v1.1.pdf
How to use ChatGPT for an ISMS implementation.pdf
ISMS implementation challenges-KASYS
Information security management system (isms) overview
Ad

Similar to How can the ISO 27701 help to design, implement, operate and improve a privacy information management system Hernan Huwyler (20)

PDF
IT Perspectives in Implementing Privacy Framework
PDF
ISO 27701 Essentials: Building a Robust Privacy Management System
PPT
2009 iapp-the corpprivacydeptmar13-2009
ODP
GDPR and ISO 27001 - how to be compliant
PPTX
A practical data privacy and security approach to ffiec, gdpr and ccpa
PDF
Mastering Privacy: The Role of ISO 27701 in Information Security
PDF
Valiente Balancing It SecurityCompliance, Complexity & Cost
PPTX
IS17428_ISACA_Chennai_20220910.pptx
PDF
GDPR Are you ready for auditing privacy ?
PDF
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
PPTX
Isaca atlanta - practical data security and privacy
PPTX
General Data Protection Regulation (GDPR)
PPTX
General Data Protection Regulation (GDPR)
PDF
2015 09-22 Is it time for a Security and Compliance Assessment?
PPT
Ais Romney 2006 Slides 08 Is Control2
PPT
Ais Romney 2006 Slides 08 Is Control2
PPTX
Infosec policies to appsec standards ed final
PPTX
Syndigo Information Security Awarness Training Deck FINAL June 2023.pptx
PDF
Prep your app for gdpr compliance
PDF
IT Perspectives in Implementing Privacy Framework
ISO 27701 Essentials: Building a Robust Privacy Management System
2009 iapp-the corpprivacydeptmar13-2009
GDPR and ISO 27001 - how to be compliant
A practical data privacy and security approach to ffiec, gdpr and ccpa
Mastering Privacy: The Role of ISO 27701 in Information Security
Valiente Balancing It SecurityCompliance, Complexity & Cost
IS17428_ISACA_Chennai_20220910.pptx
GDPR Are you ready for auditing privacy ?
GDPR solutions (JS Event 28/2/18) | Greenlight Computers
Isaca atlanta - practical data security and privacy
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
2015 09-22 Is it time for a Security and Compliance Assessment?
Ais Romney 2006 Slides 08 Is Control2
Ais Romney 2006 Slides 08 Is Control2
Infosec policies to appsec standards ed final
Syndigo Information Security Awarness Training Deck FINAL June 2023.pptx
Prep your app for gdpr compliance
Ad

More from Hernan Huwyler, MBA CPA (20)

PDF
Prof. Hernan Huwyler IE Law School - AI Risks and Controls.pdf
PDF
Asociacion Profesionistas de Compliance - Initiatives to Reduce the Cost of C...
PDF
Model to Quantify Compliance Risks.pdf
PDF
Prof Hernan Huwyler MBA CPA - Ditch your Heat Maps
PDF
Profesor Hernan Huwyler MBA CPA - Operacional Compliance
PDF
Hernan Huwyler - IE Compliance Corporate Risk Management Full 2023
PDF
The Behavioral Science of Compliance CUMPLEN.pdf
PDF
R is for Risk 2 Risk Management using R
PDF
Compliance and the russian invasion - Prof Hernan Huwyler
PDF
DPO Day Conference - Minimizing Privacy Risks
PDF
Master in Sustainability Leadership Sustainability Risks Prof Hernan Huwyler
PPTX
Cyber Laundering and the AML Directives
PDF
Hernan Huwyler - Iberoamerican Compliance Conference UCM Congreso Iberoameric...
PDF
ARENA - Prof Hernan Huwyler - Debate Is Machine Learning Mature Enough?
PDF
10 Mistakes in Implementing the ISO 37301
PDF
Qa Financials - 10 Smart Controls for Software Development
PDF
Information Risk Management - Cyber Risk Management - IT Risks
PDF
Stronger 2021 Building the Blocks to Quantify Cyber Risks - Prof hernan huwyler
PDF
IE Curso ISO 37301 Aseguramiento de Controles de Cumplimiento
PDF
Strategy Insights - How to Quantify IT Risks
Prof. Hernan Huwyler IE Law School - AI Risks and Controls.pdf
Asociacion Profesionistas de Compliance - Initiatives to Reduce the Cost of C...
Model to Quantify Compliance Risks.pdf
Prof Hernan Huwyler MBA CPA - Ditch your Heat Maps
Profesor Hernan Huwyler MBA CPA - Operacional Compliance
Hernan Huwyler - IE Compliance Corporate Risk Management Full 2023
The Behavioral Science of Compliance CUMPLEN.pdf
R is for Risk 2 Risk Management using R
Compliance and the russian invasion - Prof Hernan Huwyler
DPO Day Conference - Minimizing Privacy Risks
Master in Sustainability Leadership Sustainability Risks Prof Hernan Huwyler
Cyber Laundering and the AML Directives
Hernan Huwyler - Iberoamerican Compliance Conference UCM Congreso Iberoameric...
ARENA - Prof Hernan Huwyler - Debate Is Machine Learning Mature Enough?
10 Mistakes in Implementing the ISO 37301
Qa Financials - 10 Smart Controls for Software Development
Information Risk Management - Cyber Risk Management - IT Risks
Stronger 2021 Building the Blocks to Quantify Cyber Risks - Prof hernan huwyler
IE Curso ISO 37301 Aseguramiento de Controles de Cumplimiento
Strategy Insights - How to Quantify IT Risks

Recently uploaded (20)

PDF
Laughter Yoga Basic Learning Workshop Manual
PPTX
Lecture (1)-Introduction.pptx business communication
PPTX
DMT - Profile Brief About Business .pptx
PPT
Data mining for business intelligence ch04 sharda
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PDF
Lecture 3 - Risk Management and Compliance.pdf
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
PDF
Unit 1 Cost Accounting - Cost sheet
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PDF
Power and position in leadershipDOC-20250808-WA0011..pdf
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
Leading with Vision_ How Mohit Bansal Is Shaping Chandigarh’s Real Estate Ren...
PDF
Types of control:Qualitative vs Quantitative
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PDF
The FMS General Management Prep-Book 2025.pdf
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
Hindu Circuler Economy - Model (Concept)
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PPT
Chapter four Project-Preparation material
Laughter Yoga Basic Learning Workshop Manual
Lecture (1)-Introduction.pptx business communication
DMT - Profile Brief About Business .pptx
Data mining for business intelligence ch04 sharda
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Lecture 3 - Risk Management and Compliance.pdf
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Unit 1 Cost Accounting - Cost sheet
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Power and position in leadershipDOC-20250808-WA0011..pdf
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Leading with Vision_ How Mohit Bansal Is Shaping Chandigarh’s Real Estate Ren...
Types of control:Qualitative vs Quantitative
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
The FMS General Management Prep-Book 2025.pdf
Nidhal Samdaie CV - International Business Consultant
Hindu Circuler Economy - Model (Concept)
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Chapter four Project-Preparation material

How can the ISO 27701 help to design, implement, operate and improve a privacy information management system Hernan Huwyler

  • 1. How can ISO 27701 help to designing, implementing, operating and improving a privacy information management system Prof. Hernan Huwyler, MBA, CPA January 28th 2020
  • 2. Agenda Applications Controls Preparation • Additional control for privacy • Priorities • Implementation and audit tips
  • 3. • Tools to manage a privacy system for ISO 27701 and compliance • Documentation and traceability • Global policies enforcement • Single point of control for transfers • Real-time alerts and incident management • Internal and external audit management for vulnerability remediation Applications Tools Data protection Compliance
  • 4. • Technical controls • Enforcing encryption, anonymization, pseudonymization and tokenization • Preventing data losses • Managing user permissions • Finding and protecting at-risk data on endpoints and in the cloud • Preventing virus, malware and ransomware attacks • Logging user activities Applications Tools Data protection Compliance
  • 5. • Legal controls • Completing subject access requests • Keeping a record of processing activities • Scanning for personal data • Managing of consents and cookies • Performing data protection impact assessments • Managing 3rd party relationships Applications Tools Data protection Compliance
  • 6. • Security risk assessment on personal data • Starting from – Objectives in the privacy policy – Requirements in the privacy laws – Assets in the record on processing activities • Models to quantify information security risks • Probability of successful attacks • Financial loss per attack related to affected assets • Priorized action plans • Investment budget • Extention of cyber controls Planning control assessment
  • 7. • Appoint a privacy officer • Develop, execute and monitor controls for the privacy program • Monitor compliance with privacy laws (DPO role) • Assess the effectiveness of the role • Independence (from for CISO) • Reporting to top management • Expertise in data protection and privacy laws • Training to employees and top management • Advice in privacy impact assessments Planning control assessment
  • 8. • Update the procedure for data breach management and the notification protocol • Update policies that contribute to privacy by design and privacy by default with • guidance on personal data protection and the implementation of the privacy principles in the software development lifecycle • privacy and personal data protection requirements in the design phase, which can be based on the output from a privacy risk assessment and a privacy impact assessment • data protection checkpoints within project milestones • required privacy and personal data protection knowledge • by default minimize processing of personal data Control on policies
  • 9. • Ensure to plan for training and awareness sessions based on privacy incidents and near-misses • Cover all groups of employees and contractors managing personal information • Communicate on privacy breaches • the legal and reputational consequences for the organization • the disciplinary consequences for the employee • the impact on the data subjects Control on training
  • 10. • Ensure to classify personal information according to the overall categories • GDPR special category data identified in the RoPA a restricted category • Link categories to security controls and protocols • Labeling for data and volumes with personal information • Restricting removable media with personal information, in particular, outside premises Control on data classification
  • 11. • Focus on the sensible personal information • Agree the cryptographic controls with processors • Encrypt personal data in transit • In physical transfers, such as to offsite backups and data processors • In emails • In particupar, using untrusted networks such as public internet • Restrict decryption capabilities to authorized personnel Control on encryption
  • 12. • Enhance procedures for registration, de- registration and certification of users of systems with personal information • Avoid reissuing expired and deactivated users • Agree on the validated users with data controller and document procedures when processing data on its behalf • Define the frequency to check unused credentials • Update user profiles for personal information Control on user management
  • 13. • Update procedures for backups with personal information • Link backups to the record retention policy and legal requirement • Agree backups capabilities with data processors • Log performed backups on personal information • Implement integrity controls with restoring personal information • Erase or de-identify backups with returning unneded data to controllers Control on backups
  • 14. • Update the logging procedures for events related to the personal information life cycle • Ensure the completeness of logs > access type, timestap, additions, modifications and deletions • Validate users with access to the logs (wich also contains personal data) • Protect the logs • Review the log and alarms on accesses to personal information • Ensure that the controllers only access to their personal data managed by the processors (not to data of other clients) Control on logging
  • 15. • Incorporate clauses with processors and co- controllers to define • minimum technical and organizational measures • roles and responsibilities • controls to ensure compliance • activities by fourth parties • Audit rights or independent certifications Control on third parties
  • 16. • Implement explicit erasure of personal information • Restrict the printing of documents with personal information • Review the confidentially agreements for all the employees and subcontractors managing personal data • Avoid using personal data in testing environments • Incorporate the new costs of non-compliance with privacy laws into the information security risk assessments Other controls
  • 17. • Perform a gap analysis between the ISO 27701 requirements and current security audit plans including those by controllers • Consider Agile + Scrum for managing the preparation program • Test compliance with new controls • Prepare SMEs for interviews and set time for them to get ready • Agree on the accredited certification body with controllers, marketing and other stakeholders Preparation for ISO certification
  • 20. The copyright of this work belongs to The GDPR Institute® and none of this presentation, either in part or in whole, in any manner or form, may be copied, reproduced, transmitted, modified or distributed or used by other means without permission from The GDPR Institute®. Carrying out any unauthorized act in relation to this copyright notice may result in both a civil claim for damages and criminal prosecution. Copyright notice