Privacy Information Management System per ISO/IEC 27701 - Refinements in European context

This document specifies refinements for an application of ISO/IEC 27701 in a European context.
An organization can use this document for the implementation of the generic requirements and controls of ISO/IEC 27701 according to its context and its applicable obligations.
Certification bodies can use the specifications in this document as a basis for certification criteria verifying conformity to ISO/IEC 27701.
Certification criteria based on these specifications can provide a certification model under ISO/IEC 17065 for processing operations performed within the scope of a Privacy Information Management System according to ISO/IEC 27701, which can be combined with certification requirements for ISO/IEC 27701 under ISO/IEC 17021.
Accreditation bodies or regulatory authorities can use provisions in this document as criteria to establish certification mechanisms.

Datenschutz-Informationsmanagementsystem per ISO/IEC 27701 - Konkretisierungen im europäischen Kontext

Dieses Dokument legt Verfeinerungen für eine Anwendung von ENISO/IEC27701 in einem europäischen Kon
text fest.
Dieses Dokument ist für dieselben Entitäten wie in ISO/IEC27701 anwendbar: alle Arten und Größen von Organisationen, einschließlich öffentlicher und privater Unternehmen, öffentlicher Stellen und gemeinnützi
ger Organisationen, die verantwortliche Stellen und/oder Auftragsdatenverarbeiter im Rahmen eines ISMS (Informationssicherheitsmanagementsystem) sind.
Eine Organisation kann dieses Dokument für die Umsetzung der allgemeinen Anforderungen und Maßnahmen von ENISO/IEC27701 je nach ihrem Kontext und ihren geltenden Verpflichtungen verwenden.
Zertifizierungskriterien, die auf diesen Verfeinerungen basieren, können ein Zertifizierungsmodell nach ISO/IEC17065 für Verarbeitungsvorgänge bereitstellen, die im Rahmen eines Datenschutz- Informationsmanagementsystems nach ENISO/IEC27701 durchgeführt werden, das mit Zertifizie
rungsanforderungen für ENISO/IEC27701 nach ISO/IEC17021 kombiniert werden kann.

Système de management de la protection de la vie privée conformément à l'EN ISO/IEC 27701 - Affinements relatifs au contexte européen

Le présent document fournit les affinements relatifs à l'application de l'EN ISO/IEC 27701 dans un contexte européen.
Le présent document s'applique aux mêmes entités que l'ISO/IEC 27701, c'est-à-dire aux organisations de tous types et de toutes tailles, y compris les entreprises publiques et privées, les entités gouvernementales et les organisations à but non lucratif, qui sont des responsables de traitement de DCP et/ou des sous-traitants de DCP qui traitent les DCP à l'aide d'un SMSI.
Une organisation peut utiliser le présent document pour mettre en oeuvre les exigences et mesures de sécurité génériques de l'EN ISO/IEC 27701 conformément à son contexte et aux obligations qui lui incombent.
Les critères de certification basés sur ces affinements peuvent procurer un modèle de certification en vertu de l'ISO/IEC 17065 pour les opérations de traitement réalisées dans le domaine d'application d'un système de management de la protection de la vie privée conformément à l'EN ISO/IEC 27701, qui peut être combiné avec les exigences de certification relatives à l'EN ISO/IEC 27701 en vertu de l'ISO/IEC 17021.

Sistem upravljanja informacij o varstvu podatkov po ISO/IEC 27701 - Izboljšave v evropskem kontekstu

Ta dokument določa izboljšave za uporabo standarda ISO/IEC 27701 v evropskem kontekstu.
Organizacija lahko uporablja ta dokument za izvajanje splošnih zahtev in kontrol iz standarda ISO/IEC 27701 v skladu z njegovim okvirom in veljavnimi obveznostmi.
Certifikacijski organi lahko uporabljajo specifikacije iz tega dokumenta kot osnovo za merila certificiranja za preverjanje skladnosti s standardom ISO/IEC 27701.
Merila certificiranja, ki temeljijo na teh specifikacijah, lahko zagotavljajo model za certificiranje v skladu s standardom ISO/IEC 17065 za operacije obdelovanja, izvedenih v okviru sistema za upravljanje informacij o zasebnosti v skladu s standardom ISO/IEC 27701, ki jih je mogoče združiti s certifikacijskimi zahtevami za standard ISO/IEC 27701 v skladu s standardom ISO/IEC 17021.
Akreditacijski ali regulativni organi lahko uporabljajo določila iz tega dokumenta kot merila za vzpostavitev mehanizmov certificiranja.

General Information

Status
Published
Publication Date
28-Nov-2023
Current Stage
6060 - Definitive text made available (DAV) - Publishing
Start Date
29-Nov-2023
Due Date
21-Dec-2022
Completion Date
29-Nov-2023

Overview

EN 17926:2023 provides European refinements to ISO/IEC 27701 for a Privacy Information Management System (PIMS). Published by CEN, the standard adapts the generic ISO/IEC 27701 requirements and controls to the European legal context-most notably to support implementation under the EU GDPR (Regulation 2016/679). EN 17926 is applicable to all types and sizes of organisations acting as PII controllers and/or PII processors and is intended for use by organisations, certification bodies, accreditation bodies and regulators.

Key topics and requirements

  • Scope and applicability: Defines how to determine the PIMS scope, including interfaces and dependencies between internal and external PII processing activities.
  • Refinements to ISO/IEC 27701 controls: Specifies which controls from ISO/IEC 27001 Annex A, ISO/IEC 27701 Annex A (controllers) and Annex B (processors) apply and when they are mandatory in a European/GDPR context.
  • Statement of Applicability (SoA): Requires an SoA that lists necessary controls, justification for inclusion/exclusion, and implementation status - Annexes A/B/C cannot be excluded if in-scope.
  • Data Protection Officer (DPO): Clarifies DPO appointment criteria and expectations - sufficient resources, reporting to top management, involved in PII protection issues, publicly available contact details, and independence from instructions.
  • Risk assessment and treatment: Controls must be assessed for both information security and privacy risks to PII principals; applicability checks must reference Annex A/B/C.
  • Certification models: Provides a basis for certification criteria under ISO/IEC 17065 for product/process/service PII processing and combination models with ISO/IEC 17021 for management system certification (see informative Annex D).
  • GDPR relationship: Informative mapping to GDPR obligations and use of standard content for data protection certification mechanisms (Annex E).

Practical applications

Who uses EN 17926 and why:

  • Organisations (public/private/not-for-profit): to implement a PIMS aligned with GDPR and demonstrate compliance through documented controls and SoA.
  • Certification bodies: to develop certification schemes that assess PIMS conformity and processing operations (ISO/IEC 17065 and ISO/IEC 17021 models).
  • Accreditation bodies and regulators: to establish certification mechanisms and criteria for data protection certification (GDPR Article 42).
  • Service providers and vendors: to design products, services, or processes that process PII in ways that meet European refinements and support customer assurance.

Related standards

  • ISO/IEC 27701 (PIMS extension to ISO/IEC 27001/27002)
  • EN ISO/IEC 27001:2013 (Information Security Management)
  • ISO/IEC 17021 (management system certification)
  • ISO/IEC 17065 (product/process/service certification)
  • ISO/IEC 17067 (type 6 certification schemes)
  • EU GDPR (Regulation 2016/679)

EN 17926 is essential for organisations seeking a GDPR-aligned privacy management framework and for bodies creating credible, comparable privacy certification schemes in Europe.

Standard
EN 17926:2024
English language
37 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Frequently Asked Questions

EN 17926:2023 is a standard published by the European Committee for Standardization (CEN). Its full title is "Privacy Information Management System per ISO/IEC 27701 - Refinements in European context". This standard covers: This document specifies refinements for an application of ISO/IEC 27701 in a European context. An organization can use this document for the implementation of the generic requirements and controls of ISO/IEC 27701 according to its context and its applicable obligations. Certification bodies can use the specifications in this document as a basis for certification criteria verifying conformity to ISO/IEC 27701. Certification criteria based on these specifications can provide a certification model under ISO/IEC 17065 for processing operations performed within the scope of a Privacy Information Management System according to ISO/IEC 27701, which can be combined with certification requirements for ISO/IEC 27701 under ISO/IEC 17021. Accreditation bodies or regulatory authorities can use provisions in this document as criteria to establish certification mechanisms.

This document specifies refinements for an application of ISO/IEC 27701 in a European context. An organization can use this document for the implementation of the generic requirements and controls of ISO/IEC 27701 according to its context and its applicable obligations. Certification bodies can use the specifications in this document as a basis for certification criteria verifying conformity to ISO/IEC 27701. Certification criteria based on these specifications can provide a certification model under ISO/IEC 17065 for processing operations performed within the scope of a Privacy Information Management System according to ISO/IEC 27701, which can be combined with certification requirements for ISO/IEC 27701 under ISO/IEC 17021. Accreditation bodies or regulatory authorities can use provisions in this document as criteria to establish certification mechanisms.

EN 17926:2023 is classified under the following ICS (International Classification for Standards) categories: 35.030 - IT Security. The ICS classification helps identify the subject area and facilitates finding related standards.

You can purchase EN 17926:2023 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of CEN standards.

Standards Content (Sample)


SLOVENSKI STANDARD
01-maj-2024
Sistem upravljanja informacij o varstvu podatkov po ISO/IEC 27701 - Izboljšave v
evropskem kontekstu
Privacy Information Management System per ISO/IEC 27701 - Refinements in European
context
Datenschutz-Informationsmanagementsystem per ISO/IEC 27701 - Verfeinerungen im
europäischen Kontext
Système de management de la protection de la vie privée conformément à l'EN ISO/IEC
27701 - Affinements relatifs au contexte européen
Ta slovenski standard je istoveten z: EN 17926:2023
ICS:
35.030 Informacijska varnost IT Security
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

EUROPEAN STANDARD EN 17926
NORME EUROPÉENNE
EUROPÄISCHE NORM
November 2023
ICS 35.030
English version
Privacy Information Management System per ISO/IEC
27701 - Refinements in European context
Système de management de la protection de la vie Datenschutz-Informationsmanagementsystem per
privée conformément à l'EN ISO/IEC 27701 - ISO/IEC 27701 - Konkretisierungen im europäischen
Affinements relatifs au contexte européen Kontext
This European Standard was approved by CEN on 13 April 2023.

CEN and CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for
giving this European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical
references concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to
any CEN and CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN and CENELEC member into its own language and notified to the CEN-CENELEC
Management Centre has the same status as the official versions.

CEN and CENELEC members are the national standards bodies and national electrotechnical committees of Austria, Belgium,
Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy,
Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia,
Slovakia, Slovenia, Spain, Sweden, Switzerland, Türkiye and United Kingdom.

CEN-CENELEC Management Centre:
Rue de la Science 23, B-1040 Brussels
© 2023 CEN/CENELEC All rights of exploitation in any form and by any means
Ref. No. EN 17926:2023 E
reserved worldwide for CEN national Members and for
CENELEC Members.
Contents Page
European foreword . 3
Introduction . 4
1 Scope . 5
2 Normative references . 5
3 Terms and definitions . 5
4 Structure of this document . 5
5 Privacy information management system for PII processing operations . 6
6 Requirement for PII processing operations . 6
Annex A (normative) Information security and privacy controls . 7
Annex B (normative) PIMS-specific reference control objectives and controls (PII Controllers) 19
Annex C (normative) PIMS-specific reference control objectives and controls (PII Processors) .26
Annex D (informative) Model for combination of management system certification governed by
certification requirements in ISO/IEC 17021 with a non-tangible product-based certification
governed by certification requirements in ISO/IEC 17065 .29
Annex E (informative) Relationship between this European Standard and the General Data
Protection Regulation .31
Bibliography .37

European foreword
This document (EN 17926:2023) has been prepared by Technical Committee CEN/CLC/JTC 13,
“Cybersecurity and Data Protection”, the secretariat of which is held by DIN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by May 2024, and conflicting national standards shall be
withdrawn at the latest by May 2024.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
Any feedback and questions on this document should be directed to the users’ national standards body.
A complete listing of these bodies can be found on the CEN website.
According to the CEN-CENELEC Internal Regulations, the national standards organisations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria, Croatia,
Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland,
Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of North
Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Türkiye and the United
Kingdom.
Introduction
ISO/IEC 27701 specifies requirements and provides guidance for establishing, implementing,
maintaining, and continually improving a Privacy Information Management System (PIMS) which can be
implemented in any jurisdiction. As a management system designed for international use, its
requirements are generic, and the guidance can be adapted by the organizations according to their
context and applicable obligations.
Although ISO/IEC 27701 was written with the intention to be applicable under any jurisdiction, including
under the EU General Data Protection Regulation (GDPR) (ISO/IEC 27701 Annex D contains a mapping
between clauses of the standard and GDPR), it is the responsibility of the organization to determine how
to implement requirements and controls of ISO/IEC 27701 in the context of the GDPR.
This document provides refinements to ISO/IEC 27701 in the application of controls and guidance in
ISO/IEC 27701 specific to GDPR where necessary. This document is applicable to the same entities as is
ISO/IEC 27701: all types and sizes of organizations, including public and private companies, government
entities and not-for-profit organizations, which are PII controllers and/or PII processors processing PII
within an ISMS (information security management system). This is intended to be used by organizations
in the GDPR context for the purpose of demonstrating compliance with their obligations. ISO/IEC 27701
combined with the refinements of this document constitutes a set of requirements which is more
specifically designed and fit for the context of GDPR than the generic ones from ISO/IEC 27701 alone.
Thus ISO/IEC 27701 can be considered as an international framework, which can be refined for a
particular regional context (in the case of this document, the GDPR), and even to add requirements fit for
a given jurisdiction/country or sector (out of scope of this document).
The refinements to ISO/IEC 27701, for processing operations as part of products, processes, and services
specified in this document can be used for conformity assessment which can be conducted, either by first,
second, or third parties. In particular, certification bodies can use these requirements and refinements to
assess the conformity of both a privacy information management system per ISO/IEC 17021 and the
processing operations of a product, process or service per ISO/IEC 17065. Certification schemes for
products involving PII processing can reference this document, as described in ISO/IEC 17067 for “type
6” schemes.
NOTE “product” can be read as “process” or “service” (ISO/IEC 17065, Clause 1 and Annex B).
The requirements in this document can be part of scheme governed under both ISO/IEC 17065 for the
requirements on products involving PII processing activities (“products requirements” as per
ISO/IEC 17065 Clause 3.8) and ISO/IEC 17021 for the management system requirements
(ISO/IEC 17067 type 6 scheme).
GDPR Article 42 encourages the establishment of data protection certification mechanisms. Provisions of
this document can be used by competent bodies to specify data protection certification mechanisms as
per GDPR article 42 in order to assess the conformity of processing operations in the PIMS as per
ISO/IEC 17065 including assessment of privacy information management system systematic elements as
allowed by Clause 6 of ISO/IEC 17067.
1 Scope
This document specifies refinements for an application of ISO/IEC 27701 in a European context.
This document is applicable to the same entities as is ISO/IEC 27701: all types and sizes of organizations,
including public and private companies, government entities and not-for-profit organizations, which are
PII controllers and/or PII processors processing PII within an ISMS (information security management
system).
An organization can use this document for the implementation of the generic requirements and controls
of ISO/IEC 27701 according to its context and its applicable obligations.
Certification criteria based on these refinements can provide a certification model under ISO/IEC 17065
for processing operations performed within the scope of a privacy information management system
according to ISO/IEC 27701, which can be combined with certification requirements for ISO/IEC 27701
under ISO/IEC 17021.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO/IEC 27701:—, Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy
information management - Requirements and guidelines
EN ISO/IEC 27001:2017, Information technology - Security techniques - Information security management
systems - Requirements (ISO/IEC 27001:2013 including Cor 1:2014 and Cor 2:2015)
3 Terms and definitions
No terms and definitions are listed in this document.
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— IEC Electropedia: available at https://www.electropedia.org/
— ISO Online browsing platform: available at https://www.iso.org/obp
4 Structure of this document
Clause 5 refers to the privacy information management system as defined in ISO/IEC 27701, and specifies
additional requirements and refinements of requirements.
Clause 6 specifies the requirements for PII processing operations as part of products, processes, or
services; these are requirements for the organization to implement specific controls from Annexes A, B,
C and related guidance.
Annex A refers to the ISO/IEC 27001 Annex A controls.
Annex B refers to the ISO/IEC 27701 Annex A controls for PII controllers.
Annex C refers to the ISO/IEC 27701 Annex B controls for PII processors.

Under preparation. Stage at time of publication: ISO/IEC DIS 27701:2023.
The informative Annex D provides a model for combining certifications governed by ISO/IEC 17021 and
ISO/IEC 17065. Finally, Annex E presents the relationship between this document and EU 2016/679
GDPR.
5 Privacy information management system for PII processing operations
The organization shall establish, implement, maintain, and continually improve a PIMS as defined in
ISO/IEC 27701.
The organization shall determine the PII processing operations within the scope of the management
system (ISO/IEC 27701, 5.2.3).
ISO/IEC 27701:2021, 5.2.3 is refined as follows:
When determining this scope, the organization shall consider interfaces and dependencies between PII
processing activities internal and external to the organization.
EN ISO/IEC 27001:2013, 6.1.3 c) is refined as follows:
The controls determined in ISO/IEC 27001:2013 6.1.3 b) shall be compared with the controls in Annex A,
Annex B and/or Annex C to verify that no necessary controls have been omitted.
When assessing the applicability of control objectives and controls from Annex A for the treatment of
risks, the control objectives and controls shall be considered in the context of both risks to information
security as well as risks related to the processing of PII, including risks to PII principals.
EN ISO/IEC 27001:2013, 6.1.3 d) is refined as follows:
Produce a Statement of Applicability that contains:
— the necessary controls [see ISO/IEC 27001:2013, 6.1.3 b) and c) as refined Cove];
— justification for their inclusion;
— whether the necessary controls are implemented or not; and
— the justification for excluding any of the controls in Annex A, and in Annex B and/or Annex C
according to the organization’s determination of its role (see ISO/IEC 27701, 5.2.1).
Annexes A, B, C specify which controls that the organization shall implement, depending on the role of
the organization. Therefore, these controls cannot be excluded.
6 Requirement for PII processing operations
For all PII processing operations as determined in Clause 5, the organization shall implement the controls
required per Annexes A, B, C depending on the role of the organization (see ISO/IEC 27701, 5.2.1).
Annex A
(normative)
Information security and privacy controls
This annex is for use by all organizations, whatever their role is (acting as PII controller, PII processor, or
both). This annex lists all the controls from ISO/IEC 27001:2013 Annex A and states where extensions to
those controls are included in ISO/IEC 27701 and where refinements in a European context are
applicable.
In Table A.1, references to ISO/IEC 27001:2013 controls are of two types:
— references to ISO/IEC 27001:2013 controls in the form “The control ISO/IEC 27001:2013 [control
number A.x.y.z] applies.” mean that the organization shall consider the applicability of the control
according to its risk assessment (ISO/IEC 27701, 5.4.1.2) and risk treatment (ISO/IEC 27701,
5.4.1.3);
— requirements in the form “The organization shall implement control ISO/IEC 27001:2013 [control
number A.x.y.z], following the additional guidance in .”; mean that the organization shall implement
all these controls following the related guidance to fulfil the general requirements in Clause 6 (in all
cases, whatever the risk assessment and the risk treatment in the management system). Some
controls of this type include additional refinements to the guidance of ISO/IEC 27701 in line with the
scope of this document.
NOTE Clause numbers in this annex relate to the subclause numbers in ISO/IEC 27001:2013 Annex A.
Table A.1 — Control objectives and controls
PIMS.5 Information security policies
PIMS.5.1 Management direction for information security
Objective: To provide management direction and support for information security and privacy in
accordance with business requirements and relevant laws and regulations.
The organization shall implement control
Policies for information
PIMS ISMS 5.1.1 ISO/IEC 27001 A.5.1.1, following the additional
security
guidance in ISO/IEC 27701, 6.2.1.1.
Review of the policies
PIMS ISMS 5.1.2 The control ISO/IEC 27001 A.5.1.2 applies.
for information security
PIMS ISMS 6 Organization of information security
PIMS ISMS 6.1 Internal organization
Objective: To establish a management framework to initiate and control the implementation and
operation of information security and privacy within the organization.
The organization shall implement control
ISO/IEC 27001 A.6.1.1, following the additional
guidance in ISO/IEC 27701, 6.3.1.1, and these
additional refinements:
— The organization shall appoint a data protection
officer (DPO), if the nature, scope and purposes
of the processing requires it as per the
applicable obligations, as the responsible
person per ISO/IEC 27701:2021, 6.3.1.1.
Information security
PIMS ISMS 6.1.1 roles and — The organization shall ensure that the DPO has
responsibilities sufficient resources to undertake their tasks,
reports to the highest management level, is
involved in all issues related to the protection of
PII, and that contact details of the DPO are
published and communicated to the
supervisory authority and the PII principals.
— The organization shall ensure that the DPO does
not receive any instructions regarding the
exercise of those tasks.
The organization shall implement control
PIMS ISMS 6.1.2 Segregation of duties
ISO/IEC 27001 A.6.1.2.
PIMS ISMS 6.1.3 Contact with authorities The control ISO/IEC 27001 A.6.1.3 applies.
Contact with special
PIMS ISMS 6.1.4 The control ISO/IEC 27001 A.6.1.4 applies.
interest groups
Information security in
PIMS ISMS 6.1.5 The control ISO/IEC 27001 A.6.1.5 applies.
project management
PIMS ISMS 6.2 Mobile devices and teleworking
Objective: To ensure the security and privacy of teleworking and use of mobile devices
The organization shall implement control
PIMS ISMS 6.2.1 Mobile device policy ISO/IEC 27001 A.6.2.1, following the additional
guidance in ISO/IEC 27701, 6.3.2.1.
PIMS ISMS 6.2.2 Teleworking The control ISO/IEC 27001 A.6.2.2 applies.
PIMS ISMS 7 Human resource security
PIMS ISMS 7.1 Prior to employment
Objective: To ensure that employees and contractors understand their responsibilities and are suitable
for the roles for which they are considered.
PIMS ISMS 7.1.1 Screening The control ISO/IEC 27001 A.7.1.1 applies.
Terms and conditions of
PIMS ISMS 7.1.2 The control ISO/IEC 27001 A.7.1.2 applies.
employment
PIMS ISMS 7.2 During employment
Objective: To ensure that employees and contractors are aware of and fulfil their information security
and privacy responsibilities.
Management
PIMS ISMS 7.2.1 The control ISO/IEC 27001 A.7.2.1 applies.
responsibilities
Information security The organization shall implement control
PIMS ISMS 7.2.2 awareness, education ISO/IEC 27001 A.7.2.2, following the additional
and training guidance in ISO/IEC 27701, 6.4.2.2.
PIMS ISMS 7.2.3 Disciplinary process The control ISO/IEC 27001 A.7.2.3 applies.
PIMS ISMS 7.3 Termination and change of employment
Objective: To protect the organization’s interests as part of the process of changing or terminating
employment.
Termination or change
PIMS ISMS 7.3.1 of employment The control ISO/IEC 27001 A.7.3.1 applies.
responsibilities
PIMS ISMS 8 Asset management
PIMS ISMS 8.1 Responsibility for assets
Objective: To identify organizational assets and define appropriate protection responsibilities.
PIMS ISMS 8.1.1 Inventory of assets The control ISO/IEC 27001 A.8.1.1 applies.
PIMS ISMS 8.1.2 Ownership of assets The control ISO/IEC 27001 A.8.1.2 applies.
PIMS ISMS 8.1.3 Acceptable use of assets The control ISO/IEC 27001 A.8.1.3 applies.
PIMS ISMS 8.1.4 Return of assets The control ISO/IEC 27001 A.8.1.4 applies.
PIMS ISMS 8.2 Information classification
Objective: To ensure that information receives an appropriate level of protection in accordance with
its importance to the organization.
The organization shall implement control
Classification of
PIMS ISMS 8.2.1 ISO/IEC 27001 A.8.2.1, following the additional
information
guidance in ISO/IEC 27701, 6.5.2.1.
The organization shall implement control
PIMS ISMS 8.2.2 Labelling of information ISO/IEC 27001 A.8.2.2, following the additional
guidance in ISO/IEC 27701, 6.5.2.2.
PIMS ISMS 8.2.3 Handling of assets The control ISO/IEC 27001 A.8.2.3 applies.
PIMS ISMS 8.3 Media handling
Objective: To prevent unauthorized disclosure, modification, removal or destruction of information
stored on media.
The organization shall implement control
Management of
PIMS ISMS 8.3.1 ISO/IEC 27001 A.8.3.1, following the additional
removable media
guidance in ISO/IEC 27701, 6.5.3.1.
The organization shall implement control
PIMS ISMS 8.3.2 Disposal of media ISO/IEC 27001 A.8.3.2, following the additional
guidance in ISO/IEC 27701, 6.5.3.2.
The organization shall implement control
PIMS ISMS 8.3.3 Physical media transfer ISO/IEC 27001 A.8.3.3, following the additional
guidance in ISO/IEC 27701, 6.5.3.3.
PIMS ISMS 9 Access control
PIMS ISMS 9.1 Business requirements of access control
Objective: To limit access to information and information processing facilities.
The organization shall implement control
PIMS ISMS 9.1.1 Access control policy
ISO/IEC 27001 A.9.1.1.
Access to networks and
PIMS ISMS 9.1.2 The control ISO/IEC 27001 A.9.1.2 applies.
network services
PIMS ISMS 9.2 User access management
Objective: To ensure authorized user access and to prevent unauthorized access to systems and
services.
The organization shall implement control
User registration and
PIMS ISMS 9.2.1 ISO/IEC 27001 A.9.2.1, following the additional
de-registration
guidance in ISO/IEC 27701, 6.6.2.1.
The organization shall implement control
PIMS ISMS 9.2.2 User access provisioning ISO/IEC 27001 A.9.2.2, following the additional
guidance in ISO/IEC 27701, 6.6.2.2.
Management of The organization shall implement control
PIMS ISMS 9.2.3
privileged access rights ISO/IEC 27001 A.9.2.3.
Management of secret
PIMS ISMS 9.2.4 authentication The control ISO/IEC 27001 A.9.2.4 applies.
information of users
Review of user access The organization shall implement control
PIMS ISMS 9.2.5
rights ISO/IEC 27001 A.9.2.5.
Removal or adjustment The organization shall implement control
PIMS ISMS 9.2.6
of access rights ISO/IEC 27001 A.9.2.6.
PIMS ISMS 9.3 User responsibilities
Objective: To make users accountable for safeguarding their authentication information.
Use of secret
PIMS ISMS 9.3.1 authentication The control ISO/IEC 27001 A.9.3.1 applies.
information
PIMS ISMS 9.4 System and application control
Objective: To prevent unauthorized access to systems and applications.
Information access The organization shall implement control
PIMS ISMS 9.4.1
restriction ISO/IEC 27001 A.9.4.1.
The organization shall implement control
Secure log-on
PIMS ISMS 9.4.2 ISO/IEC 27001 A.9.4.2, following the additional
procedures
guidance in ISO/IEC 27701, 6.6.2.2.
Password management
PIMS ISMS 9.4.3 The control ISO/IEC 27001 A.9.4.3 applies.
system
Use of privileged utility
PIMS ISMS 9.4.4 The control ISO/IEC 27001 A.9.4.4 applies
programs
Access control to
PIMS ISMS 9.4.5 The control ISO/IEC 27001 A.9.4.5 applies
program source code
PIMS ISMS 10 Cryptography
PIMS ISMS 10.1 Cryptographic controls
Objective: To ensure proper and effective use of cryptography to protect the confidentiality,
authenticity and/or integrity of information
The organization shall implement control
Policy on the use of
PIMS ISMS 10.1.1 ISO/IEC 27001 A.10.1.1, following the additional
cryptographic controls
guidance in ISO/IEC 27701, 6.7.1.1
PIMS ISMS 10.1.2 Key management The control ISO/IEC 27001 A.10.1.2 applies.
PIMS ISMS 11 Physical and environmental security
PIMS ISMS 11.1 Secure areas
Objective: To prevent unauthorized physical access, damage and interference to the organization’s
information and information processing facilities.
Physical security
PIMS ISMS 11.1.1 The control ISO/IEC 27001 A.11.1.1 applies.
perimeter
PIMS ISMS 11.1.2 Physical entry controls The control ISO/IEC 27001 A.11.1.2 applies.
Securing offices, rooms
PIMS ISMS 11.1.3 The control ISO/IEC 27001 A.11.1.3 applies.
and facilities
Protecting against
PIMS ISMS 11.1.4 external and The control ISO/IEC 27001 A.11.1.4 applies.
environmental threats
PIMS ISMS 11.1.5 Working in secure areas The control ISO/IEC 27001 A.11.1.5 applies.
Delivery and loading
PIMS ISMS 11.1.6 The control ISO/IEC 27001 A.11.1.6 applies.
areas
PIMS ISMS 11.2 Equipment
Objective: To prevent loss, damage, theft or compromise of assets and interruption to the organization’s
operations.
Equipment siting and
PIMS ISMS 11.2.1 The control ISO/IEC 27001 A.11.2.1 applies.
protection
PIMS ISMS 11.2.2 Supporting utilities The control ISO/IEC 27001 A.11.2.2 applies.
PIMS ISMS 11.2.3 Cabling security The control ISO/IEC 27001 A.11.2.3 applies.
PIMS ISMS 11.2.4 Equipment maintenance The control ISO/IEC 27001 A.11.2.4 applies.
PIMS ISMS 11.2.5 Removal of assets The control ISO/IEC 27001 A.11.2.5 applies.
Security of equipment
PIMS ISMS 11.2.6 The control ISO/IEC 27001 A.11.2.6 applies.
and assets off-premises
The organization shall implement control
Secure disposal or reuse
PIMS ISMS 11.2.7 ISO/IEC 27001 A.11.2.7, following the additional
of equipment
guidance in ISO/IEC 27701, 6.8.2.7.
Unattended user
PIMS ISMS 11.2.8 The control ISO/IEC 27001 A.11.2.8 applies.
equipment
The organization shall implement control
Clear desk and clear
PIMS ISMS 11.2.9 ISO/IEC 27001 A.11.2.9, following the additional
screen policy
guidance in ISO/IEC 27701, 6.8.2.9.
PIMS ISMS 12 Operations security
PIMS ISMS 12.1 Operational procedures and responsibilities
Objective: To ensure correct and secure operations of information processing facilities.
Documented operating
PIMS ISMS 12.1.1 The control ISO/IEC 27001 A.12.1.1 applies.
procedures
PIMS ISMS 12.1.2 Change management The control ISO/IEC 27001 A.12.1.2 applies.
PIMS ISMS 12.1.3 Capacity management The control ISO/IEC 27001 A.12.1.3 applies.
Separation of
development, testing The organization shall implement control
PIMS ISMS 12.1.4
and operational ISO/IEC 27001 A.12.1.4.
environments
PIMS ISMS 12.2 Protection from malware
Objective: To ensure that information and information processing facilities are protected against
malware.
Controls against
PIMS ISMS 12.2.1 The control ISO/IEC 27001 A.12.2.1 applies.
malware
PIMS ISMS 12.3 Backup
Objective: To protect against loss of data.
The organization shall implement control
PIMS ISMS 12.3.1 Information backup ISO/IEC 27001 A.12.3.1, following the additional
guidance in ISO/IEC 27701, 6.7.1.1.
PIMS ISMS 12.4 Logging and monitoring
Objective: To record events and generate evidence.
The organization shall implement control
PIMS ISMS 12.4.1 Event logging ISO/IEC 27001 A.12.4.1, following the additional
guidance in ISO/IEC 27701, 6.9.4.1.
The organization shall implement control
Protection of log
PIMS ISMS 12.4.2 ISO/IEC 27001 A.12.4.2, following the additional
information
guidance in ISO/IEC 27701, 6.9.4.2.
Administrator and
PIMS ISMS 12.4.3 The control ISO/IEC 27001 A.12.4.3 applies.
operator logs
PIMS ISMS 12.4.4 Clock synchronisation The control ISO/IEC 27001 A.12.4.4 applies.
PIMS ISMS 12.5 Control of operational software
Objective: To ensure the integrity of operational systems.
Installation of software
PIMS ISMS 12.5.1 The control ISO/IEC 27001 A.12.5.1 applies.
on operational systems
PIMS ISMS 12.6 Technical vulnerability management
Objective: To prevent exploitation of technical vulnerabilities.
Management of
PIMS ISMS 12.6.1 The control ISO/IEC 27001 A.12.6.1 applies.
technical vulnerabilities
Restrictions on software
PIMS ISMS 12.6.2 The control ISO/IEC 27001 A.12.6.2 applies.
installation
PIMS ISMS 12.7 Information systems audit considerations
Objective: To minimize the impact of audit activities on operational systems.
Information systems
PIMS ISMS 12.7.1 The control ISO/IEC 27001 A.12.7.1 applies.
audit control
PIMS ISMS 13 Communications security
PIMS ISMS 13.1 Network security management
Objective: To ensure the protection of information in networks and its supporting information
processing facilities.
PIMS ISMS 13.1.1 Network controls The control ISO/IEC 27001 A.13.1.1 applies.
Security of network
PIMS ISMS 13.1.2 The control ISO/IEC 27001 A.13.1.2 applies.
services
PIMS ISMS 13.1.3 Segregation in networks The control ISO/IEC 27001 A.13.1.3 applies.
PIMS ISMS 13.2 Information transfer
Objective: To maintain the security of information transferred within an organization and with any
external entity.
The organization shall implement control
Information transfer
PIMS ISMS 13.2.1 ISO/IEC 27001 A.13.2.1, following the additional
policies and procedures
guidance in ISO/IEC 27701, 6.10.2.1.
Agreements on
PIMS ISMS 13.2.2 The control ISO/IEC 27001 A.13.2.2 applies.
information transfer
PIMS ISMS 13.2.3 Electronic messaging The control ISO/IEC 27001 A.13.2.3 applies.
Confidentiality or The organization shall implement control
PIMS ISMS 13.2.4 nondisclosure ISO/IEC 27001 A.13.2.4, following the additional
agreements guidance in ISO/IEC 27701, 6.10.2.4.
PIMS ISMS 14 System acquisition, development and maintenance
PIMS ISMS 14.1 Security requirements of information systems
Objective: To ensure that information security and privacy is an integral part of information systems
across the entire lifecycle. This also includes the requirements for information systems which provide
services over public networks.
Information security
PIMS ISMS 14.1.1 requirements analysis The control ISO/IEC 27001 A.14.1.1 applies.
and specification
Securing application The organization shall implement control
PIMS ISMS 14.1.2 services on public ISO/IEC 27001 A.14.1.2, following the additional
networks guidance in ISO/IEC 27701, 6.11.1.2.
Protecting application
PIMS ISMS 14.1.3 The control ISO/IEC 27001 A.14.1.3 applies.
services transactions
PIMS ISMS 14.2 Security in development and support processes
Objective: To ensure that information security and privacy is designed and implemented within the
development lifecycle of information systems.
The organization shall implement control
Secure development
PIMS ISMS 14.2.1 ISO/IEC 27001 A.14.2.1, following the additional
policy
guidance in ISO/IEC 27701, 6.11.2.1.
System change control
PIMS ISMS 14.2.2 The control ISO/IEC 27001 A.14.2.2 applies.
procedures
Technical review of
applications after
PIMS ISMS 14.2.3 The control ISO/IEC 27001 A.14.2.3 applies.
operating platform
changes
Restrictions on changes
PIMS ISMS 14.2.4 The control ISO/IEC 27001 A.14.2.4 applies.
to software packages
The organization shall implement control
Secure system
PIMS ISMS 14.2.5 ISO/IEC 27001 A.14.2.5, following the additional
engineering principle
guidance in ISO/IEC 27701, 6.11.2.5.
Secure development
PIMS ISMS 14.2.6 The control ISO/IEC 27001 A.14.2.6 applies.
environment
The organization shall implement control
Outsourced
PIMS ISMS 14.2.7 ISO/IEC 27001 A.14.2.7, following the additional
development
guidance in ISO/IEC 27701, 6.11.2.7.
PIMS ISMS 14.2.8 System security testing The control ISO/IEC 27001 A.14.2.8 applies.
System acceptance
PIMS ISMS 14.2.9 The control ISO/IEC 27001 A.14.2.9 applies.
testing
PIMS ISMS 14.3 Test data
Objective: To ensure the protection of data used for testing.
The organization shall implement control
PIMS ISMS 14.3.1 Protection of test data ISO/IEC 27001 A.14.3.1, following the additional
guidance in ISO/IEC 27701, 6.11.3.1.
PIMS ISMS 15 Supplier relationships
PIMS ISMS 15.1 Information security in supplier relationships
Objective: To ensure protection of the organization’s assets that is accessible by suppliers.
Information security
The organization shall implement control
PIMS ISMS 15.1.1 policy for supplier
ISO/IEC 27001 A.15.1.1.
relationships
Addressing security The organization shall implement control
PIMS ISMS 15.1.2 within supplier ISO/IEC 27001 A.15.1.2, following the additional
agreement guidance in ISO/IEC 27701, 6.12.1.2.
Information and
The organization shall implement control
PIMS ISMS 15.1.3 communication
ISO/IEC 27001 A.15.1.3.
technology supply chain
PIMS ISMS 15.2 Supplier service delivery management
Objective: To maintain an agreed level of information security and privacy, and service delivery in line
with supplier agreements.
Monitoring and review The organization shall implement control
PIMS ISMS 15.2.1
of supplier services ISO/IEC 27001 A.15.2.1.
Managing changes to The organization shall implement control
PIMS ISMS 15.2.2
supplier services ISO/IEC 27001 A.15.2.2.
PIMS ISMS 16 Information security incident management
PIMS ISMS 16.1 Management of information security incidents and improvements
Objective: To ensure a consistent and effective approach to the management of information security
and privacy incidents, including communication on security and privacy events and weaknesses.
The organization shall implement control
ISO/IEC 27001 A.16.1.1, following the additional
guidance in ISO/IEC 27701, 6.13.1.1 and these
additional refinements:
— The organization shall establish responsibilities
and procedures for information security and
privacy incident management which includes:
o criteria for notifications to required parties
(supervisory authority, customer, (joint)
Responsibilities and
controller, PII principals);
PIMS ISMS 16.1.1
procedures
o timing of notifications; and
o content of notifications.
— The organization shall identify applicable
obligations related to notifications and
document alignment with those obligations (e.g.
notification to a competent supervisory
authority without undue delay, where feasible
within 72 h after having become aware of it).
Reporting information
PIMS ISMS 16.1.2 The control ISO/IEC 27001 A.16.1.2. applies.
security events
Reporting information
PIMS ISMS 16.1.3 The control ISO/IEC 27001 A.16.1.3. applies.
security weaknesses
Assessment of and
PIMS ISMS 16.1.4 decision on information The control ISO/IEC 27001 A.16.1.4 applies.
security events
The organization shall implement control
ISO/IEC 27001 A.16.1.5, following the additional
guidance in ISO/IEC 27701, 6.13.1.5 and these
additional refinements:
Refinements for PII controllers:
The organization shall identify applicable
obligations related to criteria for notifications to the
supervisory authority, and/or to the PII principals,
and document alignment with those obligations (for
example criteria related to risks for the PII
principals).
Notifications shall contain as a minimum the
following:
— a contact point where more information can be
Response to information
PIMS ISMS 16.1.5
obtained;
security incidents
— a description of and the likely consequences of
the breach;
— the number of individuals concerned as well as
the number of records concerned;
— measures taken or planned to be taken.
Refinements of PII processors:
In case of breach of PII, the PII processor shall notify
the PII controller of the existence of the breach
without undue delay after becoming aware of the
breach so that the PII controller can take the
appropriate actions.
Learning from
PIMS ISMS 16.1.6 information security The control ISO/IEC 27001 A.16.1.6. applies.
incidents
PIMS ISMS 16.1.7 Collection of evidence The control ISO/IEC 27001 A.16.1.7 applies.
PIMS ISMS 17 Information security aspects of business continuity management
PIMS ISMS 17.1 Information security continuity
Objective: Information security and privacy continuity shall be embedded in the organization’s
business continuity management systems.
Planning information
PIMS ISMS 17.1.1 The control ISO/IEC 27001 A.17.1.1 applies.
security continuity
Implementing
PIMS ISMS 17.1.2 information security The control ISO/IEC 27001 A.17.1.2 applies.
continuity
Verify, review and
PIMS ISMS 17.1.3 evaluate information The control ISO/IEC 27001 A.17.1.3 applies.
security continuity
PIMS ISMS 17.2 Redundancies
Objective: To ensure availability of information processing facilities.
Availability of
PIMS ISMS 17.2.1 information processing The control ISO/IEC 27001 A.17.2.1 applies.
facilities
PIMS ISMS 18 Compliance
PIMS ISMS 18.1 Compliance with legal and contractual requirements
Objective: To avoid breaches of legal, statutory, regulatory or contractual obligations related to
information security and privacy and of any security and privacy requirements.
Identification of
The organization shall implement control
applicable legislation
PIMS ISMS 18.1.1 ISO/IEC 27001 A.18.1.1, following the additional
and contractual
guidance in ISO/IEC 27701, 6.15.1.1.
requirements
Intellectual property
PIMS ISMS 18.1.2 The control ISO/IEC 27001 A.18.1.2 applies.
rights
The organization shall implement control
PIMS ISMS 18.1.3 Protection of records ISO/IEC 27001 A.18.1.3, following the additional
guidance in ISO/IEC 27701, 6.15.1.3.
Privacy and protection
The organization shall implement control
PIMS ISMS 18.1.4 of personally
ISO/IEC 27001 A.18.1.4.
identifiable information
Regulation of
PIMS ISMS 18.1.5 The control ISO/IEC 27001 A.18.1.5 applies.
cryptographic control
PIMS ISMS 18.2 Information security reviews
Objective: To ensure that information security and privacy is implemented and operated in accordance
with the organizational policies and procedures.
The organization shall implement control
Independent review of
PIMS ISMS 18.2.1 ISO/IEC 27001 A.18.2.1, following the additional
information security
guidance in ISO/IEC 27701, 6.15.2.1.
Compliance with
PIMS ISMS 18.2.2 security policies and The control ISO/IEC 27001 A.18.2.2 applies.
standards
The organization shall implement control
Technical compliance
PIMS ISMS 18.2.3 ISO/IEC 27001 A.18.2.3, following the additional
review
guidance in ISO/IEC 27701, 6.15.2.3.
Annex B
(normative)
PIMS-specific reference control objectives and controls (PII Controllers)
This annex is for use by organizations acting as PII controllers, with or without the use of PII processors.
It refines ISO/IEC 27701:2021, Annex A.
In Table B.1, references to ISO/IEC 27701:2021 controls are in the form “The organization shall
implement control ISO/IEC 27701 [control number A.x.y.z.] following the additional guidance in …”; it
means that the organization shall implement all these controls following the related guidance to fulfil the
general requirement in Clause 6 (in all cases, whatever the risk assessment and risk treatment).
NOTE Clause numbers in this annex relate to the subclause numbers in ISO/IEC 27701:2021, Annex A.
Table B.1 — Control objectives and controls
PIMS CTR 7.2 Conditions for collection and processing
Objective: To determine and document that processing is lawful, with legal basis as per applicable
jurisdictions, and with clearly defined and legitimate purposes
PIMS CTRL Identify and document The organization shall implement control ISO/IEC 27701
7.2.1 purpose A.7.2.1, following the guidance in ISO/IEC 27701, 7.2.1.
PIMS CTRL The organization shall implement control ISO/IEC 27701
Identify lawful basis
7.2.2 A.7.2.2, following the guidance in ISO/IEC 27701, 7.2.2.
Determine when and
PIMS CTRL The organization shall implement control ISO/IEC 27701
how consent is to be
7.2.3 A.7.2.3, following the guidance in ISO/IEC 27701, 7.2.3.
obtained
PIMS CTRL Obtain and record The organization shall implement control ISO/IEC 27701
7.2.4 consent A.7.2.4, following the guidance in ISO/IEC 27701, 7.2.4.
The organization shall implement control ISO/IEC 27701
A.7.2.5, following the guidance in ISO/IEC 27701, 7.2.5 and
these additional refinements:
- The organization shall identify processing operations
which may result in high risks to the rights and
freedoms of PII principals.
- The organization shall undertake and document
privacy impact assessments for high risk processing
operations.
- The organization shall involve the DPO or the persons
in charge of privacy matters (where a DPO is not
designated) in the review of high risk processing and
in carrying out the PIA.
- The organization, where appropriate, shall seek the
views of the PII principals or their representative,
without prejudice to the protection of commercial or
PIMS CTRL Privacy impact public interests or the security of processing
7.2.5 assessment
operations.
- When a PIA identifies processing that may result in
high risks to PII principals, in the absence of measures
taken by the controller to mitigate residual risk, the
organization shall consult the supervisory authorities
prior to processing, and supply them with the details
required.
The PIA shall at the minimum:
− describe systematically the envisaged processing
operations and their purposes;
− describe the legal basis of the processing activity;
− assess the necessity and proportionality of the
processing operations in relation to the purposes;
− identify and assess risks to PII principals;
− identify the measures that will address the risks to PII
principals.
PIMS CTRL Contracts with PII The organization shall implement control ISO/IEC 27701
7.2.6 processors A.7.2.6, following the guidance in ISO/IEC 27701, 7.2.6.
PIMS CTRL The organization shall implement control ISO/IEC 27701
Joint PII controller
7.2.7 A.7.2.7, following the guidance in ISO/IEC 27701, 7.2.7.
PIMS CTRL Records related to The organization shall implement control ISO/IEC 27701
7.2.8 processing PII A.7.2.8, following the guidance in ISO/IEC 27701, 7.2.8.
PIMS CTRL 7.3 Obligations to PII principals
Objective: To ensure that PII principals are provided with appropriate information about the
processing of their PII and to meet any other applicable obligations to PII principals related to the
processing of their PII.
Determining and
The organization shall implement control ISO/IEC 27701
PIMS CTRL
fulfilling obligations to
A.7.3.1, following the guidance in ISO/IEC 27701, 7.3.1.
7.3.1
PII principals
Determining
The organization shall implement control ISO/IEC 27701
PIMS CTRL
informa
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

The standard EN 17926:2023 offers a comprehensive framework for organizations seeking to implement a Privacy Information Management System (PIMS) in accordance with ISO/IEC 27701, particularly refined for the European context. The scope of the document is particularly relevant, providing tailored specifications that enhance the applicability of ISO/IEC 27701. This ensures organizations can effectively align their PIMS with both generic requirements and specific local obligations. One of the standout strengths of EN 17926:2023 is its dual applicability for both organizations and certification bodies. Organizations can utilize the guidelines to not only establish their PIMS but also ensure compliance with European regulations, which is critical given the region's stringent data protection laws. Furthermore, for certification bodies, the standards outlined serve as a robust basis for developing certification criteria, thus facilitating the verification of conformity to ISO/IEC 27701. This integration of ISO/IEC 17065 and ISO/IEC 17021 requirements creates a streamlined certification model that reinforces credibility in data protection efforts. Additionally, the document provides valuable provisions that accreditation bodies and regulatory authorities can leverage to establish sound certification mechanisms. This feature emphasizes the standard's holistic approach to privacy information management, making it a vital resource in fostering trust and accountability within organizations that handle personal data. Overall, EN 17926:2023 positions itself as an essential document in the realm of privacy information management, harmonizing the need for compliance with ISO/IEC 27701 while addressing the unique nuances of the European context. Its structured approach not only supports effective implementation but also facilitates rigorous certification processes, ultimately enhancing the overall landscape of privacy management systems.

표준 EN 17926:2023은 ISO/IEC 27701의 유럽 맥락에서의 응용에 대한 세부 사항을 규정하고 있습니다. 이 문서는 조직이 ISO/IEC 27701의 일반 요구사항 및 통제를 해당 맥락과 적용 가능한 의무에 따라 효과적으로 구현할 수 있도록 돕습니다. 표준의 이러한 범위는 조직이 개인정보 관리 시스템(Privacy Information Management System, PIMS)을 수립하고 운영할 때 필요한 지침을 제공합니다. 이 표준의 강점 중 하나는 인증 기관이 ISO/IEC 27701에 대한 적합성을 검증하기 위한 인증 기준의 기초로 사용할 수 있는 명확한 사양을 제공한다는 점입니다. 이는 개인정보 관리 시스템의 처리 작업에 대한 인증 모델을 제공하며, ISO/IEC 17065의 요구 사항과 결합할 수 있는 유연성을 지니고 있습니다. 결과적으로, 이러한 구조는 인증 과정의 투명성과 신뢰성을 증대시킵니다. 또한, ISO/IEC 27701에 따른 인증 요구 사항을 ISO/IEC 17021 하에 조화롭게 결합할 수 있는 가능성은 이 문서의 또 다른 중요한 특성입니다. 이는 인증 기관과 규제 당국이 이 문서의 조항을 사용하여 인증 메커니즘을 설립하는 데 필요한 기준을 마련할 수 있도록 지원합니다. EN 17926:2023은 유럽 내에서의 개인정보 보호와 관리에 있어 중요한 기준을 제공하며, 조직의 복잡한 법적 의무를 충족하는 데 유용한 도구입니다. 표준의 명확성과 구체성이 조직에 실질적인 가이드를 제공함으로써, 개인정보 보호와 관련된 효율적인 시스템을 구축할 수 있게 합니다.

Le document SIST EN 17926:2024 présente une norme essentielle pour le système de gestion des informations de confidentialité, spécifiquement adaptée au contexte européen. Cette norme se concentre sur l'application des exigences générales et des contrôles décrits dans ISO/IEC 27701, tout en tenant compte des spécificités réglementaires et des obligations des organisations en Europe. L'un des principaux atouts de cette norme est sa capacité à offrir des précisions ciblées pour l'application d'ISO/IEC 27701 dans un cadre juridique et culturel européen, ce qui renforce la pertinence de cette certification pour les entreprises opérant au sein de l'UE. Les organismes de certification peuvent s'appuyer sur les spécifications de cette norme pour établir des critères de certification, permettant ainsi une validation rigoureuse de la conformité au standard international. De plus, les critères de certification basés sur SIST EN 17926:2024 offrent un modèle de certification efficace selon ISO/IEC 17065, spécifiquement pour les opérations de traitement effectuées dans le cadre d'un système de gestion des informations de confidentialité. En parallèle, les exigences de certification pour ISO/IEC 27701 peuvent également être intégrées, facilitant ainsi la mise en œuvre harmonisée et coordonnée des normes. Enfin, les organismes d'accréditation et les autorités réglementaires peuvent utiliser les dispositions de ce document pour établir des mécanismes de certification robustes. Cela assure une conformité systématique aux exigences de gestion de la confidentialité, essentiel pour renforcer la confiance des consommateurs et la protection des données personnelles dans un paysage numérique en constante évolution. En résumé, SIST EN 17926:2024 constitue une ressource incontournable pour toute organisation souhaitant implémenter un système de gestion de l'information de confidentialité conforme à ISO/IEC 27701 au sein du contexte européen.

SIST EN 17926:2024は、ISO/IEC 27701に基づくプライバシー情報管理システムの標準化文書であり、特にヨーロッパの文脈における適用のための精緻化を規定しています。この文書は、ISO/IEC 27701の一般的な要件およびコントロールの実施に対する指針を提供し、組織がその特定の文脈や適用される義務に従い、プライバシー情報管理に必要な基準を遵守することが可能となります。 この標準の強みは、その適用可能性の幅広さにあります。組織は、ISO/IEC 27701に準拠するための具体的な手順や要件を受け入れやすく、また認証機関はこの文書に記載された規定を用いてISO/IEC 27701への適合性を検証するための認証基準を構築できます。特に、ISO/IEC 17065の下でのプライバシー情報管理システムに関連する処理業務に対する認証モデルが提供されるため、組織にとって非常に実用的なリソースとなります。 さらに、認証機関は、ISO/IEC 27701に基づく認証要件と組み合わせることで、相乗効果を生み出すことができます。この点において、SIST EN 17926:2024は、組織に求められるプライバシー情報管理の枠組みを強化し、合規性を確保するための重要な文書となるでしょう。 最後に、認定機関や規制当局は、この文書の規定を認証メカニズムの確立に利用できるため、その適用範囲は広がり、プライバシー関連のコンプライアンスを推進する上での重要なツールとなります。全体として、SIST EN 17926:2024は、ISO/IEC 27701に関連するプライバシー情報管理システムの実装において、欧州内での実務を支える重要な基準です。

Die Norm EN 17926:2023 stellt eine wichtige Erweiterung für die Anwendung von ISO/IEC 27701 im europäischen Kontext dar. Der Geltungsbereich dieser Norm umfasst spezifische Verfeinerungen, die Organisationen dabei helfen, die allgemeinen Anforderungen und Kontrollen von ISO/IEC 27701 gemäß ihrem spezifischen Kontext und ihren geltenden Verpflichtungen umzusetzen. Dies ist besonders relevant, da die Datenschutzanforderungen in Europa komplex und vielschichtig sind, wodurch die Notwendigkeit einer maßgeschneiderten Anleitung entsteht. Ein herausragendes Merkmal der Norm ist ihre Anpassungsfähigkeit. Organisationen können diese Norm nutzen, um ihre Datenschutzinformationen und das Managementsystem effektiver zu gestalten. Diese Norm legt klare Richtlinien fest, die den praktischen Bedürfnissen europäischer Organisationen gerecht werden und die Konformität mit den geltenden Datenschutzgesetzen unterstützen. Die Stärke der Norm liegt daher in ihrer Fähigkeit, praktische Lösungen für die Herausforderungen zu bieten, die in einem sich ständig weiterentwickelnden regulatorischen Umfeld entstehen. Zudem können Zertifizierungsstellen die in diesem Dokument enthaltenen Spezifikationen als Grundlage für Zertifizierungskriterien verwenden, um die Konformität mit ISO/IEC 27701 zu überprüfen. Dies fördert nicht nur das Vertrauen in Zertifizierungsprozesse, sondern unterstützt auch die Schaffung eines strukturierten Modells unter ISO/IEC 17065 für die Verarbeitung von Daten innerhalb eines Privacy Information Management Systems gemäß ISO/IEC 27701. Kombinationen mit den Zertifizierungsanforderungen für ISO/IEC 27701 unter ISO/IEC 17021 ermöglichen eine umfassende und integrierte Zertifizierungsperspektive. Zudem können Akkreditierungsstellen oder Regulierungsbehörden die Bestimmungen in diesem Dokument als Kriterien verwenden, um Zertifizierungsmechanismen einzurichten. Diese Zeitgemäßheit fördert nicht nur die Standardisierung in der Branche, sondern garantiert auch eine breite Akzeptanz und Anwendung der Normenspezifikationen. Insgesamt bietet die EN 17926:2023 einen klaren, anpassbaren Rahmen, der den gestiegenen Anforderungen an den Datenschutz gerecht wird und Organisationen die notwendige Unterstützung bietet, um ein effektives Privacy Information Management System gemäß ISO/IEC 27701 auf europäischer Ebene zu implementieren.

The article discusses the refinements of EN 17926:2023, which is an application of ISO/IEC 27701 in a European context. This document provides specifications for organizations to implement the requirements and controls of ISO/IEC 27701 based on their own context and obligations. Certification bodies can use these specifications as a basis for certification criteria to verify conformity to ISO/IEC 27701. This certification model can be combined with certification requirements for ISO/IEC 27701 under ISO/IEC 17021. Accreditation bodies or regulatory authorities can use the provisions in this document as criteria for establishing certification mechanisms.

이 문서는 ISO/IEC 27701의 유럽 환경에서의 응용에 대한 수정 사항을 명시합니다. 기관은 이 문서를 사용하여 그들의 맥락과 적용 가능한 의무에 따라 ISO/IEC 27701의 일반 요구 사항과 통제를 구현할 수 있습니다. 인증기관은 이 문서의 사양을 ISO/IEC 27701에 대한 준수를 확인하기 위한 인증 기준의 기반으로 사용할 수 있습니다. 이러한 사양을 기반으로 한 인증 기준은 ISO/IEC 27701에 따른 개인 정보 관리 시스템의 범위 내에서 수행되는 처리 작업에 대한 ISO/IEC 17065 하의 인증 모델을 제공할 수 있으며, 이는 ISO/IEC 17021 하에 ISO/IEC 27701에 대한 인증 요구 사항과 결합될 수 있습니다. 인증 기관 또는 규제 기관은 이 문서의 규정을 인증 메커니즘을 수립하기 위한 기준으로 사용할 수 있습니다.

この文書は、ISO/IEC 27701のヨーロッパコンテキストでの応用における改良点を指定しています。組織は、自身のコンテキストと適用義務に基づいてISO/IEC 27701の一般的な要件と管理措置を実装するために、この文書を使用することができます。認証機関は、この文書の仕様を使用して、ISO/IEC 27701への準拠を検証するための認証基準の基盤として利用することができます。これらの仕様に基づく認証基準は、ISO/IEC 27701に準拠したプライバシー情報管理システムのスコープ内で実施される処理操作に対するISO/IEC 17065の下での認証モデルを提供し、ISO/IEC 17021の下でのISO/IEC 27701の認証要件と組み合わせることができます。認定機関や規制当局は、この文書の規定を認証メカニズムの基準を確立するための基準として使用することができます。