Auditing Checklist ISO27701 - Draft - 01 - Landscape RV MBv1
Auditing Checklist ISO27701 - Draft - 01 - Landscape RV MBv1
This is a sector-specific document related to ISO/IEC 27001:2013 and to ISO/IEC 27002:2013. This checklist focuses on PIMS-specific requirements.
Compliance with this checklist is based on adherence to these requirements and with the requirements in ISO/IEC 27001:2013. This document extends the
requirements of ISO/IEC 27001:2013 to take into account the protection of privacy of PII principals as potentially affected by the processing of PII, in addition
to information security.
6.1 The guidelines in ISO/IEC 27002:2013 mentioning "information security" should Control Y/N
be extended to the protection of privacy as potentially affected by the processing
of PII.
All control objectives and controls should be considered in the context of both
risks to information security as well as risks to privacy related to the processing
of PII.
6.2.1.1 Either by the development of separate privacy policies, or by the augmentation of Technical Y/N
information security policies, the organization should produce a statement Implementation
concerning support for and commitment to achieving compliance with applicable
PII protection legislation and/or regulation and with the contractual terms agreed
between the organization and its partners, its subcontractors and its applicable
third parties (customers, suppliers etc.), which should clearly allocate
responsibilities between them.
Any organization that processes PII, whether a PII controller or a PII processor,
should consider applicable PII protection legislation and/or regulation during the
development and maintenance of information security policies.
6.3.1.1 The organization should designate a point of contact for use by the customer Information security Y/N
regarding the processing of PII. When the organization is a PII controller, roles and responsibilities
designate a point of contact for PII principals regarding the processing of their PII
(see 7.3.2). The organization should appoint one or more persons responsible for
developing, implementing, maintaining and monitoring an organization-wide
governance and privacy program, to ensure compliance with all applicable laws
and regulations regarding the processing of PII. The responsible person should,
where appropriate:
— be independent and report directly to the appropriate management level of the
organization in order to ensure effective management of privacy risks;
— be involved in the management of all issues which relate to the processing of
PII;
— be expert in data protection legislation, regulation and practice;
— act as a contact point for supervisory authorities;
— inform top-level management and employees of the organization of their
obligations with respect to the processing of PII;
— provide advice in respect of privacy impact assessments conducted by the
organization.
6.3.2.1 The organization should ensure that the use of mobile devices does not lead to a Mobile Device Y/N
Created by Dilraj S Sagoo - exelar Ltd Page 3 of 16
Draft 0.1
compromise of PII.
6.4.2.2 Measures should be put in place, including awareness of incident reporting, to Information security Y/N
ensure that relevant staff are aware of the possible consequences to the awareness, education
organization (e.g. legal consequences, loss of business and brand or and training
reputational damage), to the staff member (e.g. disciplinary consequences) and
to the PII principal (e.g. physical, material and emotional consequences) of
breaching privacy or security rules and procedures, especially those addressing
the handling of PII.
6.5.2.1 The organization's information classification system should explicitly consider PII Classification of Y/N
as part of the scheme it implements. Considering PII within the overall information (8.2.1)
classification system is integral to understanding what PII the organization
processes (e.g. type, special categories), where such PII is stored and the
systems through which it can flow
6.5.3.1 The organization should document any use of removable media and/or devices Removable Media Y/N
for the storage of PII. Wherever feasible, the organization should use removable (8.3.1)
physical media and/or devices that permit encryption when storing PII.
Unencrypted media should only be used where unavoidable, and in instances
where unencrypted media and/or devices are used, the organization should
implement procedures and compensating controls (e.g. tamper-evident
packaging) to mitigate risks to the PII.
6.5.3.2 Where removable media on which PII is stored is disposed of, secure disposal Disposal of Media Y/N
procedures should be included in the documented information and implemented (8.3.2)
to ensure that previously stored PII will not be accessible.
6.5.3.3 If physical media is used for information transfer, a system should be put in place Physical Media Transfer Y/N
to record incoming and outgoing physical media containing PII, including the type (8.3.3)
of physical media, the authorized sender/ recipients, the date and time, and the
number of physical media. Where possible, additional measures such as
encryption should be implemented to ensure that the data can only be accessed
at the point of destination and not in transit. The organization should subject
physical media containing PII before leaving its premises to an authorization