Protecting the Digital Privacy with PIMS (ISO 27701)
Yatin Vijay Jog
LA - 42001, 27001, 27701, 27017, 27018, 22301, 20000-1, 31000 | Automotive & OT - TISAX (AL-2, AL-3), 21434, 62443, 26262, IATF 16949 | CEH | CHFS | TOGAF | eTOM (L2)
Cybersecurity is a growing concern in this connected digital world and there is an increasingly significant threat to protecting the digital privacy. Governments all over the world are introducing various privacy regulations, such as, GDPR, California Consumer Privacy Act (CCPA), etc.
ISO 27701?is a privacy extension to the international information security management standard ISO 27001. This standard specifies the requirements for – and provides guidance for establishing, implementing, maintaining and continually improving a privacy information management system.
Every organization processes?Personally Identifiable Information (PII). The quantity, types of PII and situations in which organizations handling PII are increasing. Protection of privacy and Protection of PII is a social need?and should be a legal need also. There are two entities, who handle or process the PII, Controllers and Processors.?
PII Controllers
领英推荐
PII Processors
To effectively use PIMS, it’s very important to understand and identify who are controllers and who are processors. Accordingly, appropriate PIMS clauses can be applied.
Why PIMS?
With the publication of the?General Data Protection Regulation?(GDPR) in 2016, we have seen an increased focus on the definition, maintenance and accountability of security measures for?personal data. GDPR provides the possibility to certify your Privacy Program against a DPA approved certification scheme; and it is anticipated that ISO 27701 will also be recognized in the near future.
With the large adoption of the ISO 27001 standard, the new PIMS standard will become the preferred choice amongst service providers in a very short time.?