ISO 277018 min read

ISO 27701 PII Controller Requirements

When your organization determines the purposes and means of processing personal data, you act as a PII controller. ISO 27701 Annex A provides 31 specific controls that controllers must implement to protect the rights and interests of data subjects. These controls integrate with your PIMS requirements and map directly to GDPR obligations.

Key Takeaways

Point Summary
Definition PII controllers determine why and how personal data is processed
Control count 31 controls across 8 control objectives in Annex A
Key areas Lawful basis, transparency, data subject rights, privacy by design
Relationship to GDPR Direct mapping to controller obligations under Articles 5-25
Documentation Processing records, legal basis register, privacy notices
Data subject focus Protecting individual rights and interests

Quick Answer: ISO 27701 controller requirements (Annex A) address how you collect, use, share, and manage personal data. Key obligations include establishing legal basis for processing, providing transparency to data subjects, honoring rights requests, implementing privacy by design, and properly managing data sharing and international transfers.

Understanding the Controller Role

When You're a Controller

Scenario Controller Determination
You collect customer data for your service You determine purpose (service delivery) and means
You collect employee data for HR You determine purpose (employment) and means
You decide what analytics to run on user data You determine purpose (business intelligence)
You select which vendors process your data You determine means of processing

Controller vs. Joint Controller vs. Processor

Role Characteristic Example
Sole controller You alone determine purposes and means Your CRM data about your customers
Joint controller Multiple parties determine purposes/means together Shared platform with partner
Processor You process under another's instructions Hosting customer's data per their DPA

Most SaaS companies are controllers for some data (their customers, employees) and processors for other data (customer's customer data processed via their platform).

Annex A Control Objectives

A.7.2: Conditions for Collection and Processing

Establish and document the legitimacy of your processing activities.

Control Requirement Implementation
A.7.2.1 Purpose identification Identify and document processing purposes Maintain purpose register for each processing activity
A.7.2.2 Legal basis Identify legal basis for each purpose Document which GDPR Article 6 basis applies
A.7.2.3 Purpose limitation Limit processing to specified purposes Controls preventing purpose creep
A.7.2.4 Consent Obtain and record valid consent where relied upon Consent mechanisms, timestamps, scope records
A.7.2.5 Privacy impact assessment Assess impact of high-risk processing PIA/DPIA process and documentation
A.7.2.6 Contracts Establish contracts with processors DPAs with all processors
A.7.2.7 Joint controller Establish arrangements with joint controllers Joint controller agreements
A.7.2.8 Processing records Maintain records of processing activities Article 30 style processing register

Documentation required:

  • PII processing inventory with purposes
  • Legal basis register
  • Consent records and mechanisms
  • PIA/DPIA register
  • Processor and joint controller agreements

A.7.3: Obligations to PII Principals

Ensure transparency and fulfill your obligations to data subjects.

Control Requirement Implementation
A.7.3.1 Obligation determination Identify obligations to data subjects Map regulatory requirements to your processing
A.7.3.2 Purpose communication Inform data subjects of purposes Privacy notices at collection points
A.7.3.3 Consent withdrawal Enable consent withdrawal Easy-to-use withdrawal mechanisms
A.7.3.4 Consent modification Enable consent modification Preference center or equivalent
A.7.3.5 Objection mechanism Provide objection mechanism Process for processing objections
A.7.3.6 Access Provide access to PII DSAR fulfillment process
A.7.3.7 Rectification Enable correction of PII Data correction procedures
A.7.3.8 Erasure Enable deletion of PII Deletion procedures and verification
A.7.3.9 Third party notification Notify third parties of changes Propagation to processors/recipients
A.7.3.10 PII copies Provide copies of PII Secure data export capability

Key processes to implement:

  • Data subject access request (DSAR) workflow
  • Consent management with withdrawal capability
  • Data correction and deletion procedures
  • Notification cascade to third parties

A.7.4: Privacy by Design and Default

Embed privacy into the design of processing activities.

Control Requirement Implementation
A.7.4.1 Collection limitation Limit collection to what's necessary Data minimization in product/process design
A.7.4.2 Processing limitation Limit processing to what's necessary Purpose-specific processing controls
A.7.4.3 Accuracy Keep PII accurate and up to date Data quality processes
A.7.4.4 Minimization objectives Define minimization objectives Documented approach to minimization
A.7.4.5 De-identification De-identify PII where possible Pseudonymization (reversible, still PII) or anonymization (irreversible, no longer PII)
A.7.4.6 Temporary files Securely manage temporary PII Controls for temporary storage
A.7.4.7 Retention Define and enforce retention periods Retention schedules and enforcement
A.7.4.8 Disposal Securely dispose of PII Secure deletion procedures
A.7.4.9 Processing controls Implement processing transmission controls Encryption, access controls

Privacy by design principles to document:

  • Data minimization approach
  • Retention policy with schedules by data type
  • De-identification practices: pseudonymization (data remains PII, requires safeguards) vs anonymization (data no longer subject to privacy regulations)
  • Secure deletion procedures

A.7.5: PII Sharing, Transfer, and Disclosure

Control how PII is shared with third parties.

Control Requirement Implementation
A.7.5.1 Third party identification Identify third parties receiving PII Recipient register
A.7.5.2 Disclosure records Record disclosures Disclosure log
A.7.5.3 Disclosure controls Protect PII during disclosure Secure transfer mechanisms
A.7.5.4 Third party agreements Contractual protections with recipients Appropriate agreements in place

Required documentation:

  • Third party recipient register
  • Disclosure records
  • Contracts with appropriate privacy terms

Legal Basis Requirements

Documenting Legal Basis

For each processing activity, document:

Element Example
Processing activity Customer account management
PII categories Name, email, company, usage data
Legal basis Contractual necessity (Art. 6(1)(b))
Justification Required to deliver subscribed service
Retention basis Duration of contract + 7 years legal requirement

Legal Basis Options (GDPR Context)

Basis When Appropriate Documentation Needed
Consent Optional processing, marketing Consent records with timestamp, scope
Contract Processing necessary for contract Service agreement showing necessity
Legal obligation Legally required processing Specific legal requirement reference
Vital interests Emergency situations Rare, document circumstances
Public interest Public sector tasks Task definition and basis
Legitimate interests Business needs, balanced with rights LIA (Legitimate Interest Assessment)

Legitimate Interest Assessment (LIA)

When relying on legitimate interests, document:

Assessment Element Content
Purpose What are you trying to achieve?
Necessity Is this processing necessary for the purpose?
Legitimate interest What interest does it serve?
Impact assessment What's the impact on data subjects?
Balance Do data subject rights override?
Safeguards What protections are in place?

Data Subject Rights Implementation

Rights Request Workflow

Stage Activities
1. Receipt Log request, acknowledge within 24-48 hours
2. Verification Verify identity of requester
3. Assessment Determine scope, exemptions, extension needs
4. Fulfillment Gather data, prepare response, quality check
5. Response Deliver response within deadline (30 days GDPR)
6. Documentation Record request and outcome

Rights Request Metrics

Metric Target
Response time Within regulatory deadline (GDPR: 30 days)
Acknowledgment Within 48 hours of receipt
Completion rate 100% of valid requests fulfilled
Quality Accurate, complete responses

Privacy Notice Requirements

Required Content

Element Description
Controller identity Who you are, contact details
DPO contact If appointed, contact information
Processing purposes Why you process data
Legal basis Lawful basis for each purpose
Categories of data What personal data you collect
Recipients Who receives the data
Transfers International transfers and safeguards
Retention How long data is kept
Rights Data subject rights and how to exercise
Consent withdrawal How to withdraw consent
Complaint right Right to complain to supervisory authority
Source Where you got the data (if not from subject)
Automated decisions Profiling and automated decision-making

Notice Delivery

Collection Method Notice Delivery
Direct collection At time of collection
Indirect collection Within reasonable period, max 1 month
Website Privacy policy accessible from all pages
Mobile app In-app privacy notice
Offline Written notice at collection

Common Questions

What's the difference between controller and processor controls?

Controller controls (Annex A) focus on determining and communicating processing purposes, honoring data subject rights, and privacy by design. Processor controls (Annex B) focus on following controller instructions and assisting controllers with their obligations.

What's the difference between pseudonymization and anonymization?

Pseudonymization replaces identifiers with artificial keys but remains reversible with additional information. Pseudonymized data is still personal data under GDPR and requires protection. Anonymization irreversibly removes all identifiers so individuals cannot be re-identified. Truly anonymized data falls outside GDPR scope. Most operational de-identification is pseudonymization because organizations need to re-link data for legitimate purposes.

Do I need to implement all 31 Annex A controls?

You must consider all controls and document in your Statement of Applicability which apply. Some may not apply if you don't perform certain activities (e.g., joint controller controls if you're not a joint controller).

How detailed must consent records be?

Detailed enough to demonstrate valid consent: who consented, when, to what specifically, what information was provided, and how. Timestamps, version of privacy notice, and specific consent scope are essential.

What if I rely on legitimate interests instead of consent?

You must document a Legitimate Interest Assessment (LIA) showing you've balanced your interests against data subject rights. This documentation is essential for demonstrating compliance.

How Bastion Helps

Implementing controller requirements requires understanding both legal obligations and practical operations. We help organizations implement effective controller controls.

Service Description
Processing inventory Comprehensive documentation of all processing activities
Legal basis mapping Document appropriate legal basis for each activity
Rights workflow Design and implement DSAR fulfillment processes
Privacy notices Develop compliant privacy communications
Control implementation Implement Annex A controls systematically

Ready to implement ISO 27701 controller requirements? Talk to our team


Sources