Understanding Leadership Responsibilities in ISO 27701 Clause 5.3
Organisational leadership and management is a recurring theme throughout all of ISO’s various information security management system-related standards.
Policies and procedures are only effective if they are both acknowledged and uniformly adhered to. Senior management plays a key role in ensuring that PII and PIMS-related activities are given the level of respect and professionalism that is warranted by their role in minimising risk, and improving information security across the board.
What’s Covered in ISO 27701 Clause 5.3
Clause 5.3 deals directly with senior management’s role in establishing a PIMS that meets an organisation’s external obligations and PII requirements from the ground up, through three key operational areas:
- Leadership and commitment.
- Policy.
- Organisational roles, responsibilities and authorities.
To achieve this, ISO 27701-5.3 contains three sub-clauses that reference guidance from 27001:2013.
All of these clauses should be viewed through the prism of establishing and maintaining a PIMS, PII security and privacy protection, rather than broadly applied to information security as a concept.
Compliance doesn't have to be complicated.
We've done the hard work for you, giving you an 81% Headstart from the moment you log on.
All you have to do is fill in the blanks.
ISO 27701 Clause 5.3.1 – Leadership and Commitment
References ISO 27001 Control 5.1
ISO 27001:2013-5.1 contains 7 main guidance points that provide top management with help on demonstrating ‘leadership and commitment’ when drafting an information security policy relating to PII.
Throughout the process of establishing a PIMS, top management should:
- Keep in mind the operational objectives of the management system as a whole, and ensure that PIMS-related activities are aligned with what the company is attempting to achieve;
- Ensure that the organisation’s PIMS is embedded within the company’s set of information security processes;
- Make available an adequate amount of resources to implement a functioning PIMS – including budget space and the right amount of employees to implement and maintain it;
- Evangelise the benefits of a PIMS to all staff within the organisation – not merely those who directly interact with it – to maximise employee buy-in and improve adherence;
- Agree upon a clear set of outcomes, in order to measure the performance of a PIMS and its impact upon PII security;
- Provide leadership and support to any employee who plays a role in improving the performance of the PIMS, and nurture a proactive attitude towards safeguarding PII;
- Offer guidance and support to members of the junior management team, within areas of their job that relate directly to PIMS-related activities and PII security.
ISO 27701 Clause 5.3.2 – Policy
References ISO 27001 Control 5.2
Information policies are the bread and butter of an organisation’s wider privacy protection efforts.
Senior management uses protocols and procedures to not only improve information security risk management as a whole, but also as a tool to measure staff performance and demonstrate to legal and regulatory authorities that the organisation is fulfilling its obligations towards PII.
Information security policies relating to privacy protection, PII and PIMS should:
- Remain relevant and appropriate to the unique commercial and resource-related needs of the organisation;
- Outline a clear set of PII-related objectives, or where this isn’t relevant, helps to establish a framework for the setting of future security and privacy goals (see ISO 27001 Clause 6.2*);
- Be mindful of any specific organisational requirements relating to PII, including those from third-party legal, advisory and regulatory bodies;
- Promote a proactive approach towards the ongoing evaluation of the organisation’s PIMS, including and improvements that can be made;
Once established, policies should be made readily available to all relevant staff as version-controlled documents, and be widely communicated throughout the organisation – either at the point of creation, or when any amendments are made that have the potential to impact PII security.
Manage all your compliance in one place
ISMS.online supports over 100 standards
and regulations, giving you a single
platform for all your compliance needs.
ISO 27701 Clause 5.3.3 – Organisational Roles, Responsibilities and Authorities
References ISO 27001 Control 5.3
Throughout its family of information security standards, ISO makes continual reference to role-based activities, based on a person’s job type and assigned responsibilities.
ISO 27701-5.3.3 asks organisations to ensure that anyone who uses PII, interacts with a PIMS, or is responsible for privacy protection has a clearly defined role and understands precisely what they are responsible for Including that of senior management themselves).
Senior management should ensure that all PIMS and PII-related procedures conform to ISO 27001 standards, and delegate reporting responsibilities to staff members that dissect the performance of the organisation’s PIMS at regular intervals.
Supporting Controls From ISO 27001 and GDPR
*Control 6.2 – Information security objectives and planning to achieve them (referenced within ISO 27701 Clause 5.3.2)
ISO 27701 Clause Identifier | ISO 27701 Clause Name | ISO 27001 Requirement | Associated GDPR Articles |
---|---|---|---|
5.3.1 | Leadership and Commitment |
5.1 – Leadership and Commitment for ISO 27001 |
None |
5.3.2 | Policy |
5.2 – Information Security Policy for ISO 27001 |
None |
5.3.3 | Organisational Roles, Responsibilities and Authorities |
5.3 – Organisational Roles, Responsibilities & Authorities for ISO 27001 |
None |
How ISMS.online Can Help
With our preconfigured PIMS you can quickly and easily organise and manage customer, supplier and staff information to fully comply with ISO 27701.
We make data mapping a simple task. It’s easy to record and review it all, adding your organisation’s details to our pre-configured dynamic Records of Processing Activity tool.
You’ll need to show how well you manage Data Subject Rights Requests (DRR). Our secure DRR space keeps it all in one place, supporting it with automated reporting and insight.
We’ve created a built-in risk bank and a range of other practical tools that’ll help with every part of the risk assessment and management process.
Find out more by booking a demo.