Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Notification of the Data Protection Officer

Critical
High
Normal
Low

The organization shall publish the contact details of the data protection officer (e.g. on the organisation's website) and inform the supervisory authority.

Connected other frameworks and requirements:
37. Designation of the data protection officer
GDPR
6.1.1: Information security roles and responsibilities
ISO 27001
18.2.2: Compliance with security policies and standards
ISO 27001
18.1.4: Privacy and protection of personally identifiable information

Monitoring compliance with security guidelines

Critical
High
Normal
Low

Following security guidelines can be monitored either technically or directly by asking / testing employees.

Connected other frameworks and requirements:
T11: Turvallisuuskoulutus ja -tietoisuus
29. Processing under the authority of the controller or processor
GDPR
18.2.2: Compliance with security policies and standards
ISO 27001
5.36: Compliance with policies, rules and standards for information security
ISO 27001
5.37: Documented operating procedures
ISO 27001

Regular internal monitoring of the implementation of the information security management system

Critical
High
Normal
Low

The ISMS should monitor the implementation of the tasks and guidelines recorded therein.

The task owner should regularly review the implementation status of the ISMS as a whole.

Connected other frameworks and requirements:
18.2.2: Compliance with security policies and standards
ISO 27001
5.36: Compliance with policies, rules and standards for information security
ISO 27001
4.4: Information security management system
ISO 27001

Ensuring the timeliness of privacy communication

Critical
High
Normal
Low

The purposes of the processing of personal data will change as the business develops. Privacy communications should stay up-to-date and reflect the actual state of processing.

We regularly make sure that all processing purposes are mentioned in communications (e.g. privacy statements), that the processing is accurately described, and that communications are provided to data subjects within the required time limits.

Connected other frameworks and requirements:
12. Transparent information, communication and modalities for the exercise of the rights of the data subject
GDPR
18.2.2: Compliance with security policies and standards
ISO 27001
18.1.4: Privacy and protection of personally identifiable information
A.7.3.2: Determining information for PII principals
ISO 27701

Data protection certifications

Critical
High
Normal
Low

The idea behind the certification mechanisms is to demonstrate that data processing follows good data processing practices and good practices in general. Example of a security certificate is for example: ISO27001.

Connected other frameworks and requirements:
18.2.2: Compliance with security policies and standards
ISO 27001
No items found.