這是用戶在 2025-7-15 22:19 為 https://app.immersivetranslate.com/pdf-pro/de41f66c-8bd7-4f26-8951-cebf2dc3c5bd/ 保存的雙語快照頁面,由 沉浸式翻譯 提供雙語支持。了解如何保存?

The key changes in ISO/IEC FDIS 27701
ISO/IEC FDIS 27701 的主要變更

INTRODUCTION  簡介

ISO/IEC 27701 is an international standard for privacy information management systems (PIMS) published by ISO.
ISO/IEC 27701 是由 ISO 發布的隱私資訊管理系統(PIMS)國際標準。
The first edition was released in 2019 (i.e., ISO/IEC 27701:2019) as an extension to ISO/IEC 27001 and ISO/IEC 27002. As a result of this approach, an organization must obtain the ISO/IEC 27001 certification before being ISO/IEC 27701 certified. In addition, the PIMS scope must be the same as or within the ISMS scope. Another reason for having to certify to ISO/IEC 27001 first is to ensure that, personal identifiable information (PII), being an important information asset of an organization,
第一版於 2019 年發布(即 ISO/IEC 27701:2019),作為 ISO/IEC 27001 和 ISO/IEC 27002 的擴充標準。基於此方式,組織必須先取得 ISO/IEC 27001 認證,才能獲得 ISO/IEC 27701 認證。此外,PIMS 的範圍必須與 ISMS 範圍相同或包含於其中。另一個必須先取得 ISO/IEC 27001 認證的原因,是為了確保個人可識別資訊(PII)作為組織重要的資訊資產,

must also have some information security governance and controls to protect its confidentiality, integrity and availability.
也必須具備一些資訊安全治理和控制措施,以保護其機密性、完整性及可用性。
ISO/IEC 27701:2019 was written based on ISO/IEC 27001:2013 and ISO/IEC 27002:2013. In 2022, the latter two standards were replaced by ISO/IEC 27001:2022 and ISO/IEC 27002:2022, respectively, with significant changes in Annex A controls (read our ISO/IEC 27001 and ISO/IEC 27002 whitepapers for the key changes).
ISO/IEC 27701:2019 是基於 ISO/IEC 27001:2013 及 ISO/IEC 27002:2013 編寫而成。於 2022 年,後兩項標準分別被 ISO/IEC 27001:2022 及 ISO/IEC 27002:2022 所取代,附錄 A 的控制措施有重大變更(詳情請參閱我們關於 ISO/IEC 27001 及 ISO/IEC 27002 的白皮書)。

Following the release of ISO/IEC 27001:2022 in October 2022, ISO/IEC initiated the revision of ISO/IEC 27701:2019 in the same month.
繼 2022 年 10 月發布 ISO/IEC 27001:2022 後,ISO/IEC 於同月啟動了 ISO/IEC 27701:2019 的修訂工作。
After considering the comments from the usage community regarding the use of the first edition, ISO redrafted the standard as a stand-alone document. it is at the Final Draft International Standard (FDIS) stage as of the writing of this white paper. Ultimately, the approved FDIS will be registered as ISO/IEC 27701:2025 to supersede ISO/IEC 27701:2019.
在考量使用社群對第一版的意見後,ISO 將該標準重新草擬為獨立文件。於本白皮書撰寫時,該標準已進入最終國際標準草案(FDIS)階段。最終,經核准的 FDIS 將登錄為 ISO/IEC 27701:2025,取代 ISO/IEC 27701:2019。
This article compares the changes in ISO/IEC FDIS 27701 with ISO/IEC 27701:2019.
本文比較了 ISO/IEC FDIS 27701 與 ISO/IEC 27701:2019 的變更。

TITLE  標題

ISO/IEC FDIS 27701 is retitled to Information security, cybersecurity and privacy protection - Privacy information management systems - Requirements and guidance.
ISO/IEC FDIS 27701 的標題更改為「資訊安全、網路安全與隱私保護-隱私資訊管理系統-要求與指引」。
The title change reflects that ISO/IEC FDIS 27701 has no extension relationship with ISO/IEC 27001 and ISO/IEC 27002.
標題的變更反映出 ISO/IEC FDIS 27701 與 ISO/IEC 27001 及 ISO/IEC 27002 之間不存在擴充關係。
ISO/IEC FDIS 27701 IS0/IEC 27701:2019  ISO/IEC 27701:2019
Information security, cybersecurity and privacy protection - Privacy
資訊安全、網路安全與隱私保護 - 隱私

安全技術 - ISO/IEC 27001 及 ISO/IEC 27002 資訊管理系統的擴充 - 要求與指引
Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for
information management systems - Requirements and guidance
Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for information management systems - Requirements and guidance| Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for | | :--- | | information management systems - Requirements and guidance |
ISO/IEC FDIS 27701 IS0/IEC 27701:2019 Information security, cybersecurity and privacy protection - Privacy "Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for information management systems - Requirements and guidance"| ISO/IEC FDIS 27701 | IS0/IEC 27701:2019 | | :--- | :--- | | Information security, cybersecurity and privacy protection - Privacy | Security techniques - Extension to ISO/IEC 27001 and ISO/IEC 27002 for <br> information management systems - Requirements and guidance |

STRUCTURE &
REOUIREMENTS
結構與要求

As aforementioned, ISO/IEC FDIS 27701 is redrafted as a stand-alone document. It applies the high-level structure developed by ISO to improve the alignment with other ISO management system standards, e.g., ISO 9001, ISO/IEC 20000-1, ISO/IEC 27001, ISO/IEC 42001 etc.
如前所述,ISO/IEC FDIS 27701 被重新起草為獨立文件。它採用了 ISO 制定的高階結構,以提升與其他 ISO 管理系統標準的對齊度,例如 ISO 9001、ISO/IEC 20000-1、ISO/IEC 27001、ISO/IEC 42001 等。
Consequently, an organization does not need to be ISO/IEC 27001 certified as a condition of attaining the ISO/IEC 27701 certification.
因此,組織不需要取得 ISO/IEC 27001 認證作為獲得 ISO/IEC 27701 認證的前提條件。

ISO/IEC FDIS 27701 Clauses 4 to 10 set out the requirements of the Privacy Information Management System (PIMS). An organization must demonstrate that it conforms to the requirements with no exclusion allowed when it claims conformity to the document.
ISO/IEC FDIS 27701 第 4 至 10 條規定了隱私資訊管理系統(PIMS)的要求。組織在聲稱符合本文件時,必須證明其符合所有要求,不得有任何排除。
In ISO/IEC 27701:2019, only clause 5 consists of PIMS requirements; clauses 6 to 8 are implementation guidance that an organization can choose to implement as appropriate.
在 ISO/IEC 27701:2019 中,只有第 5 條款包含 PIMS 要求;第 6 至 8 條款則是組織可視情況選擇實施的指導方針。
TABLE 1 at the end of this whitepaper consists of the clause mapping of ISO/IEC FDIS 27701 and ISO/IEC 27701:2019.
本白皮書末尾的表 1 包含 ISO/IEC FDIS 27701 與 ISO/IEC 27701:2019 條款對應表。

SECURITY OF PII  個人可識別資訊(PII)的安全性

Although ISO/IEC FDIS 27701 is no longer an extension of ISO/IEC 27001, security of PII is not abandoned in the new edition.
雖然 ISO/IEC FDIS 27701 不再是 ISO/IEC 27001 的擴充標準,但新版中並未放棄 PII 的安全性。
According to Clauses 6.1.2 (Privacy risk assessment) and 6.1.3 (Privacy risk treatment), an organization needs to identity the privacy risk associated with the protection of privacy and information security risks within the scope of the Privacy information management system" and subsequently treat the risks by identifying and documenting the information security programme implemented with the appropriate security controls.
根據條款 6.1.2(隱私風險評估)和 6.1.3(隱私風險處理),組織需要識別與隱私保護及隱私資訊管理系統範圍內資訊安全風險相關的隱私風險,並隨後透過識別及記錄所實施的資訊安全計畫及適當的安全控制來處理這些風險。
In Clause 6.1.3, 15 security elements are suggested to be addressed in the information security programme, including information security
在條款 6.1.3 中,建議在資訊安全計畫中處理 15 個安全要素,包括資訊安全

risk management and 14 security domains. ISO/IEC 27001 and ISO/IEC 27002 are referenced in Clause 6.1.3, note 2.
風險管理及 14 個安全領域。條款 6.1.3 的註解 2 中參考了 ISO/IEC 27001 及 ISO/IEC 27002。
In ISO/IEC FDIS 27701 Annex A, 29 possible information security controls are listed for PII controllers and PII processors.
在 ISO/IEC FDIS 27701 附錄 A 中,列出了 29 項可能適用於 PII 控制者及 PII 處理者的資訊安全控制措施。

ANNEXES A AND B
附錄 A 與 B

Like ISO/IEC 27001, ISO/IEC FDIS 27701 Annex A contains a list of possible privacy controls.
與 ISO/IEC 27001 相似,ISO/IEC FDIS 27701 附錄 A 包含可能的隱私控制清單。
Generally, the controls and control objectives remain unchanged by comparing to ISO/IEC 27701:2019. The information security controls with additional implementation guidance in ISO/IEC 27701:2019 Clause 6 are moved to ISO/IEC FDIS 27701 Annex A.
整體而言,與 ISO/IEC 27701:2019 相比,控制措施及控制目標基本保持不變。ISO/IEC 27701:2019 第 6 條中附加實施指導的資訊安全控制已移至 ISO/IEC FDIS 27701 附錄 A。
The Annex A is comprised of 3 tables. Table A. 1 contains controls applicable to PII controllers. Table A. 2 contains controls applicable to PII processors and Table A. 3 contains information security controls applicable to both PII controllers and PII processors. In summary, there are 31 controls for PII controllers, 18 controls for PII processors, and 29 controls for PII controllers and PII processors.
附錄 A 由三個表格組成。表 A.1 包含適用於個人可識別資訊(PII)控制者的控制措施。表 A.2 包含適用於 PII 處理者的控制措施,表 A.3 則包含適用於 PII 控制者與 PII 處理者的資訊安全控制措施。總結來說,PII 控制者有 31 項控制措施,PII 處理者有 18 項控制措施,PII 控制者與處理者共有 29 項控制措施。
Some ISO/IEC 27001 practitioners believe that the ISO/IEC 27001 Annex A controls are exhaustive and no additional information security controls can be included in the ISMS. To avoid the ISO/IEC FDIS 27701 implementors having similar comprehension, ISO/IEC FDIS 27701 Clause 6.1.3 states: “The privacy controls listed in Annex A are not exhaustive and additional privacy controls can be included if needed.”
部分 ISO/IEC 27001 的實務者認為 ISO/IEC 27001 附錄 A 的控制措施已經非常完整,資訊安全管理系統(ISMS)中不應包含其他額外的資訊安全控制措施。為避免 ISO/IEC FDIS 27701 的實施者產生類似的誤解,ISO/IEC FDIS 27701 第 6.1.3 條款指出:「附錄 A 中列出的隱私控制措施並非全面,必要時可包含其他隱私控制措施。」
As the title suggests, ISO/IEC FDIS 27701 consists of implementation guidance for privacy and information security controls. The guidance is in Annex B (normative) Implementation guidance for PII controllers and PII processors. The word “normative” seems to imply that the selected controls must be implemented according to the guidance in Annex B.
顧名思義,ISO/IEC FDIS 27701 包含隱私與資訊安全控制措施的實施指引。該指引位於附錄 B(規範性)「PII 控制者與 PII 處理者的實施指引」。其中「規範性」一詞似乎暗示所選擇的控制措施必須依照附錄 B 的指引來實施。
Nevertheless, ISO/IEC FDIS 27701 Clause 6.1.3 h) clarifies that an ganization the consider the guidance in Annex B only for the implementation of controls
然而,ISO/IEC FDIS 27701 第 6.1.3 條款 h)澄清,組織僅需將附錄 B 的指引視為控制措施實施的參考。
In view of the content, there are no significant changes to the implementation guidance in by cercering in ISO/IEC 27701:2019 Clauses 6 to 8, except for some minor editorial updates.
綜觀內容,除了一些小幅的編輯更新外,ISO/IEC 27701:2019 第 6 至 8 條款中關於實施指引的內容並無重大變動。

The TABLE 2 consists of control and implementation guidance mapping of ISO/IEC FDIS 27701 and ISO/IEC 27701:2019.
表 2 包含 ISO/IEC FDIS 27701 與 ISO/IEC 27701:2019 的控制與實施指導對應。

NOTE ON CERTIFICATION AND TRANSITION TO THE 2ND EDITION
關於認證及轉換至第二版的說明

Organizations who are seeking new certification or certified organizations seeking upgrade to the 2 nd edition should consult their certification body regarding the latest certification arrangement and deadlines. As of the writing of this whitepaper, the certification and transition rules for the 2nd edition are not released yet. Historically, the certification and transition rules are released within 1-2 months after the release of the standard. The accreditation bodies will then adopt these rules, with or without additional requirements imposed by respective accreditation body
尋求新認證的組織或已認證組織欲升級至第二版,應諮詢其認證機構有關最新的認證安排及截止日期。撰寫本白皮書時,第二版的認證及轉換規則尚未發布。歷史上,認證及轉換規則通常會在標準發布後 1 至 2 個月內發布。認可機構將採納這些規則,並可能會依各認可機構的要求增訂額外條件。

SUMMARY  摘要

On 19 Dec 2024, ISO/IEC FDIS 27701 was registered for formal approval. Next, an 8-week FDIS ballot will be initiated before the new edition is officially launched to supersede ISO/IEC 27701:2019. SGS will keep on top of the development of the standard and that of the certification and transition rules and will keep our clients and the certification community abreast of the transition plan to the new edition of ISO/IEC 27701 as soon as they come out.
2024 年 12 月 19 日,ISO/IEC FDIS 27701 已登記進行正式批准。接下來,將啟動為期 8 週的 FDIS 投票,然後新版本將正式發布,取代 ISO/IEC 27701:2019。SGS 將持續關注該標準的發展,以及認證和過渡規則的變化,並會在新版本 ISO/IEC 27701 的過渡計畫一公布時,第一時間通知我們的客戶及認證社群。

qquad\qquad
TABLE 1  表 1
The table below maps the ISO/IEC FDIS 27701 clauses with that of the ISO/IEC 27701:2019 to illustrate the structural change of the new edition.
下表將 ISO/IEC FDIS 27701 條款與 ISO/IEC 27701:2019 條款對應,以說明新版本的結構變化。
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 REMARK
Clause 1  條款 1 Scope  範圍 Clause 1  條款 1 Scope  範圍

- 在 FDIS 中刪除了「……以擴展 ISO/IEC 27001 及 ISO/IEC 27002 的形式,針對組織背景下的隱私管理。」 - 刪除了要求組織必須是 PII 控制者及/或在 ISMS 內處理 PII 的 PII 處理者的條件
- Removed "...in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization." in the FDIS
- Removed the condition of requiring an organization to be a PII controller and / or PII processor processing PII within an ISMS
- Removed "...in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization." in the FDIS - Removed the condition of requiring an organization to be a PII controller and / or PII processor processing PII within an ISMS| - Removed "...in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization." in the FDIS | | :--- | | - Removed the condition of requiring an organization to be a PII controller and / or PII processor processing PII within an ISMS |
Clause 2  第 2 條 Normative references  規範性引用文件 Clause 2  第 2 條 Normative references  規範性引用文件 - Removed ISO/IEC 27000, ISO/IEC 27001 and ISO/IEC 27002 in the FDIS
- 在 FDIS 中移除了 ISO/IEC 27000、ISO/IEC 27001 及 ISO/IEC 27002
Clause 3  第 3 條 Terms, definitions and abbreviations
術語、定義與縮寫
Clause 3  第 3 條 Terms, definitions and abbreviations
術語、定義與縮寫

- 移除 ISO/IEC 27000 中術語與定義的適用範圍 - 新增管理系統相關術語與定義,例如:組織、高階管理、政策等 - 新增標準特定術語與定義,例如:客戶、資訊安全計畫、適用性聲明
- Removed the application of the terms and definitions in ISO/IEC 27000
- Added management system terms and definitions, e.g., organization, top management, policy, etc.
- Added standard-specific terms and definitions, e.g., customer, information security programme, statement of applicability
- Removed the application of the terms and definitions in ISO/IEC 27000 - Added management system terms and definitions, e.g., organization, top management, policy, etc. - Added standard-specific terms and definitions, e.g., customer, information security programme, statement of applicability| - Removed the application of the terms and definitions in ISO/IEC 27000 | | :--- | | - Added management system terms and definitions, e.g., organization, top management, policy, etc. | | - Added standard-specific terms and definitions, e.g., customer, information security programme, statement of applicability |
/ / Clause 4.2  條款 4.2 Structure of this document
本文件的結構
/
Clause 4.3  條款 4.3 Application of ISO/IEC 27002:2013 guidelines
ISO/IEC 27002:2013 指南的應用
Removed in the FDIS
在 FDIS 中移除
Clause 4.4  條款 4.4 Customer  客戶 The definition of "customer" is retained in ISO/IEC FDIS 27701 Clause 4.2.
「客戶」的定義保留於 ISO/IEC FDIS 27701 條款 4.2。
Clause 4  第 4 條 Context of the organization
組織的背景
Clause 5.2  第 5.2 條 Context of the organization
組織的背景
/
Clause 4.1  條款 4.1 Understanding the organization and its context
了解組織及其環境
Clause 5.2.1  條款 5.2.1 Understanding the organization and its context
了解組織及其環境
- Included the climate change requirement- "The organization shall determine whether climate change is a relevant issue."
- 包含氣候變遷要求—「組織應判定氣候變遷是否為相關議題。」
Clause 4.2  條款 4.2 Understanding the needs and expectations of interested parties
了解利害關係人的需求與期望
Clause 5.2.2  條款 5.2.2 Understanding the needs and expectations of interested parties
了解相關方的需求與期望

- 包含氣候變遷說明—「相關的利害關係人可能有與氣候變遷相關的要求。」 - 新增標準特定要求: - 應將與個人可識別資訊(PII)處理相關的利害關係或責任方視為利害關係人,包括 PII 主體 - PIMS 中「客戶」的定義
- Include the climate change note- "Relevant interested parties can have requirements related to climate change."
- Added standard-specific requirements:
- Parties that having interests or responsibilities associated with the processing of PII shall be determined as interested parties, including the PII principals
- The definition of "customer" in PIMS
- Include the climate change note- "Relevant interested parties can have requirements related to climate change." - Added standard-specific requirements: - Parties that having interests or responsibilities associated with the processing of PII shall be determined as interested parties, including the PII principals - The definition of "customer" in PIMS| - Include the climate change note- "Relevant interested parties can have requirements related to climate change." | | :--- | | - Added standard-specific requirements: | | - Parties that having interests or responsibilities associated with the processing of PII shall be determined as interested parties, including the PII principals | | - The definition of "customer" in PIMS |
Clause 4.3  條款 4.3 Determining the scope of the privacy information management system
確定隱私資訊管理系統的範圍
Clause 5.2.3  條款 5.2.3 Determining the scope of the information security management system
確定資訊安全管理系統的範圍
- Removed the note "The determination of the scope of the PIMS can require revising the scope of the information security management system, because of the extended interpretation of "information security" according to 5.1."
- 刪除註解「根據 5.1 對『資訊安全』的擴展解釋,確定 PIMS 範圍可能需要修訂資訊安全管理系統的範圍。」
Clause 4.4  條款 4.4 Privacy information management system
隱私資訊管理系統
Clause 5.2.4  條款 5.2.4 Information security management system
資訊安全管理系統
- Removed the requirement that PIMS shall be developed in accordance with ISO/IEC 27001:2013 Clauses 4 to 10
- 移除 PIMS 須依據 ISO/IEC 27001:2013 第 4 至 10 條款制定的要求
Clause 5  第 5 條款 Leadership  領導力 Clause 5.3  第 5.3 條款 Leadership  領導力 /
Clause 5.1  條款 5.1 Leadership & commitment  領導與承諾 Clause 5.3.1  條款 5.3.1 Leadership & commitment  領導與承諾 /
Clause 5.2  條款 5.2 Privacy Policy  隱私政策 Clause 5.3.2  條款 5.3.2 Policy  政策 /
Clause 5.3  條款 5.3 Roles, responsibilities and authorities
角色、職責與權限
Clause 5.3.3  條款 5.3.3 Organizational roles, responsibilities & authorities
組織角色、職責與權限
/
Clause 6  第 6 條 Planning  規劃 Clause 5.4  第 5.4 條 Planning  規劃 /
Clause 6.1  條款 6.1 Actions to address risks and opportunities
採取行動以應對風險與機會
Clause 5.4.1  條款 5.4.1 Actions to address risks and opportunities
採取行動以應對風險與機會
/
Clause 6.1.1  條款 6.1.1 General  一般規定 Clause 5.4.1.1  條款 5.4.1.1 General  一般規定 /
Clause 6.1.2  條款 6.1.2 Privacy risk assessment  隱私風險評估 Clause 5.4.1.2  條款 5.4.1.2 Information security risk assessment
資訊安全風險評估
/
Clause 6.1.3  條款 6.1.3 Privacy risk treatment  隱私風險處理 Clause 5.4.1.3  條款 5.4.1.3 Information security risk treatment
資訊安全風險處理
Clause 6.2  條款 6.2 Privacy objectives and planning to achieve them
隱私目標及達成目標的規劃
Clause 5.4.2  條款 5.4.2 Information security objectives and planning to achieve them
資訊安全目標及達成目標的規劃
/
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 REMARK Clause 1 Scope Clause 1 Scope "- Removed "...in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization." in the FDIS - Removed the condition of requiring an organization to be a PII controller and / or PII processor processing PII within an ISMS" Clause 2 Normative references Clause 2 Normative references - Removed ISO/IEC 27000, ISO/IEC 27001 and ISO/IEC 27002 in the FDIS Clause 3 Terms, definitions and abbreviations Clause 3 Terms, definitions and abbreviations "- Removed the application of the terms and definitions in ISO/IEC 27000 - Added management system terms and definitions, e.g., organization, top management, policy, etc. - Added standard-specific terms and definitions, e.g., customer, information security programme, statement of applicability" / / Clause 4.2 Structure of this document / Clause 4.3 Application of ISO/IEC 27002:2013 guidelines Removed in the FDIS Clause 4.4 Customer The definition of "customer" is retained in ISO/IEC FDIS 27701 Clause 4.2. Clause 4 Context of the organization Clause 5.2 Context of the organization / Clause 4.1 Understanding the organization and its context Clause 5.2.1 Understanding the organization and its context - Included the climate change requirement- "The organization shall determine whether climate change is a relevant issue." Clause 4.2 Understanding the needs and expectations of interested parties Clause 5.2.2 Understanding the needs and expectations of interested parties "- Include the climate change note- "Relevant interested parties can have requirements related to climate change." - Added standard-specific requirements: - Parties that having interests or responsibilities associated with the processing of PII shall be determined as interested parties, including the PII principals - The definition of "customer" in PIMS" Clause 4.3 Determining the scope of the privacy information management system Clause 5.2.3 Determining the scope of the information security management system - Removed the note "The determination of the scope of the PIMS can require revising the scope of the information security management system, because of the extended interpretation of "information security" according to 5.1." Clause 4.4 Privacy information management system Clause 5.2.4 Information security management system - Removed the requirement that PIMS shall be developed in accordance with ISO/IEC 27001:2013 Clauses 4 to 10 Clause 5 Leadership Clause 5.3 Leadership / Clause 5.1 Leadership & commitment Clause 5.3.1 Leadership & commitment / Clause 5.2 Privacy Policy Clause 5.3.2 Policy / Clause 5.3 Roles, responsibilities and authorities Clause 5.3.3 Organizational roles, responsibilities & authorities / Clause 6 Planning Clause 5.4 Planning / Clause 6.1 Actions to address risks and opportunities Clause 5.4.1 Actions to address risks and opportunities / Clause 6.1.1 General Clause 5.4.1.1 General / Clause 6.1.2 Privacy risk assessment Clause 5.4.1.2 Information security risk assessment / Clause 6.1.3 Privacy risk treatment Clause 5.4.1.3 Information security risk treatment Clause 6.2 Privacy objectives and planning to achieve them Clause 5.4.2 Information security objectives and planning to achieve them /| ISO/IEC FDIS 27701 | | ISO/IEC 27701:2019 | | REMARK | | :--- | :--- | :--- | :--- | :--- | | Clause 1 | Scope | Clause 1 | Scope | - Removed "...in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization." in the FDIS <br> - Removed the condition of requiring an organization to be a PII controller and / or PII processor processing PII within an ISMS | | Clause 2 | Normative references | Clause 2 | Normative references | - Removed ISO/IEC 27000, ISO/IEC 27001 and ISO/IEC 27002 in the FDIS | | Clause 3 | Terms, definitions and abbreviations | Clause 3 | Terms, definitions and abbreviations | - Removed the application of the terms and definitions in ISO/IEC 27000 <br> - Added management system terms and definitions, e.g., organization, top management, policy, etc. <br> - Added standard-specific terms and definitions, e.g., customer, information security programme, statement of applicability | | / | / | Clause 4.2 | Structure of this document | / | | | | Clause 4.3 | Application of ISO/IEC 27002:2013 guidelines | Removed in the FDIS | | | | Clause 4.4 | Customer | The definition of "customer" is retained in ISO/IEC FDIS 27701 Clause 4.2. | | Clause 4 | Context of the organization | Clause 5.2 | Context of the organization | / | | Clause 4.1 | Understanding the organization and its context | Clause 5.2.1 | Understanding the organization and its context | - Included the climate change requirement- "The organization shall determine whether climate change is a relevant issue." | | Clause 4.2 | Understanding the needs and expectations of interested parties | Clause 5.2.2 | Understanding the needs and expectations of interested parties | - Include the climate change note- "Relevant interested parties can have requirements related to climate change." <br> - Added standard-specific requirements: <br> - Parties that having interests or responsibilities associated with the processing of PII shall be determined as interested parties, including the PII principals <br> - The definition of "customer" in PIMS | | Clause 4.3 | Determining the scope of the privacy information management system | Clause 5.2.3 | Determining the scope of the information security management system | - Removed the note "The determination of the scope of the PIMS can require revising the scope of the information security management system, because of the extended interpretation of "information security" according to 5.1." | | Clause 4.4 | Privacy information management system | Clause 5.2.4 | Information security management system | - Removed the requirement that PIMS shall be developed in accordance with ISO/IEC 27001:2013 Clauses 4 to 10 | | Clause 5 | Leadership | Clause 5.3 | Leadership | / | | Clause 5.1 | Leadership & commitment | Clause 5.3.1 | Leadership & commitment | / | | Clause 5.2 | Privacy Policy | Clause 5.3.2 | Policy | / | | Clause 5.3 | Roles, responsibilities and authorities | Clause 5.3.3 | Organizational roles, responsibilities & authorities | / | | Clause 6 | Planning | Clause 5.4 | Planning | / | | Clause 6.1 | Actions to address risks and opportunities | Clause 5.4.1 | Actions to address risks and opportunities | / | | Clause 6.1.1 | General | Clause 5.4.1.1 | General | / | | Clause 6.1.2 | Privacy risk assessment | Clause 5.4.1.2 | Information security risk assessment | / | | Clause 6.1.3 | Privacy risk treatment | Clause 5.4.1.3 | Information security risk treatment | | | Clause 6.2 | Privacy objectives and planning to achieve them | Clause 5.4.2 | Information security objectives and planning to achieve them | / |
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 REMARK
Clause 7  第 7 條 Support  支援 Clause 5.5  條款 5.5 Support  支援 /
Clause 7.1  條款 7.1 Resources  資源 Clause 5.5.1  條款 5.5.1 Resources  資源 /
Clause 7.2  條款 7.2 Competence  能力 Clause 5.5.2  條款 5.5.2 Competence  能力 /
Clause 7.3  條款 7.3 Awareness  意識 Clause 5.5.3  條款 5.5.3 Awareness  意識 /
Clause 7.4  條款 7.4 Communication  溝通 Clause 5.5.4  條款 5.5.4 Communication  溝通 /
Clause 7.5  條款 7.5 Documented information  文件化資訊 Clause 5.5.5  條款 5.5.5 Documented information  文件化資訊 /
Clause 7.5.1  條款 7.5.1 General  一般事項 Clause 5.5.5.1  條款 5.5.5.1 General  一般規定 /
Clause 7.5.2  條款 7.5.2 Creating and updating documented information
建立及更新文件化資訊
Clause 5.5.5.2  條款 5.5.5.2 Creating and updating  建立與更新 /
Clause 7.5.3  條款 7.5.3 Control of documented information
文件資訊的控制
Clause 5.5.5.3  條款 5.5.5.3 Control of documented information
文件化資訊的控制
/
Clause 8  條款 8 Operation  運作 Clause 5.6  條款 5.6 Operation  運作 /
Clause 8.1  條款 8.1 Operational planning and control
運作規劃與控制
Clause 5.6.1  條款 5.6.1 Operational planning and control
運作規劃與控制
/
Clause 8.2  條款 8.2 Privacy risk assessment  隱私風險評估 Clause 5.6.2  條款 5.6.2 Information security risk assessment
資訊安全風險評估
/
Clause 8.3  條款 8.3 Privacy risk treatment  隱私風險處理 Clause 5.6.3  條款 5.6.3 Information security risk treatment
資訊安全風險處理
/
Clause 9  條款 9 Performance  績效 Clause 5.7  條款 5.7 Performance evaluation  績效評估 /
Clause 9.1  條款 9.1 Monitoring, measurement, analysis and evaluation
監控、測量、分析與評估
Clause 5.7.1  條款 5.7.1 Monitoring, measurement, analysis and evaluation
監控、測量、分析與評估

- 排除兩點,這兩點在其他管理系統標準中常見: - 誰應該監控和測量 - 誰應該分析和評估這些結果
- Excluded two points that are commonly seen in other management system standards:
- Who shall monitor and measure
- Who shall analyse and evaluate these results
- Excluded two points that are commonly seen in other management system standards: - Who shall monitor and measure - Who shall analyse and evaluate these results| - Excluded two points that are commonly seen in other management system standards: | | :--- | | - Who shall monitor and measure | | - Who shall analyse and evaluate these results |
Clause 9.2  條款 9.2 Internal audit  內部稽核 Clause 5.7.2  條款 5.7.2 Internal audit  內部稽核 /
Clause 9.2.1  條款 9.2.1 General  一般事項 /
Clause 9.2.2  條款 9.2.2 Internal audit programme
內部稽核計畫
/
Clause 9.3  條款 9.3 Management review  管理審查 Clause 5.7.3  條款 5.7.3 Management review  管理審查 /
Clause 9.3.1  條款 9.3.1 General  一般事項 /
Clause 9.3.2  第 9.3.2 條款 Management review inputs
管理評審輸入

- 排除其他管理系統標準中常見的三項內容: - 目標達成情況 - 利害關係人的反饋 - 風險評估結果及風險處理計畫的狀態
- Excluded three points that are commonly seen in other management system standards:
- Fulfilment of objectives
- Feedback from interested parties
- Results of risk assessment and status of risk treatment plan
- Excluded three points that are commonly seen in other management system standards: - Fulfilment of objectives - Feedback from interested parties - Results of risk assessment and status of risk treatment plan| - Excluded three points that are commonly seen in other management system standards: | | :--- | | - Fulfilment of objectives | | - Feedback from interested parties | | - Results of risk assessment and status of risk treatment plan |
Clause 9.3.3  條款 9.3.3 Management review results
管理審查結果
/
Clause 10  條款 10 Improvement  改進 Clause 5.8  條款 5.8 Improvement  改進 /
Clause 10.1  條款 10.1 Continual improvement  持續改進 Clause 5.8.2  條款 5.8.2 Continual improvement  持續改進 /
Clause 10.2  條款 10.2 Nonconformity and corrective action
不符合與矯正措施
Clause 5.8.1  條款 5.8.1 Nonconformity and corrective action
不符合與矯正措施
/
Annex A (normative)  附錄 A(規範性) PIMS reference control objectives and controls for PII Controllers and PII Processors
PII 控制者與 PII 處理者之 PIMS 參考控制目標與控制措施
/ / /
Table A. 1  表 A. 1 Control objectives and controls for PII controllers
個人識別資訊(PII)控制者的控制目標與控制措施
Annex A (normative)  附錄 A(規範性) PIMS-specific reference control objectives and controls (PII Controllers)
個人資訊管理系統(PIMS)專用參考控制目標與控制措施(PII 控制者)

- 控制措施及控制目標保持不變,僅對兩項控制措施進行了輕微的編輯修改 — PII 控制者共計 31 項控制措施
- The controls and control objectives remain unchanged with minor editorial changes to two controls
- Total 31 controls for PII controllers
- The controls and control objectives remain unchanged with minor editorial changes to two controls - Total 31 controls for PII controllers| - The controls and control objectives remain unchanged with minor editorial changes to two controls | | :--- | | - Total 31 controls for PII controllers |
Table A. 2  表 A. 2 Control objectives and controls for|PII processors
PII 處理者的控制目標及控制措施
Annex B (normative)  附錄 B(規範性) PIMS-specific reference control objectives and controls (Pll Processors)
PIMS 特定參考控制目標與控制措施(PII 處理者)

- 控制措施與控制目標保持不變:- 對數個控制措施進行輕微編輯修改 - 將控制措施「對 PII 主體的義務」更名為「遵守對 PII 主體的義務」 - PII 處理者共計 18 項控制措施
- The controls and control objectives remain unchanged with:
- Minor editorial changes to several controls
- Renamed control "Obligations to PII principals" to "Comply with obligations to PII principals"
- Total 18 controls for PII processors
- The controls and control objectives remain unchanged with: - Minor editorial changes to several controls - Renamed control "Obligations to PII principals" to "Comply with obligations to PII principals" - Total 18 controls for PII processors| - The controls and control objectives remain unchanged with: | | :--- | | - Minor editorial changes to several controls | | - Renamed control "Obligations to PII principals" to "Comply with obligations to PII principals" | | - Total 18 controls for PII processors |
Table A. 3  表 A.3 Control objectives and controls for PII controllers and PII processors
PII 控制者與 PII 處理者的控制目標與控制措施
Clause 6  第 6 條 PIMS-specific guidance related to ISO/IEC 27002
與 ISO/IEC 27002 相關的 PIMS 專屬指導

- 表 A.3 列出 PII 控制者和 PII 處理者的非排他性資訊安全控制措施清單 - 共 29 項資訊安全控制措施 - ISO/IEC 27701:2019 第 6 條中提供額外實施指導的資訊安全控制措施已摘錄至該表 - 兩項控制措施進行了輕微的編輯修改
- Table A. 3 is a list of non-exclusive information security controls for PII controllers and PII processors
- Total 29 information security controls
- The information security controls with additional implementation guidance in ISO/IEC 27701:2019 Clause 6 are extracted to the table
- Minor editorial changes to two controls
- Table A. 3 is a list of non-exclusive information security controls for PII controllers and PII processors - Total 29 information security controls - The information security controls with additional implementation guidance in ISO/IEC 27701:2019 Clause 6 are extracted to the table - Minor editorial changes to two controls| - Table A. 3 is a list of non-exclusive information security controls for PII controllers and PII processors | | :--- | | - Total 29 information security controls | | - The information security controls with additional implementation guidance in ISO/IEC 27701:2019 Clause 6 are extracted to the table | | - Minor editorial changes to two controls |
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 REMARK Clause 7 Support Clause 5.5 Support / Clause 7.1 Resources Clause 5.5.1 Resources / Clause 7.2 Competence Clause 5.5.2 Competence / Clause 7.3 Awareness Clause 5.5.3 Awareness / Clause 7.4 Communication Clause 5.5.4 Communication / Clause 7.5 Documented information Clause 5.5.5 Documented information / Clause 7.5.1 General Clause 5.5.5.1 General / Clause 7.5.2 Creating and updating documented information Clause 5.5.5.2 Creating and updating / Clause 7.5.3 Control of documented information Clause 5.5.5.3 Control of documented information / Clause 8 Operation Clause 5.6 Operation / Clause 8.1 Operational planning and control Clause 5.6.1 Operational planning and control / Clause 8.2 Privacy risk assessment Clause 5.6.2 Information security risk assessment / Clause 8.3 Privacy risk treatment Clause 5.6.3 Information security risk treatment / Clause 9 Performance Clause 5.7 Performance evaluation / Clause 9.1 Monitoring, measurement, analysis and evaluation Clause 5.7.1 Monitoring, measurement, analysis and evaluation "- Excluded two points that are commonly seen in other management system standards: - Who shall monitor and measure - Who shall analyse and evaluate these results" Clause 9.2 Internal audit Clause 5.7.2 Internal audit / Clause 9.2.1 General / Clause 9.2.2 Internal audit programme / Clause 9.3 Management review Clause 5.7.3 Management review / Clause 9.3.1 General / Clause 9.3.2 Management review inputs "- Excluded three points that are commonly seen in other management system standards: - Fulfilment of objectives - Feedback from interested parties - Results of risk assessment and status of risk treatment plan" Clause 9.3.3 Management review results / Clause 10 Improvement Clause 5.8 Improvement / Clause 10.1 Continual improvement Clause 5.8.2 Continual improvement / Clause 10.2 Nonconformity and corrective action Clause 5.8.1 Nonconformity and corrective action / Annex A (normative) PIMS reference control objectives and controls for PII Controllers and PII Processors / / / Table A. 1 Control objectives and controls for PII controllers Annex A (normative) PIMS-specific reference control objectives and controls (PII Controllers) "- The controls and control objectives remain unchanged with minor editorial changes to two controls - Total 31 controls for PII controllers" Table A. 2 Control objectives and controls for|PII processors Annex B (normative) PIMS-specific reference control objectives and controls (Pll Processors) "- The controls and control objectives remain unchanged with: - Minor editorial changes to several controls - Renamed control "Obligations to PII principals" to "Comply with obligations to PII principals" - Total 18 controls for PII processors" Table A. 3 Control objectives and controls for PII controllers and PII processors Clause 6 PIMS-specific guidance related to ISO/IEC 27002 "- Table A. 3 is a list of non-exclusive information security controls for PII controllers and PII processors - Total 29 information security controls - The information security controls with additional implementation guidance in ISO/IEC 27701:2019 Clause 6 are extracted to the table - Minor editorial changes to two controls"| ISO/IEC FDIS 27701 | | ISO/IEC 27701:2019 | | REMARK | | :--- | :--- | :--- | :--- | :--- | | Clause 7 | Support | Clause 5.5 | Support | / | | Clause 7.1 | Resources | Clause 5.5.1 | Resources | / | | Clause 7.2 | Competence | Clause 5.5.2 | Competence | / | | Clause 7.3 | Awareness | Clause 5.5.3 | Awareness | / | | Clause 7.4 | Communication | Clause 5.5.4 | Communication | / | | Clause 7.5 | Documented information | Clause 5.5.5 | Documented information | / | | Clause 7.5.1 | General | Clause 5.5.5.1 | General | / | | Clause 7.5.2 | Creating and updating documented information | Clause 5.5.5.2 | Creating and updating | / | | Clause 7.5.3 | Control of documented information | Clause 5.5.5.3 | Control of documented information | / | | Clause 8 | Operation | Clause 5.6 | Operation | / | | Clause 8.1 | Operational planning and control | Clause 5.6.1 | Operational planning and control | / | | Clause 8.2 | Privacy risk assessment | Clause 5.6.2 | Information security risk assessment | / | | Clause 8.3 | Privacy risk treatment | Clause 5.6.3 | Information security risk treatment | / | | Clause 9 | Performance | Clause 5.7 | Performance evaluation | / | | Clause 9.1 | Monitoring, measurement, analysis and evaluation | Clause 5.7.1 | Monitoring, measurement, analysis and evaluation | - Excluded two points that are commonly seen in other management system standards: <br> - Who shall monitor and measure <br> - Who shall analyse and evaluate these results | | Clause 9.2 | Internal audit | Clause 5.7.2 | Internal audit | / | | Clause 9.2.1 | General | | | / | | Clause 9.2.2 | Internal audit programme | | | / | | Clause 9.3 | Management review | Clause 5.7.3 | Management review | / | | Clause 9.3.1 | General | | | / | | Clause 9.3.2 | Management review inputs | | | - Excluded three points that are commonly seen in other management system standards: <br> - Fulfilment of objectives <br> - Feedback from interested parties <br> - Results of risk assessment and status of risk treatment plan | | Clause 9.3.3 | Management review results | | | / | | Clause 10 | Improvement | Clause 5.8 | Improvement | / | | Clause 10.1 | Continual improvement | Clause 5.8.2 | Continual improvement | / | | Clause 10.2 | Nonconformity and corrective action | Clause 5.8.1 | Nonconformity and corrective action | / | | Annex A (normative) | PIMS reference control objectives and controls for PII Controllers and PII Processors | / | / | / | | Table A. 1 | Control objectives and controls for PII controllers | Annex A (normative) | PIMS-specific reference control objectives and controls (PII Controllers) | - The controls and control objectives remain unchanged with minor editorial changes to two controls <br> - Total 31 controls for PII controllers | | Table A. 2 | Control objectives and controls for\|PII processors | Annex B (normative) | PIMS-specific reference control objectives and controls (Pll Processors) | - The controls and control objectives remain unchanged with: <br> - Minor editorial changes to several controls <br> - Renamed control "Obligations to PII principals" to "Comply with obligations to PII principals" <br> - Total 18 controls for PII processors | | Table A. 3 | Control objectives and controls for PII controllers and PII processors | Clause 6 | PIMS-specific guidance related to ISO/IEC 27002 | - Table A. 3 is a list of non-exclusive information security controls for PII controllers and PII processors <br> - Total 29 information security controls <br> - The information security controls with additional implementation guidance in ISO/IEC 27701:2019 Clause 6 are extracted to the table <br> - Minor editorial changes to two controls |
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 REMARK
Annex B (normative)  附錄 B(規範性) Implementation guidance for PII Controllers and PII processors
PII 控制者與 PII 處理者的實施指導
/ / /
B. 2 Implementation guidance for PII controllers and PII processors
PII 控制者與 PII 處理者的實施指導
Clause 8  第 8 條款 PIMS-specific guidance related to ISO/IEC 27002
與 ISO/IEC 27002 相關的 PIMS 專屬指導
- The implementation  - 實施
Annex C (informative)  附錄 C(資訊性) Mapping to ISO/IEC 29100
對應 ISO/IEC 29100
Annex C (informative)  附錄 C(資訊性) Mapping to ISO/IEC 29100
對應 ISO/IEC 29100
/
Annex D (informative)  附錄 D(資訊性) Mapping to the General Data Protection Regulation
與一般資料保護規則的對應
Annex D (informative)  附錄 D(資訊性) Mapping to the General Data Protection Regulation
與一般資料保護規則的對應
/
Annex E (informative)  附錄 E(參考資料) Mapping to ISO/IEC 27018 and ISO/IEC 29151
對應 ISO/IEC 27018 與 ISO/IEC 29151
Annex E (informative)  附錄 E(參考資料) Mapping to ISO/IEC 27018 and ISO/IEC 29151
對應 ISO/IEC 27018 與 ISO/IEC 29151
/
Annex F (informative)  附錄 F(參考用) Correspondence with ISO/IEC 27701:2019
與 ISO/IEC 27701:2019 的對應關係
/ / New Annex  新增附錄
/ / Annex F (informative)  附錄 F(參考用) How to apply ISO/IEC 27701 to ISO/IEC 27001 and ISO/IEC 27002
如何將 ISO/IEC 27701 應用於 ISO/IEC 27001 及 ISO/IEC 27002
Removed  已移除
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 REMARK Annex B (normative) Implementation guidance for PII Controllers and PII processors / / / B. 2 Implementation guidance for PII controllers and PII processors Clause 8 PIMS-specific guidance related to ISO/IEC 27002 - The implementation Annex C (informative) Mapping to ISO/IEC 29100 Annex C (informative) Mapping to ISO/IEC 29100 / Annex D (informative) Mapping to the General Data Protection Regulation Annex D (informative) Mapping to the General Data Protection Regulation / Annex E (informative) Mapping to ISO/IEC 27018 and ISO/IEC 29151 Annex E (informative) Mapping to ISO/IEC 27018 and ISO/IEC 29151 / Annex F (informative) Correspondence with ISO/IEC 27701:2019 / / New Annex / / Annex F (informative) How to apply ISO/IEC 27701 to ISO/IEC 27001 and ISO/IEC 27002 Removed| ISO/IEC FDIS 27701 | | ISO/IEC 27701:2019 | | REMARK | | :--- | :--- | :--- | :--- | :--- | | Annex B (normative) | Implementation guidance for PII Controllers and PII processors | / | / | / | | B. 2 | Implementation guidance for PII controllers and PII processors | Clause 8 | PIMS-specific guidance related to ISO/IEC 27002 | - The implementation | | Annex C (informative) | Mapping to ISO/IEC 29100 | Annex C (informative) | Mapping to ISO/IEC 29100 | / | | Annex D (informative) | Mapping to the General Data Protection Regulation | Annex D (informative) | Mapping to the General Data Protection Regulation | / | | Annex E (informative) | Mapping to ISO/IEC 27018 and ISO/IEC 29151 | Annex E (informative) | Mapping to ISO/IEC 27018 and ISO/IEC 29151 | / | | Annex F (informative) | Correspondence with ISO/IEC 27701:2019 | / | / | New Annex | | / | / | Annex F (informative) | How to apply ISO/IEC 27701 to ISO/IEC 27001 and ISO/IEC 27002 | Removed |
TABLE 2  表 2
Mapping the controls and implementation guidance for PII controllers to ISO/IEC 27701:2019
將 PII 控制者的控制措施及實施指導對應至 ISO/IEC 27701:2019
ISO/IEC FDIS 27701 ISO/IEC 27701:2019
CONTROL IMPLEMENTATION GUIDANCE  實施指導 CONTROL IMPLEMENTATION GUIDANCE  實施指導
Conditions for collection and processing
收集與處理的條件
B.1.2 A.7.2 Conditions for collection and processing
收集與處理的條件
Clause 7.2  第 7.2 條款
A.1.2.2 Identify and document purpose
識別並記錄目的
B.1.2.2 A.7.2.1 Identify and document purpose
識別並記錄目的
Clause 7.2.1  條款 7.2.1
A.1.2.3 Identify lawful basis  識別合法依據 B.1.2.3 A.7.2.2 Identify lawful basis  識別合法依據 Clause 7.2.2  條款 7.2.2
A.1.2.4 Determine when and how consent is to be obtained
確定何時以及如何取得同意
B.1.2.4 A.7.2.3 Determine when and how consent is to be obtained
確定何時以及如何取得同意
Clause 7.2.3  條款 7.2.3
A.1.2.5 Obtain and record consent
取得並記錄同意
B.1.2.5 A.7.2.4 Obtain and record consent
取得並記錄同意
Clause 7.2.4  條款 7.2.4
A.1.2.6 Privacy impact assessment
隱私影響評估
B.1.2.6 A.7.2.5 Privacy impact assessment
隱私影響評估
Clause 7.2.5  條款 7.2.5
A.1.2.7 Contracts with PII processors
與個人可識別資訊處理者的合約
B.1.2.7 A.7.2.6 Contracts with PII processors
與個人可識別資訊處理者的合約
Clause 7.2.6  條款 7.2.6
A.1.2.8 Joint PII controller  共同個人識別資訊控制者 B.1.2.8 A.7.2.7 Joint PII controller  共同個人識別資訊控制者 Clause 7.2.7  條款 7.2.7
A.1.2.9 Records related to processing PII
與處理個人可識別資訊相關的紀錄
B.1.2.9 A.7.2.8 Records related to processing PII
與處理個人可識別資訊相關的紀錄
Clause 7.2.8  條款 7.2.8
Obligations to PII principals
對個人可識別資訊主體的義務
B.1.3 A.7.3 Obligations to PII principals
對個人可識別資訊(PII)主體的義務
Clause 7.3  第 7.3 條款
A.1.3.2 Determining and fulfilling obligations to PII principals
確定並履行對個人可識別資訊(PII)主體的義務
B.1.3.2 A.7.3.1 Determining and fulfilling obligations to PII Principals
確定並履行對個人可識別資訊(PII)主體的義務
Clause 7.3.1  條款 7.3.1
A.1.3.3 Determining information for PII principals
確定個人可識別資訊(PII)主體的資訊
B.1.3.3 A.7.3.2 Determining information for PII principals
確定個人可識別資訊(PII)主體的資訊
Clause 7.3.2  條款 7.3.2
A.1.3.4 Providing information to PII principals
向個人識別資訊(PII)主體提供資訊
B.1.3.4 A.7.3.3 Providing information to PII principals
向個人識別資訊(PII)主體提供資訊
Clause 7.3.3  條款 7.3.3
A.1.3.5 Providing mechanism to modify or withdraw consent
提供修改或撤回同意的機制
B.1.3.5 A.7.3.4 Providing mechanism to modify or withdraw consent
提供修改或撤回同意的機制
Clause 7.3.4  條款 7.3.4
A.1.3.6 Providing mechanism to object to PII processing
提供反對個人可識別資訊(PII)處理的機制
B.1.3.6 A.7.3.5 Providing mechanism to object to PII processing
提供反對個人可識別資訊(PII)處理的機制
Clause 7.3.5  條款 7.3.5
A.1.3.7 Access, correction or erasure
存取、更正或刪除
B.1.3.7 A.7.3.6 Access, correction and/or erasure
存取、更正及/或刪除
Clause 7.3.6  條款 7.3.6
A.1.3.8 PII controllers' obligations to inform third parties
PII 控制者通知第三方的義務
B.1.3.8 A.7.3.7 PII controllers' obligations to inform third parties
PII 控制者通知第三方的義務
Clause 7.3.7  條款 7.3.7
A.1.3.9 Providing copy of PII processed
提供處理過的 PII 副本
B.1.3.9 A.7.3.8 Providing copy of PII processed
提供處理的個人可識別資訊(PII)副本
Clause 7.3.8  條款 7.3.8
A.1.3.10 Handling requests  處理請求 B.1.3.10 A.7.3.9 Handling requests  處理請求 Clause 7.3.9  條款 7.3.9
A.1.3.11 Automated decision making
自動化決策
B.1.3.11 A.7.3.10 Automated decision making
自動化決策
Clause 7.3.10  條款 7.3.10
Privacy by design and by privacy default
隱私設計與預設隱私
B.1.4 A.7.4 Privacy by design and privacy by default
隱私設計與預設隱私
Clause 7.4  第 7.4 條款
A.1.4.2 Limit collection  限制收集 B.1.4.2 A.7.4.1 Limit collection  限制收集 Clause 7.4.1  條款 7.4.1
A.1.4.3 Limit processing  限制處理 B.1.4.3 A.7.4.2 Limit processing  限制處理 Clause 7.4.2  條款 7.4.2
A.1.4.4 Accuracy and quality  準確性與品質 B.1.4.4 A.7.4.3 Accuracy and quality  準確性與品質 Clause 7.4.3  條款 7.4.3
A.1.4.5 PII minimization objectives
PII 最小化目標
B.1.4.5 A.7.4.4 PII minimization objectives
PII 最小化目標
Clause 7.4.4  條款 7.4.4
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 CONTROL IMPLEMENTATION GUIDANCE CONTROL IMPLEMENTATION GUIDANCE Conditions for collection and processing B.1.2 A.7.2 Conditions for collection and processing Clause 7.2 A.1.2.2 Identify and document purpose B.1.2.2 A.7.2.1 Identify and document purpose Clause 7.2.1 A.1.2.3 Identify lawful basis B.1.2.3 A.7.2.2 Identify lawful basis Clause 7.2.2 A.1.2.4 Determine when and how consent is to be obtained B.1.2.4 A.7.2.3 Determine when and how consent is to be obtained Clause 7.2.3 A.1.2.5 Obtain and record consent B.1.2.5 A.7.2.4 Obtain and record consent Clause 7.2.4 A.1.2.6 Privacy impact assessment B.1.2.6 A.7.2.5 Privacy impact assessment Clause 7.2.5 A.1.2.7 Contracts with PII processors B.1.2.7 A.7.2.6 Contracts with PII processors Clause 7.2.6 A.1.2.8 Joint PII controller B.1.2.8 A.7.2.7 Joint PII controller Clause 7.2.7 A.1.2.9 Records related to processing PII B.1.2.9 A.7.2.8 Records related to processing PII Clause 7.2.8 Obligations to PII principals B.1.3 A.7.3 Obligations to PII principals Clause 7.3 A.1.3.2 Determining and fulfilling obligations to PII principals B.1.3.2 A.7.3.1 Determining and fulfilling obligations to PII Principals Clause 7.3.1 A.1.3.3 Determining information for PII principals B.1.3.3 A.7.3.2 Determining information for PII principals Clause 7.3.2 A.1.3.4 Providing information to PII principals B.1.3.4 A.7.3.3 Providing information to PII principals Clause 7.3.3 A.1.3.5 Providing mechanism to modify or withdraw consent B.1.3.5 A.7.3.4 Providing mechanism to modify or withdraw consent Clause 7.3.4 A.1.3.6 Providing mechanism to object to PII processing B.1.3.6 A.7.3.5 Providing mechanism to object to PII processing Clause 7.3.5 A.1.3.7 Access, correction or erasure B.1.3.7 A.7.3.6 Access, correction and/or erasure Clause 7.3.6 A.1.3.8 PII controllers' obligations to inform third parties B.1.3.8 A.7.3.7 PII controllers' obligations to inform third parties Clause 7.3.7 A.1.3.9 Providing copy of PII processed B.1.3.9 A.7.3.8 Providing copy of PII processed Clause 7.3.8 A.1.3.10 Handling requests B.1.3.10 A.7.3.9 Handling requests Clause 7.3.9 A.1.3.11 Automated decision making B.1.3.11 A.7.3.10 Automated decision making Clause 7.3.10 Privacy by design and by privacy default B.1.4 A.7.4 Privacy by design and privacy by default Clause 7.4 A.1.4.2 Limit collection B.1.4.2 A.7.4.1 Limit collection Clause 7.4.1 A.1.4.3 Limit processing B.1.4.3 A.7.4.2 Limit processing Clause 7.4.2 A.1.4.4 Accuracy and quality B.1.4.4 A.7.4.3 Accuracy and quality Clause 7.4.3 A.1.4.5 PII minimization objectives B.1.4.5 A.7.4.4 PII minimization objectives Clause 7.4.4| ISO/IEC FDIS 27701 | | | ISO/IEC 27701:2019 | | | | :--- | :--- | :--- | :--- | :--- | :--- | | CONTROL | | IMPLEMENTATION GUIDANCE | CONTROL | | IMPLEMENTATION GUIDANCE | | | Conditions for collection and processing | B.1.2 | A.7.2 | Conditions for collection and processing | Clause 7.2 | | A.1.2.2 | Identify and document purpose | B.1.2.2 | A.7.2.1 | Identify and document purpose | Clause 7.2.1 | | A.1.2.3 | Identify lawful basis | B.1.2.3 | A.7.2.2 | Identify lawful basis | Clause 7.2.2 | | A.1.2.4 | Determine when and how consent is to be obtained | B.1.2.4 | A.7.2.3 | Determine when and how consent is to be obtained | Clause 7.2.3 | | A.1.2.5 | Obtain and record consent | B.1.2.5 | A.7.2.4 | Obtain and record consent | Clause 7.2.4 | | A.1.2.6 | Privacy impact assessment | B.1.2.6 | A.7.2.5 | Privacy impact assessment | Clause 7.2.5 | | A.1.2.7 | Contracts with PII processors | B.1.2.7 | A.7.2.6 | Contracts with PII processors | Clause 7.2.6 | | A.1.2.8 | Joint PII controller | B.1.2.8 | A.7.2.7 | Joint PII controller | Clause 7.2.7 | | A.1.2.9 | Records related to processing PII | B.1.2.9 | A.7.2.8 | Records related to processing PII | Clause 7.2.8 | | | Obligations to PII principals | B.1.3 | A.7.3 | Obligations to PII principals | Clause 7.3 | | A.1.3.2 | Determining and fulfilling obligations to PII principals | B.1.3.2 | A.7.3.1 | Determining and fulfilling obligations to PII Principals | Clause 7.3.1 | | A.1.3.3 | Determining information for PII principals | B.1.3.3 | A.7.3.2 | Determining information for PII principals | Clause 7.3.2 | | A.1.3.4 | Providing information to PII principals | B.1.3.4 | A.7.3.3 | Providing information to PII principals | Clause 7.3.3 | | A.1.3.5 | Providing mechanism to modify or withdraw consent | B.1.3.5 | A.7.3.4 | Providing mechanism to modify or withdraw consent | Clause 7.3.4 | | A.1.3.6 | Providing mechanism to object to PII processing | B.1.3.6 | A.7.3.5 | Providing mechanism to object to PII processing | Clause 7.3.5 | | A.1.3.7 | Access, correction or erasure | B.1.3.7 | A.7.3.6 | Access, correction and/or erasure | Clause 7.3.6 | | A.1.3.8 | PII controllers' obligations to inform third parties | B.1.3.8 | A.7.3.7 | PII controllers' obligations to inform third parties | Clause 7.3.7 | | A.1.3.9 | Providing copy of PII processed | B.1.3.9 | A.7.3.8 | Providing copy of PII processed | Clause 7.3.8 | | A.1.3.10 | Handling requests | B.1.3.10 | A.7.3.9 | Handling requests | Clause 7.3.9 | | A.1.3.11 | Automated decision making | B.1.3.11 | A.7.3.10 | Automated decision making | Clause 7.3.10 | | | Privacy by design and by privacy default | B.1.4 | A.7.4 | Privacy by design and privacy by default | Clause 7.4 | | A.1.4.2 | Limit collection | B.1.4.2 | A.7.4.1 | Limit collection | Clause 7.4.1 | | A.1.4.3 | Limit processing | B.1.4.3 | A.7.4.2 | Limit processing | Clause 7.4.2 | | A.1.4.4 | Accuracy and quality | B.1.4.4 | A.7.4.3 | Accuracy and quality | Clause 7.4.3 | | A.1.4.5 | PII minimization objectives | B.1.4.5 | A.7.4.4 | PII minimization objectives | Clause 7.4.4 |
ISO/IEC FDIS 27701 ISO/IEC 27701:2019
CONTROL IMPLEMENTATION GUIDANCE  實施指引 CONTROL IMPLEMENTATION GUIDANCE  實施指引
A.1.4.6 PII de-identification and deletion at the end of processing
處理結束時的個人可識別資訊(PII)去識別化與刪除
B.1.4.6 A.7.4.5 PII de-identification and deletion at the end of processing
PII 去識別化及處理結束時的刪除
Clause 7.4.5  條款 7.4.5
A.1.4.7 Temporary files  暫存檔案 B.1.4.7 A.7.4.6 Temporary files  暫存檔案 Clause 7.4.6  條款 7.4.6
A.1.4.8 Retention  保留 B.1.4.8 A.7.4.7 Retention  保留 Clause 7.4.7  條款 7.4.7
A.1.4.9 Disposal  處置 B.1.4.9 A.7.4.8 Disposal  處置 Clause 7.4.8  條款 7.4.8
A.1.4.10 PII transmission controls
個人可識別資訊傳輸控制
B.1.4.10 A.7.4.9 PII transmission controls
PII 傳輸控制
Clause 7.4.9  條款 7.4.9
PII sharing, transfer and disclosure
PII 共享、轉移與揭露
B.1.5 A.7.5 PII sharing, transfer and disclosure
PII 共享、轉移與揭露
Clause 7.5  條款 7.5
A.1.5.2 Identify basis for PII transfer between jurisdictions
識別跨司法管轄區個人可識別資訊(PII)轉移的依據
B.1.5.2 A.7.5.1 Identify basis for PII transfer between jurisdictions
識別跨司法管轄區個人可識別資訊(PII)轉移的依據
Clause 7.5.1  條款 7.5.1
A.1.5.3 Countries and international organizations to which PII can be transferred
可轉移個人可識別資訊(PII)之國家及國際組織
B.1.5.3 A.7.5.2 Countries and international organizations to which PII can be transferred
可轉移個人可識別資訊(PII)之國家及國際組織
Clause 7.5.2  條款 7.5.2
A.1.5.4 Records of transfer of PII
個人可識別資訊(PII)轉移紀錄
B.1.5.4 A.7.5.3 Records of transfer of PII
個人可識別資訊(PII)轉移紀錄
Clause 7.5.3  條款 7.5.3
A.1.5.5 Records of PII disclosures to third parties
向第三方揭露個人可識別資訊(PII)的紀錄
B.1.5.5 A.7.5.4 Records of PII disclosures to third parties
向第三方揭露個人可識別資訊(PII)的紀錄
Clause 7.5.4  條款 7.5.4
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 CONTROL IMPLEMENTATION GUIDANCE CONTROL IMPLEMENTATION GUIDANCE A.1.4.6 PII de-identification and deletion at the end of processing B.1.4.6 A.7.4.5 PII de-identification and deletion at the end of processing Clause 7.4.5 A.1.4.7 Temporary files B.1.4.7 A.7.4.6 Temporary files Clause 7.4.6 A.1.4.8 Retention B.1.4.8 A.7.4.7 Retention Clause 7.4.7 A.1.4.9 Disposal B.1.4.9 A.7.4.8 Disposal Clause 7.4.8 A.1.4.10 PII transmission controls B.1.4.10 A.7.4.9 PII transmission controls Clause 7.4.9 PII sharing, transfer and disclosure B.1.5 A.7.5 PII sharing, transfer and disclosure Clause 7.5 A.1.5.2 Identify basis for PII transfer between jurisdictions B.1.5.2 A.7.5.1 Identify basis for PII transfer between jurisdictions Clause 7.5.1 A.1.5.3 Countries and international organizations to which PII can be transferred B.1.5.3 A.7.5.2 Countries and international organizations to which PII can be transferred Clause 7.5.2 A.1.5.4 Records of transfer of PII B.1.5.4 A.7.5.3 Records of transfer of PII Clause 7.5.3 A.1.5.5 Records of PII disclosures to third parties B.1.5.5 A.7.5.4 Records of PII disclosures to third parties Clause 7.5.4| ISO/IEC FDIS 27701 | | | ISO/IEC 27701:2019 | | | | :--- | :--- | :--- | :--- | :--- | :--- | | CONTROL | | IMPLEMENTATION GUIDANCE | CONTROL | | IMPLEMENTATION GUIDANCE | | A.1.4.6 | PII de-identification and deletion at the end of processing | B.1.4.6 | A.7.4.5 | PII de-identification and deletion at the end of processing | Clause 7.4.5 | | A.1.4.7 | Temporary files | B.1.4.7 | A.7.4.6 | Temporary files | Clause 7.4.6 | | A.1.4.8 | Retention | B.1.4.8 | A.7.4.7 | Retention | Clause 7.4.7 | | A.1.4.9 | Disposal | B.1.4.9 | A.7.4.8 | Disposal | Clause 7.4.8 | | A.1.4.10 | PII transmission controls | B.1.4.10 | A.7.4.9 | PII transmission controls | Clause 7.4.9 | | | PII sharing, transfer and disclosure | B.1.5 | A.7.5 | PII sharing, transfer and disclosure | Clause 7.5 | | A.1.5.2 | Identify basis for PII transfer between jurisdictions | B.1.5.2 | A.7.5.1 | Identify basis for PII transfer between jurisdictions | Clause 7.5.1 | | A.1.5.3 | Countries and international organizations to which PII can be transferred | B.1.5.3 | A.7.5.2 | Countries and international organizations to which PII can be transferred | Clause 7.5.2 | | A.1.5.4 | Records of transfer of PII | B.1.5.4 | A.7.5.3 | Records of transfer of PII | Clause 7.5.3 | | A.1.5.5 | Records of PII disclosures to third parties | B.1.5.5 | A.7.5.4 | Records of PII disclosures to third parties | Clause 7.5.4 |
Mapping the controls and implementation guidance for PII processors to ISO/IEC 27701:2019.
將 PII 處理者的控制措施及實施指導對應至 ISO/IEC 27701:2019。
ISO/IEC FDIS 27701 ISO/IEC 27701:2019
CONTROL IMPLEMENTATION GUIDANCE  實施指導 CONTROL IMPLEMENTATION GUIDANCE  實施指導
Conditions for collection and processing
收集與處理的條件
B.2.2 B.8.2 Conditions for collection and processing
收集與處理的條件
Clause 8.2  條款 8.2
A.2.2.2 Customer agreement  客戶協議 B.2.2.2 B.8.2.1 Customer agreement  客戶協議 Clause 8.2.1  條款 8.2.1
A.2.2.3 Organization's purposes  組織的目的 B.2.2.3 B.8.2.2 Organization's purposes  組織的目的 Clause 8.2.2  條款 8.2.2
A.2.2.4 Marketing and advertising use
行銷與廣告使用
B.2.2.4 B.8.2.3 Marketing and advertising use
行銷與廣告使用
Clause 8.2.3  條款 8.2.3
A.2.2.5 Infringing instruction  侵權指示 B.2.2.5 B.8.2.4 Infringing instruction  侵權指示 Clause 8.2.4  條款 8.2.4
A.2.2.6 Customer obligations  客戶義務 B.2.2.6 B.8.2.5 Customer obligations  客戶義務 Clause 8.2.5  條款 8.2.5
A.2.2.7 Records related to processing PII
與處理個人可識別資訊(PII)相關的紀錄
B.2.2.7 B.8.2.6 Records related to processing PII
與處理個人可識別資訊(PII)相關的紀錄
Clause 8.2.6  條款 8.2.6
Obligations to PII principals
對個人可識別資訊主體的義務
B.2.3 B.8.3 Obligations to PII principals
對個人可識別資訊(PII)主體的義務
Clause 8.3  第 8.3 條款
A.2.3.2 Comply with obligations to PII principals
遵守對個人可識別資訊(PII)主體的義務
B.2.3.2 B.8.3.1 Comply with obligations to PII principals
遵守對個人可識別資訊(PII)主體的義務
Clause 8.3.1  條款 8.3.1
Privacy by design and privacy by default
以隱私為設計核心與預設隱私
B.2.4 B.8.4 Privacy by design and privacy by default
以隱私為設計核心與預設隱私
Clause 8.4  條款 8.4
A.2.4.2 Temporary files  暫存檔案 B.2.4.2 B.8.4.1 Temporary files  暫存檔案 Clause 8.4.1  條款 8.4.1
A.2.4.3 Return, transfer or disposal of PII
PII 的歸還、轉移或處置
B.2.4.3 B.8.4.2 Return, transfer or disposal of PII
PII 的返回、轉移或處置
Clause 8.4.2  條款 8.4.2
A.2.4.4 PII transmission controls
PII 傳輸控制
B.2.4.4 B.8.4.3 PII transmission controls
PII 傳輸控制
Clause 8.4.3  條款 8.4.3
PII sharing, transfer and disclosure
個人可識別資訊(PII)的共享、轉移與揭露
B.2.5 B.8.5 PII sharing, transfer and disclosure
個人可識別資訊(PII)的共享、轉移與揭露
Clause 8.5  條款 8.5
A.2.5.2 Basis for PII transfer between jurisdictions
跨司法管轄區個人可識別資訊(PII)轉移的依據
B.2.5.2 B.8.5.1 Basis for PII transfer between jurisdictions
跨司法管轄區個人可識別資訊(PII)轉移的依據
Clause 8.5.1  條款 8.5.1
A.2.5.3 Countries and international organizations to which PII can be transferred
可轉移個人可識別資訊(PII)之國家及國際組織
B.2.5.3 B.8.5.2 Countries and international organizations to which PII can be transferred
可轉移個人可識別資訊(PII)之國家及國際組織
Clause 8.5.2  條款 8.5.2
A.2.5.4 Records of PII disclosures to third parties
向第三方揭露個人可識別資訊(PII)的紀錄
B.2.5.4 B.8.5.3 Records of PII disclosures to third parties
向第三方揭露個人可識別資訊(PII)的紀錄
Clause 8.5.3  條款 8.5.3
A.2.5.5 Notification of PII disclosure requests
個人可識別資訊(PII)揭露請求的通知
B.2.5.5 B.8.5.4 Notification of PII disclosure requests
個人可識別資訊(PII)揭露請求的通知
Clause 8.5.4  條款 8.5.4
A.2.5.6 Legally binding PII disclosures
具法律約束力的個人可識別資訊(PII)揭露
B.2.5.6 B.8.5.5 Legally binding PII disclosures
具法律約束力的個人可識別資訊(PII)揭露
Clause 8.5.5  條款 8.5.5
A.2.5.7 Disclosure of subcontractors used to process PII
揭露用於處理個人可識別資訊(PII)的分包商
B.2.5.7 B.8.5.6 Disclosure of subcontractors used to process PII
揭露用於處理個人可識別資訊(PII)的分包商
Clause 8.5.6  條款 8.5.6
A.2.5.8 Engagement of a subcontractor to process PII
聘用分包商處理個人可識別資訊(PII)
B.2.5.8 B.8.5.7 Engagement of a subcontractor to process PII
聘用分包商處理個人可識別資訊(PII)
Clause 8.5.7  條款 8.5.7
A.2.5.9 Change of subcontractor to process PII
更換處理個人可識別資訊(PII)的分包商
B.2.5.9 B.8.5.8 Change of subcontractor to process PII
更換處理個人可識別資訊(PII)的分包商
Clause 8.5.8  條款 8.5.8
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 CONTROL IMPLEMENTATION GUIDANCE CONTROL IMPLEMENTATION GUIDANCE Conditions for collection and processing B.2.2 B.8.2 Conditions for collection and processing Clause 8.2 A.2.2.2 Customer agreement B.2.2.2 B.8.2.1 Customer agreement Clause 8.2.1 A.2.2.3 Organization's purposes B.2.2.3 B.8.2.2 Organization's purposes Clause 8.2.2 A.2.2.4 Marketing and advertising use B.2.2.4 B.8.2.3 Marketing and advertising use Clause 8.2.3 A.2.2.5 Infringing instruction B.2.2.5 B.8.2.4 Infringing instruction Clause 8.2.4 A.2.2.6 Customer obligations B.2.2.6 B.8.2.5 Customer obligations Clause 8.2.5 A.2.2.7 Records related to processing PII B.2.2.7 B.8.2.6 Records related to processing PII Clause 8.2.6 Obligations to PII principals B.2.3 B.8.3 Obligations to PII principals Clause 8.3 A.2.3.2 Comply with obligations to PII principals B.2.3.2 B.8.3.1 Comply with obligations to PII principals Clause 8.3.1 Privacy by design and privacy by default B.2.4 B.8.4 Privacy by design and privacy by default Clause 8.4 A.2.4.2 Temporary files B.2.4.2 B.8.4.1 Temporary files Clause 8.4.1 A.2.4.3 Return, transfer or disposal of PII B.2.4.3 B.8.4.2 Return, transfer or disposal of PII Clause 8.4.2 A.2.4.4 PII transmission controls B.2.4.4 B.8.4.3 PII transmission controls Clause 8.4.3 PII sharing, transfer and disclosure B.2.5 B.8.5 PII sharing, transfer and disclosure Clause 8.5 A.2.5.2 Basis for PII transfer between jurisdictions B.2.5.2 B.8.5.1 Basis for PII transfer between jurisdictions Clause 8.5.1 A.2.5.3 Countries and international organizations to which PII can be transferred B.2.5.3 B.8.5.2 Countries and international organizations to which PII can be transferred Clause 8.5.2 A.2.5.4 Records of PII disclosures to third parties B.2.5.4 B.8.5.3 Records of PII disclosures to third parties Clause 8.5.3 A.2.5.5 Notification of PII disclosure requests B.2.5.5 B.8.5.4 Notification of PII disclosure requests Clause 8.5.4 A.2.5.6 Legally binding PII disclosures B.2.5.6 B.8.5.5 Legally binding PII disclosures Clause 8.5.5 A.2.5.7 Disclosure of subcontractors used to process PII B.2.5.7 B.8.5.6 Disclosure of subcontractors used to process PII Clause 8.5.6 A.2.5.8 Engagement of a subcontractor to process PII B.2.5.8 B.8.5.7 Engagement of a subcontractor to process PII Clause 8.5.7 A.2.5.9 Change of subcontractor to process PII B.2.5.9 B.8.5.8 Change of subcontractor to process PII Clause 8.5.8| ISO/IEC FDIS 27701 | | | ISO/IEC 27701:2019 | | | | :--- | :--- | :--- | :--- | :--- | :--- | | CONTROL | | IMPLEMENTATION GUIDANCE | CONTROL | | IMPLEMENTATION GUIDANCE | | | Conditions for collection and processing | B.2.2 | B.8.2 | Conditions for collection and processing | Clause 8.2 | | A.2.2.2 | Customer agreement | B.2.2.2 | B.8.2.1 | Customer agreement | Clause 8.2.1 | | A.2.2.3 | Organization's purposes | B.2.2.3 | B.8.2.2 | Organization's purposes | Clause 8.2.2 | | A.2.2.4 | Marketing and advertising use | B.2.2.4 | B.8.2.3 | Marketing and advertising use | Clause 8.2.3 | | A.2.2.5 | Infringing instruction | B.2.2.5 | B.8.2.4 | Infringing instruction | Clause 8.2.4 | | A.2.2.6 | Customer obligations | B.2.2.6 | B.8.2.5 | Customer obligations | Clause 8.2.5 | | A.2.2.7 | Records related to processing PII | B.2.2.7 | B.8.2.6 | Records related to processing PII | Clause 8.2.6 | | | Obligations to PII principals | B.2.3 | B.8.3 | Obligations to PII principals | Clause 8.3 | | A.2.3.2 | Comply with obligations to PII principals | B.2.3.2 | B.8.3.1 | Comply with obligations to PII principals | Clause 8.3.1 | | | Privacy by design and privacy by default | B.2.4 | B.8.4 | Privacy by design and privacy by default | Clause 8.4 | | A.2.4.2 | Temporary files | B.2.4.2 | B.8.4.1 | Temporary files | Clause 8.4.1 | | A.2.4.3 | Return, transfer or disposal of PII | B.2.4.3 | B.8.4.2 | Return, transfer or disposal of PII | Clause 8.4.2 | | A.2.4.4 | PII transmission controls | B.2.4.4 | B.8.4.3 | PII transmission controls | Clause 8.4.3 | | | PII sharing, transfer and disclosure | B.2.5 | B.8.5 | PII sharing, transfer and disclosure | Clause 8.5 | | A.2.5.2 | Basis for PII transfer between jurisdictions | B.2.5.2 | B.8.5.1 | Basis for PII transfer between jurisdictions | Clause 8.5.1 | | A.2.5.3 | Countries and international organizations to which PII can be transferred | B.2.5.3 | B.8.5.2 | Countries and international organizations to which PII can be transferred | Clause 8.5.2 | | A.2.5.4 | Records of PII disclosures to third parties | B.2.5.4 | B.8.5.3 | Records of PII disclosures to third parties | Clause 8.5.3 | | A.2.5.5 | Notification of PII disclosure requests | B.2.5.5 | B.8.5.4 | Notification of PII disclosure requests | Clause 8.5.4 | | A.2.5.6 | Legally binding PII disclosures | B.2.5.6 | B.8.5.5 | Legally binding PII disclosures | Clause 8.5.5 | | A.2.5.7 | Disclosure of subcontractors used to process PII | B.2.5.7 | B.8.5.6 | Disclosure of subcontractors used to process PII | Clause 8.5.6 | | A.2.5.8 | Engagement of a subcontractor to process PII | B.2.5.8 | B.8.5.7 | Engagement of a subcontractor to process PII | Clause 8.5.7 | | A.2.5.9 | Change of subcontractor to process PII | B.2.5.9 | B.8.5.8 | Change of subcontractor to process PII | Clause 8.5.8 |
Mapping the controls and implementation guidance for PII controllers and PII processors to ISO/IEC 27701:2019 and ISO/IEC 27002:2022.
將 PII 控制者和 PII 處理者的控制措施及實施指導對應至 ISO/IEC 27701:2019 及 ISO/IEC 27002:2022。
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 ISO/IEC 27002:2022
A.3.3 Policies for information security
資訊安全政策
Clause 6.2.1.1  條款 6.2.1.1 Conditions for collection & processing
收集與處理的條件
Clause 5.1  條款 5.1 Policies for information security
資訊安全政策
Clause 6.2.1.2  條款 6.2.1.2 Identify and document purpose
識別並記錄目的
A.3.4 Information security roles and responsibilities
資訊安全角色與責任
Clause 6.3.1.1  條款 6.3.1.1 Information security roles and responsibilities
資訊安全角色與職責
Clause 5.2  條款 5.2 Information security roles and responsibilities
資訊安全角色與職責
A.3.5 Classification of information
資訊分類
Clause 6.5.2.1  條款 6.5.2.1 Classification of information
資訊分類
Clause 5.12  條款 5.12 Classification of information
資訊分類
A.3.6 Labelling of information
資訊標籤
Clause 6.5.2.1  條款 6.5.2.1 Labelling of information
資訊標籤
Clause 5.13  條款 5.13 Labelling of information
資訊標示
A.3.7 Information transfer  資訊傳輸 Clause 6.10.2.1  條款 6.10.2.1 Information transfer policies and procedures
資訊傳輸政策與程序
Clause 5.14  條款 5.14 Information transfer  資訊傳輸
Clause 6.10.2.2  條款 6.10.2.2 Agreements for information transfer
資訊傳輸協議
Clause 6.10.2.3  條款 6.10.2.3 Electronic messaging  電子訊息傳遞
A.3.8 Identity management  身分管理 Clause 6.6.2.1  條款 6.6.2.1 User registration and de-registration
使用者註冊與取消註冊
Clause 5.16  條款 5.16 Identity management  身分管理
A.3.9 Access rights  存取權限 Clause 6.6.2.2  條款 6.6.2.2 User access provisioning
使用者存取配置
Clause 5.18  條款 5.18 Access rights  存取權限
Clause 6.6.2.5  條款 6.6.2.5 Review of user access rights
使用者存取權限的審查
Clause 6.6.2.6  條款 6.6.2.6 Removal or adjustment of access rights
移除或調整存取權限
A.3.10 Addressing information security within supplier agreements
在供應商協議中處理資訊安全
Clause 6.12.1.1  條款 6.12.1.1 Information security policy for supplier relationships
供應商關係的資訊安全政策
Clause 5.20  條款 5.20 Addressing information security within supplier agreements
在供應商協議中處理資訊安全
Clause 6.12.1.2  條款 6.12.1.2 Addressing security within supplier agreements
在供應商協議中處理安全性
A.3.11 Information security incident management planning and preparation
資訊安全事件管理的規劃與準備
Clause 6.13.1.4  條款 6.13.1.4 Assessment of and decisions on information security events
資訊安全事件的評估與決策
Clause 5.24  條款 5.24 Information security incident management planning and preparation
資訊安全事件管理的規劃與準備
A.3.12 Response to information security incidents
對資訊安全事件的回應
Clause 6.13.1.5  條款 6.13.1.5 Response to information security incidents
對資訊安全事件的回應
Clause 5.26  條款 5.26 Response to information security incidents
對資訊安全事件的回應
A.3.13 Legal, statutory, regulatory and contractual requirements
法律、法定、監管及合約要求
Clause 6.15.1.1  條款 6.15.1.1 Identification of applicable legislation and contractual requirements
適用法規及契約要求之識別
Clause 5.31  條款 5.31 Legal, statutory, regulatory and contractual requirements
法律、法定、監管及契約要求
Clause 6.15.1.5  條款 6.15.1.5 Regulation of cryptographic controls
加密控制的規範
A.3.14 Protection of records  紀錄的保護 Clause 6.15.1.3  條款 6.15.1.3 Protection of records  紀錄的保護 Clause 5.33  條款 5.33 Protection of records  紀錄的保護
A.3.15 Independent review of information security
資訊安全的獨立審查
Clause 6.15.2.1  條款 6.15.2.1 Independent review of information security
資訊安全的獨立審查
Clause 5.35  條款 5.35 Independent review of information security
資訊安全的獨立審查
A.3.16 Compliance with policies, rules and standards for information security
遵守資訊安全的政策、規則與標準
Clause 6.15.2.2  條款 6.15.2.2 Compliance with security policies and standards
遵守安全政策與標準
Clause 5.36  條款 5.36 Compliance with policies, rules and standards for information security
遵守資訊安全的政策、規則與標準
A.3.17 Information security awareness, education and training
資訊安全意識、教育與訓練
Clause 6.4.2.2  條款 6.4.2.2 Information security awareness, education and training
資訊安全意識、教育與訓練
Clause 6.3  條款 6.3 Information security awareness, education and training
資訊安全意識、教育與訓練
A.3.18 Confidentiality or non-disclosure agreements
保密或不揭露協議
Clause 6.10.2.4  條款 6.10.2.4 Confidentiality or non-disclosure agreements
保密或不揭露協議
Clause 6.6  條款 6.6 Confidentiality or non-disclosure agreements
保密或不揭露協議
A.3.19 Clear desk and clear screen
清潔桌面與清潔螢幕
Clause 6.8.2.9  條款 6.8.2.9 Clear desk and clear screen policy
清潔桌面與清潔螢幕政策
Clause 7.7  第 7.7 條款 Clear desk and clear screen
清潔桌面與清潔螢幕
A.3.20 Storage media  儲存媒介 Clause 6.5.3.1  條款 6.5.3.1 Management of removable media
可移除媒體的管理
Clause 7.10  條款 7.10 Storage media  儲存媒體
Clause 6.5.3.2  條款 6.5.3.2 Disposal of media  媒體處置
Clause 6.5.3.3  條款 6.5.3.3 Physical media transfer  實體媒體轉移
Clause 6.8.2.5  條款 6.8.2.5 Removal of assets  資產移除
A.3.21 Secure disposal or re-use of equipment
設備的安全處置或再利用
Clause 6.8.2.7  條款 6.8.2.7 Secure disposal or re-use of equipment
設備的安全處置或再利用
Clause 7.14  第 7.14 條款 Secure disposal or re-use of equipment
設備的安全處置或再利用
A.3.22 User endpoint devices  使用者端點設備 Clause 6.3.2.1  條款 6.3.2.1 Mobile device policy  行動裝置政策 Clause 8.1  條款 8.1 User endpoint devices  使用者端點裝置
Clause 6.8.2.8  條款 6.8.2.8 Unattended user equipment
無人看管的使用者設備
A.3.23 Secure authentication  安全驗證 Clause 6.6.4.2  條款 6.6.4.2 Secure log-on procedures
安全登入程序
Clause 8.5  第 8.5 條款 Secure authentication  安全驗證
A.3.24 Information backup  資訊備份 Clause 6.9.3.1  條款 6.9.3.1 Information backup  資訊備份 Clause 8.13  條款 8.13 Information backup  資訊備份
A.3.25 Logging  記錄 Clause 6.9.4.1  條款 6.9.4.1 Event logging  事件記錄 Clause 8.15  條款 8.15 Logging  記錄
Clause 6.9.4.2  條款 6.9.4.2 Protection of log information
日誌資訊的保護
Clause 6.9.4.3  條款 6.9.4.3 Administrator and operator logs
管理員與操作員日誌
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 ISO/IEC 27002:2022 A.3.3 Policies for information security Clause 6.2.1.1 Conditions for collection & processing Clause 5.1 Policies for information security Clause 6.2.1.2 Identify and document purpose A.3.4 Information security roles and responsibilities Clause 6.3.1.1 Information security roles and responsibilities Clause 5.2 Information security roles and responsibilities A.3.5 Classification of information Clause 6.5.2.1 Classification of information Clause 5.12 Classification of information A.3.6 Labelling of information Clause 6.5.2.1 Labelling of information Clause 5.13 Labelling of information A.3.7 Information transfer Clause 6.10.2.1 Information transfer policies and procedures Clause 5.14 Information transfer Clause 6.10.2.2 Agreements for information transfer Clause 6.10.2.3 Electronic messaging A.3.8 Identity management Clause 6.6.2.1 User registration and de-registration Clause 5.16 Identity management A.3.9 Access rights Clause 6.6.2.2 User access provisioning Clause 5.18 Access rights Clause 6.6.2.5 Review of user access rights Clause 6.6.2.6 Removal or adjustment of access rights A.3.10 Addressing information security within supplier agreements Clause 6.12.1.1 Information security policy for supplier relationships Clause 5.20 Addressing information security within supplier agreements Clause 6.12.1.2 Addressing security within supplier agreements A.3.11 Information security incident management planning and preparation Clause 6.13.1.4 Assessment of and decisions on information security events Clause 5.24 Information security incident management planning and preparation A.3.12 Response to information security incidents Clause 6.13.1.5 Response to information security incidents Clause 5.26 Response to information security incidents A.3.13 Legal, statutory, regulatory and contractual requirements Clause 6.15.1.1 Identification of applicable legislation and contractual requirements Clause 5.31 Legal, statutory, regulatory and contractual requirements Clause 6.15.1.5 Regulation of cryptographic controls A.3.14 Protection of records Clause 6.15.1.3 Protection of records Clause 5.33 Protection of records A.3.15 Independent review of information security Clause 6.15.2.1 Independent review of information security Clause 5.35 Independent review of information security A.3.16 Compliance with policies, rules and standards for information security Clause 6.15.2.2 Compliance with security policies and standards Clause 5.36 Compliance with policies, rules and standards for information security A.3.17 Information security awareness, education and training Clause 6.4.2.2 Information security awareness, education and training Clause 6.3 Information security awareness, education and training A.3.18 Confidentiality or non-disclosure agreements Clause 6.10.2.4 Confidentiality or non-disclosure agreements Clause 6.6 Confidentiality or non-disclosure agreements A.3.19 Clear desk and clear screen Clause 6.8.2.9 Clear desk and clear screen policy Clause 7.7 Clear desk and clear screen A.3.20 Storage media Clause 6.5.3.1 Management of removable media Clause 7.10 Storage media Clause 6.5.3.2 Disposal of media Clause 6.5.3.3 Physical media transfer Clause 6.8.2.5 Removal of assets A.3.21 Secure disposal or re-use of equipment Clause 6.8.2.7 Secure disposal or re-use of equipment Clause 7.14 Secure disposal or re-use of equipment A.3.22 User endpoint devices Clause 6.3.2.1 Mobile device policy Clause 8.1 User endpoint devices Clause 6.8.2.8 Unattended user equipment A.3.23 Secure authentication Clause 6.6.4.2 Secure log-on procedures Clause 8.5 Secure authentication A.3.24 Information backup Clause 6.9.3.1 Information backup Clause 8.13 Information backup A.3.25 Logging Clause 6.9.4.1 Event logging Clause 8.15 Logging Clause 6.9.4.2 Protection of log information Clause 6.9.4.3 Administrator and operator logs | ISO/IEC FDIS 27701 | | ISO/IEC 27701:2019 | | ISO/IEC 27002:2022 | | | :--- | :--- | :--- | :--- | :--- | :--- | | A.3.3 | Policies for information security | Clause 6.2.1.1 | Conditions for collection & processing | Clause 5.1 | Policies for information security | | | | Clause 6.2.1.2 | Identify and document purpose | | | | A.3.4 | Information security roles and responsibilities | Clause 6.3.1.1 | Information security roles and responsibilities | Clause 5.2 | Information security roles and responsibilities | | A.3.5 | Classification of information | Clause 6.5.2.1 | Classification of information | Clause 5.12 | Classification of information | | A.3.6 | Labelling of information | Clause 6.5.2.1 | Labelling of information | Clause 5.13 | Labelling of information | | A.3.7 | Information transfer | Clause 6.10.2.1 | Information transfer policies and procedures | Clause 5.14 | Information transfer | | | | Clause 6.10.2.2 | Agreements for information transfer | | | | | | Clause 6.10.2.3 | Electronic messaging | | | | A.3.8 | Identity management | Clause 6.6.2.1 | User registration and de-registration | Clause 5.16 | Identity management | | A.3.9 | Access rights | Clause 6.6.2.2 | User access provisioning | Clause 5.18 | Access rights | | | | Clause 6.6.2.5 | Review of user access rights | | | | | | Clause 6.6.2.6 | Removal or adjustment of access rights | | | | A.3.10 | Addressing information security within supplier agreements | Clause 6.12.1.1 | Information security policy for supplier relationships | Clause 5.20 | Addressing information security within supplier agreements | | | | Clause 6.12.1.2 | Addressing security within supplier agreements | | | | A.3.11 | Information security incident management planning and preparation | Clause 6.13.1.4 | Assessment of and decisions on information security events | Clause 5.24 | Information security incident management planning and preparation | | A.3.12 | Response to information security incidents | Clause 6.13.1.5 | Response to information security incidents | Clause 5.26 | Response to information security incidents | | A.3.13 | Legal, statutory, regulatory and contractual requirements | Clause 6.15.1.1 | Identification of applicable legislation and contractual requirements | Clause 5.31 | Legal, statutory, regulatory and contractual requirements | | | | Clause 6.15.1.5 | Regulation of cryptographic controls | | | | A.3.14 | Protection of records | Clause 6.15.1.3 | Protection of records | Clause 5.33 | Protection of records | | A.3.15 | Independent review of information security | Clause 6.15.2.1 | Independent review of information security | Clause 5.35 | Independent review of information security | | A.3.16 | Compliance with policies, rules and standards for information security | Clause 6.15.2.2 | Compliance with security policies and standards | Clause 5.36 | Compliance with policies, rules and standards for information security | | A.3.17 | Information security awareness, education and training | Clause 6.4.2.2 | Information security awareness, education and training | Clause 6.3 | Information security awareness, education and training | | A.3.18 | Confidentiality or non-disclosure agreements | Clause 6.10.2.4 | Confidentiality or non-disclosure agreements | Clause 6.6 | Confidentiality or non-disclosure agreements | | A.3.19 | Clear desk and clear screen | Clause 6.8.2.9 | Clear desk and clear screen policy | Clause 7.7 | Clear desk and clear screen | | A.3.20 | Storage media | Clause 6.5.3.1 | Management of removable media | Clause 7.10 | Storage media | | | | Clause 6.5.3.2 | Disposal of media | | | | | | Clause 6.5.3.3 | Physical media transfer | | | | | | Clause 6.8.2.5 | Removal of assets | | | | A.3.21 | Secure disposal or re-use of equipment | Clause 6.8.2.7 | Secure disposal or re-use of equipment | Clause 7.14 | Secure disposal or re-use of equipment | | A.3.22 | User endpoint devices | Clause 6.3.2.1 | Mobile device policy | Clause 8.1 | User endpoint devices | | | | Clause 6.8.2.8 | Unattended user equipment | | | | A.3.23 | Secure authentication | Clause 6.6.4.2 | Secure log-on procedures | Clause 8.5 | Secure authentication | | A.3.24 | Information backup | Clause 6.9.3.1 | Information backup | Clause 8.13 | Information backup | | A.3.25 | Logging | Clause 6.9.4.1 | Event logging | Clause 8.15 | Logging | | | | Clause 6.9.4.2 | Protection of log information | | | | | | Clause 6.9.4.3 | Administrator and operator logs | | |
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 ISO/IEC 27002:2022
A.3.26 Use of cryptography  加密技術的使用 Clause 6.7.1.1  條款 6.7.1.1 Policy on the use of cryptographic controls
加密控制使用政策
Clause 8.24  條款 8.24 Use of cryptography  加密技術的使用
Clause 6.7.1.2  條款 6.7.1.2 Key management  金鑰管理
A.3.27 Secure development life cycle
安全開發生命週期
Clause 6.11.2.1  條款 6.11.2.1 Secure development policy
安全開發政策
Clause 8.25  條款 8.25 Secure development life cycle
安全開發生命週期
A.3.28 Application security requirements
應用程式安全需求
Clause 6.11.1.2  條款 6.11.1.2 Securing application services on public networks
在公共網路上保護應用程式服務
Clause 8.26  條款 8.26 Application security requirements
應用程式安全需求
Clause 6.11.1.3  條款 6.11.1.3 Protecting application services transactions
保護應用程式服務交易
A.3.29 Secure system architecture and engineering principles
安全系統架構與工程原則
Clause 6.11.2.5  條款 6.11.2.5 Secure systems engineering principles
安全系統工程原則
Clause 8.27  條款 8.27 Secure system architecture and engineering principles
安全系統架構與工程原則
A.3.30 Outsourced development  外包開發 Clause 6.11.2.7  條款 6.11.2.7 Outsourced development  外包開發 Clause 8.30  條款 8.30 Outsourced development  外包開發
A.3.31 Test information  測試資訊 Clause 6.11.3.1  條款 6.11.3.1 Protection of test data
測試資料保護
Clause 8.33  條款 8.33 Test information  測試資訊
ISO/IEC FDIS 27701 ISO/IEC 27701:2019 ISO/IEC 27002:2022 A.3.26 Use of cryptography Clause 6.7.1.1 Policy on the use of cryptographic controls Clause 8.24 Use of cryptography Clause 6.7.1.2 Key management A.3.27 Secure development life cycle Clause 6.11.2.1 Secure development policy Clause 8.25 Secure development life cycle A.3.28 Application security requirements Clause 6.11.1.2 Securing application services on public networks Clause 8.26 Application security requirements Clause 6.11.1.3 Protecting application services transactions A.3.29 Secure system architecture and engineering principles Clause 6.11.2.5 Secure systems engineering principles Clause 8.27 Secure system architecture and engineering principles A.3.30 Outsourced development Clause 6.11.2.7 Outsourced development Clause 8.30 Outsourced development A.3.31 Test information Clause 6.11.3.1 Protection of test data Clause 8.33 Test information| ISO/IEC FDIS 27701 | | ISO/IEC 27701:2019 | | ISO/IEC 27002:2022 | | | :--- | :--- | :--- | :--- | :--- | :--- | | A.3.26 | Use of cryptography | Clause 6.7.1.1 | Policy on the use of cryptographic controls | Clause 8.24 | Use of cryptography | | | | Clause 6.7.1.2 | Key management | | | | A.3.27 | Secure development life cycle | Clause 6.11.2.1 | Secure development policy | Clause 8.25 | Secure development life cycle | | A.3.28 | Application security requirements | Clause 6.11.1.2 | Securing application services on public networks | Clause 8.26 | Application security requirements | | | | Clause 6.11.1.3 | Protecting application services transactions | | | | A.3.29 | Secure system architecture and engineering principles | Clause 6.11.2.5 | Secure systems engineering principles | Clause 8.27 | Secure system architecture and engineering principles | | A.3.30 | Outsourced development | Clause 6.11.2.7 | Outsourced development | Clause 8.30 | Outsourced development | | A.3.31 | Test information | Clause 6.11.3.1 | Protection of test data | Clause 8.33 | Test information |
qquad\qquad

When you need to be sure
當您需要確保時


  1. Clause 6.3 Planning of changes
    條款 6.3 變更規劃
    1. THE KEY CHANGES IN ISO/IEC FDIS 27701
      ISO/IEC FDIS 27701 的主要變更
  2. (8) THE KEY CHANGES IN ISO/IEC FDIS 27701
    (8) ISO/IEC FDIS 27701 的主要變更