Nieuwe internationale privacy normen ISO/27701
In aanvulling op de ISO/IEC 27001 en ISO/IEC 27002 is nu de ISO/IEC 27701 gepubliceerd! Het nieuwe kader geeft de randvoorwaarden en richtlijnen voor het opzetten, implementeren, onderhouden en verbeteren van een Privacy Informatie Management Systeem. ISO legt zelf uit: (in het Engels)
Tackling privacy information management head on: first International Standard just published
We are more connected than ever, bringing with it the joys, and risks, of our digital world. Cybersecurity is a growing concern, with attacks against business almost doubling over the last few years1) and is an increasingly significant threat to global stability.
Unsurprisingly, laws and regulations are rapidly being put in place to reduce these risks and protect our digital privacy. How can organizations keep on top of these requirements and protect themselves at the same time? The world’s first International Standard to help organizations manage privacy information and meet regulatory requirements has just been published.
Protecting our digital privacy is a significant business concern. According to IBM2) the average cost of a data breach is USD 3.6 million, and legal obligations are increasingly stringent. As we get more connected, governments all over the world are introducing various privacy regulations, such as the European Union’s General Data Protection Regulation (GDPR), which organizations must adhere to. The new ISO standards will help businesses meet such requirements, whatever jurisdiction they work in.
ISO/IEC 27701, Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management — Requirements and guidelines, specifies the requirements for establishing, implementing, maintaining and continually improving a privacy-specific information security management system. In other words, a management system for protecting personal data (PIMS).
Formerly referred to as ISO/IEC 27552 during its development, it builds on ISO/IEC 27001, Information Technology – Security techniques – Information security management systems – Requirements, providing the necessary extra requirements when it comes to privacy.
Verder lezen bij de bronNieuwsbrief
Deze versturen we 3-4x per jaar.
Recente blogs
Meer recente berichten
Veel mensen kennen hun rechten niet bij automatische besluiten | Verder lezen | |
Waarom Europa zwaarder inzet op AI-security | Verder lezen | |
Kamer wil opheldering over ChipSoft-hack: geen incident, maar symptoom van te grote afhankelijkheid | Verder lezen | |
DigiD-aansluitingen voldoen aan regel, nu de staatssecretaris nog | Verder lezen | |
AP gaat ict-leveranciers preventief controleren | Verder lezen | |
Tweede Kamer stemt in met wetsvoorstellen Cyberbeveiligingswet en Wet weerbaarheid kritieke entiteiten | Verder lezen | |
Door het datalek bij Booking.com krijgen oplichters precies wat ze nodig hebben om gasten te benaderen | Verder lezen | |
Digitale soevereiniteit en AI-security veranderen de spelregels | Verder lezen | |
Basic-Fit getroffen door grote hack, gegevens van 1 miljoen leden liggen op straat | Verder lezen | |
Cyberbeleid gaat veel verder dan techniek | Verder lezen |