🔐 ISO 27701🌍 Privacy Compliance✅ PIMS

ISO 27701 for Data Controllers — Key Requirements and Controls Explained

If your organisation decides what personal data to collect, why it is collected, and how it is used, you are a PII controller under ISO 27701. This blog unpacks each key controller requirement with enough operational detail to be genuinely useful for compliance teams doing the actual work.

AH
Aditya Hadke
🔐 Cyber Security Analyst, SecComply·📖 12 min read
📅 April 2026·🏢 SecComply
ISO 27701 data controllers requirements audit evidence

ISO 27701 for controllers is fundamentally about operationalising accountability. Policies alone will not satisfy auditors — every control area requires documented processes, technical implementation, and evidence that both are working.

ISO 27701 — Controller Control Areas (Clause 7 + Annex B)LEGAL BASISDocument for each activityROPACentral privacy documentCONSENTObtain, record, withdrawNOTICESTransparency at collectionRIGHTSOperational process for allMINIMISATIONOnly necessary dataRETENTIONDefined periods + deletionDPIAAssess high-risk processingEach area requires documented processes, technical implementation, and audit evidence. Policies alone will not pass certification.

If your organisation decides what personal data to collect, why it is collected, and how it is used, you are a PII controller under ISO 27701. The defining characteristic of a controller is accountability — you made the decisions that created the privacy obligations, so you are accountable to individuals and regulators alike. ISO 27701 Annex B translates that accountability into specific operational controls.

What Makes the Controller Role Distinct

As a controller, you made the fundamental decisions — what data to collect, for what purpose, under which legal basis, with whom to share it. Annex B controls exist because of these decisions. Processor controls (Annex C) do not include legal basis documentation, consent management, or privacy notices — because processors do not make those decisions.

The Record of Processing Activities — Your Central Privacy Document

The RoPA is the most important single document a controller maintains. It is simultaneously a regulatory requirement, an audit artefact, a data governance tool, and the foundation on which most other privacy controls are built.

RoPA FieldWhat to Document
Processing ActivityClear functional description — e.g. "Customer account registration and authentication"
PurposeSpecific stated reason. Not vague like "business purposes"
Legal BasisApplicable basis under GDPR / DPDP, with LIA reference where needed
Data SubjectsCustomers, employees, prospects, website visitors, etc.
Categories of PIISpecific types: name, email, IP address, payment details, health data
RecipientsInternal teams and external parties, including processors and cross-border transfers
Retention PeriodHow long, or the criteria for determining deletion/anonymisation
Security MeasuresReference to technical and organisational controls applied
Transfer MechanismFor cross-border: adequacy, SCCs, BCRs, or other approved mechanism

Assign a named RoPA owner and define update triggers: new product features, new vendors, changes to processing purposes, regulatory changes. Quarterly reviews are the minimum.

Privacy Notices — Transparency as Operational Obligation

Privacy notices must cover: controller identity and DPO contact, purposes and legal basis for each processing activity, legitimate interests pursued, categories of PII, recipients, international transfers, retention periods, individual rights, and right to lodge a complaint. Maintain version history with effective dates — any change to processing must be reflected in an updated notice.

Data Subject Rights — Building Operational Processes

RightProcess Must CoverAudit Evidence
AccessIntake, ID verification, retrieval across all systemsRequest log, response record, data copy
RectificationVerification of inaccuracy, update across all systemsBefore/after record, confirmation sent
ErasureLegal basis check, deletion across systems + processorsDeletion confirmation, processor notifications
PortabilityExport in JSON/CSV, delivery to individual or nominated controllerExport file, delivery confirmation
Nomination (DPDP)Nomination form, ID verification, activation on death/incapacityNomination register, process documentation

GDPR requires response within one calendar month. DPDP timelines will be specified in rules — build for 30 days as the safe default. Every request must be logged with date received, actions taken, and date of response.

Data Minimisation and Purpose Limitation

Every data field collected must have a documented justification. Forms, APIs, and product onboarding flows must be reviewed. Analytics and logging configurations must be audited. Personal data collected for one purpose must not be used for a different purpose without fresh legal basis and, where required, fresh consent.

Retention Schedules and Secure Deletion

Define retention periods at the category level. Each period must be justified by reference to the processing purpose, legal retention obligations (tax records, employment, financial), and minimum time needed. Technical enforcement is expected — automated deletion jobs, data lifecycle policies, or documented manual review with execution evidence. Soft deletes that flag records as inactive are not compliant.

Data Protection Impact Assessments — DPIAs

For high-risk processing activities, a DPIA must be conducted before processing begins. Required scenarios include: systematic profiling, large-scale special category data, systematic monitoring of public areas, and new technologies with novel privacy risks. A DPIA must contain: description of the processing, necessity and proportionality assessment, risk assessment, and mitigation measures. DPIAs must be reviewed when processing changes materially.

Managing Third-Party Processors — The Accountability Chain

Before engaging a processor, conduct privacy due diligence — review certifications, sub-processor notification processes, breach notification procedures, and end-of-contract data handling. A Data Processing Agreement (DPA) must be in place with every processor specifying: subject matter, duration, data types, controller rights, processor instructions, confidentiality, sub-processor obligations, and data return/destruction at contract end. Maintain a processor register with last security review date.

Privacy by Design — Embedding Controls at Product Level

New features undergo a privacy review during design — not at launch. Privacy controls are documented in feature specifications. Default settings are privacy-protective. Unnecessary fields are eliminated at design time. Access to personal data is restricted by role. Auditors expect: privacy review checklists for new features, DPIA records for high-risk features, and product specs demonstrating minimisation decisions were made at design time.

Need ISO 27701 Implementation Support?

SecComply helps SaaS, FinTech, and healthcare organisations implement ISO 27701 — from gap assessment to certification audit, with pre-built control libraries and evidence collection.

Frequently Asked Questions

What is the most important document a controller maintains under ISO 27701?

The Record of Processing Activities (RoPA). It is simultaneously a regulatory requirement, audit artefact, data governance tool, and the foundation for most other privacy controls. It must document every processing activity with its purpose, legal basis, data categories, retention periods, recipients, and security measures.

Can controllers satisfy ISO 27701 with policies alone?

No. Every control area requires three things: documented policies, technical implementation, and evidence that both are working in practice. A comprehensive policy library with no operational evidence will not pass a Stage 2 certification audit.

How often should a controller update their RoPA?

Quarterly reviews are the minimum. For fast-moving SaaS organisations, monthly or sprint-level reviews are more appropriate. Define triggers that require updates: new product features, new vendors, changes to processing purposes, organisational changes, and regulatory changes.

What is the difference between Annex B and Annex C in ISO 27701?

Annex B contains controller-specific controls: legal basis documentation, consent management, privacy notices, data subject rights processes, DPIAs, and purpose limitation. Annex C contains processor-specific controls: acting on controller instructions, sub-processor management, breach notification to controllers, and assisting with data subject rights requests.

Does ISO 27701 require Data Protection Impact Assessments for every processing activity?

No. DPIAs are required only for processing activities likely to result in high risk to individuals. This includes systematic profiling, large-scale special category data processing, systematic monitoring of public areas, and new technologies with novel privacy risks. However, maintaining a defined DPIA process is required for all controllers — the capability must exist even if not every activity triggers a full DPIA.