A marketing team launches a customer analytics platform, feeding purchase histories, location data and browsing behaviour into a new cloud service. Nobody checks whether a data protection impact assessment is needed. Nobody verifies the cloud provider’s data processing agreement. Nobody confirms where the data is stored. Three months later, the supervisory authority opens an investigation. A.5.34 closes this gap by requiring that privacy protection is embedded into the organisation’s information security framework.
Privacy and information security are complementary disciplines. Information security protects data from unauthorised access, modification and loss. Privacy ensures that personal data is collected, processed and stored in accordance with the rights of the individuals it belongs to. A.5.34 brings both together.
What does the standard require?
- Develop a privacy policy. The organisation must create and communicate a policy addressing the protection of PII, aligned with applicable privacy legislation.
- Assign responsibilities. A designated person (e.g. DPO) must oversee PII protection. Roles and responsibilities for privacy compliance must be clearly defined.
- Implement technical and organisational measures. Appropriate controls must be in place for every processing activity involving PII — from collection through processing to deletion.
- Maintain a record of processing activities. The organisation must document what PII it processes, for what purpose, on what legal basis and with what safeguards.
- Conduct impact assessments. Where processing is likely to result in high risk to individuals, a data protection impact assessment (DPIA) must be carried out before processing begins.
In practice
Map all PII processing activities. Create and maintain a record of processing activities (RoPA) that documents what personal data the organisation collects, why, from whom, where it is stored, who has access, how long it is retained and how it is deleted. This inventory is the foundation for all privacy measures.
Embed privacy in new projects. Implement a privacy-by-design process that requires a privacy assessment before any new system, application or process that handles PII goes live. This prevents the common pattern of discovering privacy issues only after deployment.
Define data deletion procedures. PII must be deleted when the processing purpose expires or the data subject withdraws consent. Implement automated deletion routines where possible and verify that deletion covers all copies — backups, logs, caches and third-party systems.
Manage processor relationships. When third parties process PII on the organisation’s behalf, data processing agreements must be in place. Verify that processors implement adequate security measures and that the contract covers audit rights, breach notification obligations and data return/deletion upon termination.
Typical audit evidence
Auditors typically expect the following evidence for A.5.34:
- Privacy policy — approved, communicated and current
- Record of processing activities (RoPA) — comprehensive inventory of PII processing
- Data protection impact assessments — completed DPIAs for high-risk processing activities
- Data processing agreements — contracts with all processors handling PII on the organisation’s behalf
- Deletion records — evidence that PII is deleted in accordance with retention policies
- Training records — evidence that staff handling PII have received privacy training
KPI
% of PII processing activities with implemented privacy controls
This KPI measures the coverage of privacy measures across all identified processing activities. For each processing activity in the RoPA, verify that the documented technical and organisational measures are implemented. Target: 100%.
Supplementary KPIs:
- Percentage of processing activities with a completed DPIA (where required)
- Percentage of data processors with a current data processing agreement
- Number of data subject requests fulfilled within the legal deadline
BSI IT-Grundschutz
A.5.34 maps to numerous BSI modules addressing data protection and privacy:
- ORP.5 (Compliance management) — legal compliance framework including data protection.
- CON.2 (Data protection) — dedicated module for data protection requirements in information processing.
- CON.1.A9, OPS.1.1.5.A5, OPS.1.1.6.A11 — data protection in system operations, logging and monitoring.
- DER.1.A2, DER.1.A10 — privacy considerations in detection and security event management.
- APP.1.2.A11, SYS.2.1.A42, SYS.2.2.3.A4 — application and system-level privacy controls.
Related controls
A.5.34 connects privacy protection to the broader ISMS:
- A.5.32 — Intellectual property rights: Data processing agreements often contain IP clauses.
- A.5.33 — Protection of records: Records containing PII have additional retention and deletion requirements.
- A.5.35 — Independent review: Privacy implementation should be included in independent reviews.
- A.5.36 — Compliance with policies: Verifies that the privacy policy is actually followed.
Sources
- ISO/IEC 27001:2022 Annex A, Control A.5.34 — Privacy and protection of PII
- ISO/IEC 27002:2022 Section 5.34 — Implementation guidance
- BSI IT-Grundschutz, CON.2 — Data protection