🔒

ISO/IEC 29151

Information technology - Security techniques - Code of practice for personally identifiable information protection

Organization: ISO/IEC Category: PII Protection
4
Related Articles
37
Articles with Obligations
7
Key Sections
12
Coverage Areas

Overview

Provides guidance on protecting Personally Identifiable Information (PII) through appropriate technical and organizational controls. Complements ISO 27701 with detailed control guidance for GDPR Article 32 security of processing requirements.

Applicability

Technical and organizational measures for protecting personal data

Relevance to General Data Protection Regulation (GDPR)

Supports GDPR principles (Article 5) and security requirements (Article 32) with detailed technical controls

Key Coverage Areas

1
PII protection controls
2
Consent and choice management
3
Purpose legitimacy and specification
4
Collection limitation
5
Data minimization
6
Use, retention and disclosure limitation
7
Accuracy and quality
8
Openness, transparency and notice
9
Individual participation and access
10
Accountability
11
Information security for PII
12
Privacy compliance

Standard Sections & Chapters

6

Consent and choice

7

Purpose legitimacy

8

Collection limitation

9

Data minimization

10

Use, retention and disclosure limitation

15

Information security for PII

6-17

Privacy controls (based on ISO 29100 principles)

Related General Data Protection Regulation (GDPR) Articles

Article 5: Principles relating to processing of personal data

View Article →
Sections: 6-17

PII protection controls

Implementation Guidance:

Implement technical controls for data minimization, purpose limitation, and retention

Mapped Obligations:

  • Process personal data lawfully, fairly and transparently
  • Limit data collection to what is necessary (data minimization)
  • Keep personal data accurate and up-to-date
  • Implement appropriate security measures to protect data

Article 17: Right to erasure (‘right to be forgotten’)

View Article →
Sections: 10

Use, retention and disclosure limitation

Implementation Guidance:

Implement controls for data retention and secure deletion

Mapped Obligations:

  • Delete personal data without undue delay when requested by the data subject
  • Delete data immediately when consent is withdrawn and no other legal basis exists

Article 25: Data protection by design and by default

View Article →
Sections: 8, 9

Collection limitation and data minimization controls

Implementation Guidance:

Implement technical measures for minimal data collection

Mapped Obligations:

  • Build in data protection principles like data minimization from the start
  • Use techniques like pseudonymization to protect personal data
  • Restrict access to personal data - not accessible to unlimited people without user intervention

Article 32: Security of processing

View Article →
Sections: 15

Information security for PII

Implementation Guidance:

Implement PII-specific security controls

Mapped Obligations:

  • Implement technical and organizational security measures appropriate to the risk
  • Consider pseudonymization and encryption of personal data
  • Ensure ongoing confidentiality, integrity, availability and resilience of systems
  • Regularly test and evaluate security measures effectiveness

Quick Information

Organization
ISO/IEC
Category
PII Protection
Certification
Not available

🤝 Still Feeling Overwhelmed?

EU cybersecurity laws can be complex. Our free tools and guides work great for most people, but if you're dealing with something particularly challenging or have tight deadlines, we're here to help.