Blog

ISO 27701 in Practice: How to Build a Privacy Program That Actually Works

Written by sallydeiteratecom | Mar 23, 2026 4:56:37 AM

A lot of organisations say they take privacy seriously.

Fewer can prove it.

That is the gap ISO 27701 is designed to close. It gives organisations a structured way to build, maintain and improve a Privacy Information Management System (PIMS), helping them manage risks around personally identifiable information and demonstrate accountability over time. It is designed to align with, and extend, an ISO 27001-based information security management system rather than sit off to the side as a standalone privacy binder.

The problem is that many privacy programs still do not operate like systems. They operate like documents.

There is a privacy policy somewhere on the website. A few clauses live in supplier contracts. Someone has a spreadsheet for data incidents. Someone else has a list of systems that “probably” hold personal information. And when a regulator, customer or auditor asks how privacy is actually managed, the answer is a frantic hunt across inboxes, folders and shared drives.

That is not a privacy program. That is organisational wishful thinking.

What ISO 27701 is Really Trying To Do

ISO 27701 is about making privacy operational.

It helps you move from vague intent to defined responsibilities, repeatable processes, evidence-backed decisions and continual improvement. That matters because privacy laws increasingly expect organisations not just to comply, but to demonstrate compliance. The OAIC’s privacy management framework is explicit that privacy needs a planned, ongoing program tailored to the organisation’s size, resources and business model.

So if you are thinking of ISO 27701 as “an extra privacy policy and maybe a register,” you are aiming far too low.

What A Privacy Program That Actually Works Looks Like

A real privacy program has a few characteristics.

First, it has clear ownership. Privacy is not left floating between legal, security, operations and product with everyone assuming someone else has it covered.

Second, it has live records. You know what personal information you hold, where it sits, why you collect it, who you share it with, and what obligations attach to it.

Third, it has working processes. Privacy impact assessments, incident response, supplier reviews, retention decisions, training and policy updates happen through repeatable workflows, not good intentions.

Fourth, it has evidence. If someone asks how privacy is managed, you can point to policies, registers, task history, reviews, approvals, risk decisions and improvement actions that all make sense together.

And finally, it has rhythm. Privacy is reviewed and improved continuously, not dragged out once a year when procurement or audit season rolls around.

Where Organisations Usually Get Stuck

The biggest failure point is fragmentation.

Policies live in one system. Evidence lives in another. Risk registers are out of date. Privacy notices are disconnected from actual practice. Supplier assurance is inconsistent. Incident handling sits with IT, while privacy obligations sit with legal or operations. Nobody has a full picture.

That fragmentation creates three common problems.

  1. False confidence. The organisation feels like it has privacy “covered” because documents exist, even if they do not reflect what is happening in practice.
  2. Slow response. When a data subject request, breach, customer due diligence question or internal review lands, people lose time trying to work out what the current truth actually is.
  3. Poor accountability. If ownership is blurred, reviews slip, controls drift and no one is quite sure what is complete, what is overdue, or what changed.

How To Build A Privacy Program That Works In Practice

Start with reality, not perfection.

Document what you actually do today. What personal information do you collect? Why? Where does it flow? Which suppliers touch it? What policies already exist? What review processes are real, and which ones only exist in theory?

Then build around four practical pillars.

1. Governance. Define who owns privacy, who supports it, and how decisions are made. Privacy cannot be a side hobby.

2. Records and visibility. Maintain usable privacy records that show systems, activities, incidents, obligations and decisions in context.

3. Operational workflows. Turn privacy into scheduled, assignable work: reviews, updates, assessments, training, approvals and follow-ups.

4. Evidence and improvement. Treat privacy like a living management system. Keep evidence linked to the right obligation, and keep improving over time.

That approach is also consistent with broader regulator thinking. The OAIC’s privacy management plan guidance similarly emphasises specific, measurable goals and ongoing implementation rather than one-off statements of intent.

Why ISO 27701 Matters Commercially, Not Just Legally

Privacy is no longer only a compliance topic. It is a trust topic.

Customers want to know you handle personal information responsibly. Partners want assurance that your controls are real. Regulators want evidence of accountability. And internal teams want clarity so privacy does not slow every project down through uncertainty and rework.

Done properly, ISO 27701 helps you answer all of those pressures with one coherent story.

Not a story built on promises. A story built on a system.

A Privacy Program that Actually Works

The organisations that get the most value from ISO 27701 are not the ones that treat it like a paperwork exercise. They are the ones that use it to operationalise privacy across the business.

That is when privacy stops being a scattered set of obligations and becomes something far more useful: a working program that is visible, defensible and easier to maintain.

The goal is not to have more privacy documents. The goal is to have a privacy program that actually works.