In November 2024, WhaTap Labs successfully obtained the international standard ISO/IEC 27701 personal information protection management system certification.
ISO/IEC 27701 is a certification that specifies the requirements necessary to establish and operate a management system to protect personal information. It has been expanded based on ISO/IEC 27001, an existing information security management system, and provides a personal information protection management system (PIMS) that focuses on the management and protection of personal information (PII, Identifiable Information).
Through ISO/IEC 27701 certification, companies can demonstrate their ability to manage personal information more systematically and securely. It also lays the foundation for compliance with global privacy regulatory requirements such as GDPR (European Data Protection Act), CCPA (California Consumer Privacy Act), and PIPA (Korea's Personal Data Protection Act).
By obtaining ISO/IEC 27701 certification, WhaTap Labs proved that it has met international standards for personal information protection management systems. This provides customers with a more secure and reliable data management environment. Customers' personal information is managed according to systematic procedures, which minimizes the risk of security incidents such as data breaches. Furthermore, it has a system that complies with various global personal information protection regulations such as GDPR, CCPA, and PIPA to reduce domestic and international legal risks and support stable business operations.
This certification can only be obtained if you already have ISO/IEC 27001 certification or go through a single audit at once. WhaTap Labs had already obtained ISO/IEC 27001, ISO/IEC 27017, and ISO/IEC 27018 in 2023 and met the prerequisites for ISO/IEC 27701 certification.
For ISO/IEC 27701 certification, it is necessary to meet 49 management systems in 8 major areas required by the GDPR, including personal information protection management procedures, de-identification, and encryption. This management system addresses specific requirements that organizations must follow to protect personal information, and defines additional requirements for personal information protection based on the control items of ISO/IEC 27001 and ISO/IEC 27001.
The following is an overview of the eight main areas of ISO/IEC 27701 and the management systems (controls) contained within them.
Existing policies relating to information security should be extended to include privacy requirements. You can establish a dedicated policy to protect personal information and incorporate it as part of an information security policy or manage it as a separate document.
Policies should be periodically reviewed and updated to reflect the latest legal and technology trends, and communicated to all employees. Through this, organizations must make the entire organization aware of the importance of privacy protection.
A clear allocation of roles and responsibilities is needed to effectively manage information security and privacy protection within an organization. It can be achieved by organizing the structure of an information security organization, and each member clearly understands their roles and responsibilities.
Also, since privacy protection can often only be addressed internally, cooperation with external organizations is important. Organizations can enhance privacy protection by partnering with external vendors, cloud service providers, and legal advisors.
Human resource security within an organization is a key element for protecting personal information, and aims to raise the privacy awareness and responsibility of all employees, and implement appropriate security procedures in the human resources management process.
Human resource security consists of proactive prevention through training and proper management at the end of the job. Through regular training, all employees are made aware of the importance of protecting personal information, and internal threats and mistakes can be prevented by thoroughly managing termination procedures. This can make an organization's privacy system more robust.
Assets must be clearly identified and classified, and appropriate protective measures must be implemented for each asset.
The criticality of assets must be clearly understood through identification and classification, and appropriate protective measures must be implemented. This minimizes the risk of personal information leakage and misuse, and strengthens data protection and security systems.
Access rights management prevents information leakage and misuse through control over users and systems that handle personal information.
Encryption is a core technology for protecting personal information, and it safely protects personal information from data leakage and misuse. To this end, it is necessary to establish a process for encrypting data during storage and transmission, and for managing cryptographic keys in a systematic manner.
Encryption is an essential technical measure for protecting personal information, and must be strictly applied during storage and transmission to ensure the safety of data. Furthermore, by systematically establishing a cryptographic key management process, it is possible to increase the reliability of encryption and strengthen the organization's level of data protection.
Physical security is an important element for protecting personal information storage facilities and data centers from external threats. This allows you to control facility access and environmental risks, and keep personal information safe.
Operational security plays an important role in maintaining system and network stability and preventing, detecting, and responding to security incidents.
Systems and networks must be managed reliably through an operational security system. This allows organizations to strengthen the technical and administrative foundation for protecting personal information and respond effectively in the event of a security incident.
WhaTap Labs has demonstrated excellence in privacy protection and information security by strictly complying with the eight security categories and detailed controls mentioned above. In particular, the logs stored in the security operations area and related monitoring fully met the relevant requirements using our core solution, WhaTap (WhaTap). WhaTap Labs will continue to further secure customers' valuable information and data through continuous improvements.