Integration and leveraging of new and existing technologies, processes and competencies into the way business is done. Read More
Identifying the different ways technology can be leveraged to create value, categorized as external or internal opportunities. Read More
Collecting and analyzing customer interaction data to gain insights about customer behavior. Read More
Marketing that uses electronic devices to convey promotional messaging and measure its impact. Read More
Which major trends are we now observing in the risk management industry? In this article, we outline five trends and discuss how they will change risk management in 2023. Read More
The process of detecting risks that could endanger a healthcare organization, its patients, personnel, or anybody else in the institution is known as risk management. Read More
2nd Floor, Tamimah Building, Al Nahdah Road, Al Wattayah, PO Box 395, Muscat 118.
Muscat, Sultanate of Oman
ISO 27701 provides specification and guidance for including personally identifiable information (PII) in the implementation of information security management system. It is referred as ‘Privacy information management system’. ISO 27701 extends the requirements of ISO/IEC 27001:2013 to take into account the protection of privacy of PII principals as potentially affected by the processing of PII, in addition to information security.
In Coral, we have a formal methodology to fulfill and implement ISO 27701/privacy information management system.
The standard requirements can be used by organizations to implement ISO 27701 as an independent assessment or an extension of an existing ISO 27001/ISO 27702 certification.
After we have identified whether an organization is a controller and/or a processor, we guide an organization through a step-by-step process of determining applicable requirements and taking them through the journey which has the following broad phases:
We bring our world-class experience in delivery BCMS ISO 27701 - 2019 implementation leading to successful certification.
This phase involves identification of information sources, and is processing infrastructure that involves personnel, technology, physical infrastructure.
This phase involves performing privacy impact assessment and security risk assessment to determine security and legal loopholes. Identified gaps are provided with detail recommendations.
This phase involves our methodology that involves distribution security responsibility to internal stakeholders, with control policies and transactions that ensures that the PIMS is well embedded in the organization processes. This also includes nomination of a data protection officer and creating data protection office, for the organization. In a typical engagement organization receives 25+ policies and procedures.
This phase involves tracking the client risks, and documentation on a weekly basis till all internal controls are adequately implemented.
This phase involves showcasing client with changes in a given period by providing change specific score of compliance between 0 -100% compliance.
This phase involves verifying the governance system created for the organization is well in place and ready to declare as PIMS compliant.
At this stage the client has implemented the governance system in completeness.
WhatsApp Us