Identification of applicable legislation and contractual requirements
To meet the ISO/IEC 27018 identification of applicable legislation and contractual requirements requirement, you must maintain a current, documented register of every PII-protection law, regulation, and contract obligation that applies to your cloud processing activities, and show how your controls and procedures satisfy each one. This is a living compliance map tied to data locations, customer contracts, and operational reality.
Key takeaways:
- Build a single “PII obligations register” that covers laws/regulations and contractual terms, mapped to your controls and owners.
- Scope is driven by where you process PII, whose PII it is, and what your contracts promise—not where your HQ sits.
- Auditors will test currency and traceability: “Show me the obligation, show me the control, show me the evidence.”
ISO/IEC 27018 Clause 18.1.1 is a governance requirement with operational teeth: you cannot protect PII consistently if you do not first identify what you are required to do. For a cloud service provider acting as a PII processor, the hard part is not listing a few well-known privacy laws; it is keeping an accurate inventory of obligations that shifts as you add regions, subprocessors, products, and customer contract terms.
Operators typically fail this control in two ways. First, they keep obligations in scattered places (legal memos, contract templates, security policies) with no single source of truth that teams can execute against. Second, they treat the register as a one-time compliance deliverable rather than a continuously updated artifact linked to engineering and customer contracting workflows.
This page gives requirement-level implementation guidance you can execute quickly: what to document, how to scope it, how to keep it current, and what evidence an auditor will actually accept. The goal is a practical, maintainable system that survives growth, new jurisdictions, and contract variability without heroic effort each quarter.
Regulatory text
Requirement (quoted): “All relevant legislative, statutory, regulatory and contractual requirements relating to PII protection and the organization's approach to meet these requirements shall be explicitly identified, documented and kept up to date.” 1
What the operator must do
You must (1) explicitly identify all PII-protection obligations that apply to your services, (2) document them in a controlled format, (3) document your approach to meeting them (mapped to controls/procedures), and (4) keep the whole set current as laws, regulations, and contracts change. 1
Plain-English interpretation
If your organization processes PII in a public cloud context as a processor, you need a living “PII obligations register” that answers, without guesswork:
- What rules apply (legal/regulatory + contractual).
- Where they apply (jurisdictions and customer contexts).
- Who owns compliance (named functions and control owners).
- How you meet them (policies, controls, playbooks, and technical measures).
- How you prove it (evidence that ties back to each obligation).
This is not a generic privacy policy. It’s an operational map that lets a CCO or GRC lead point auditors, product, and security teams to the same, current set of requirements.
Who it applies to (entity and operational context)
Primary applicability: Cloud Service Providers acting as PII processors. 1
Operational contexts that trigger complexity:
- Multi-region hosting or customer-selected data residency.
- Use of subprocessors (support tools, analytics, managed services).
- Multiple product lines with different data flows (core platform vs. add-ons).
- Contract variability (enterprise DPAs, government addenda, sector-specific clauses).
If you only document “we comply with privacy laws,” you will fail the intent. The requirement expects specificity and maintained accuracy. 1
What you actually need to do (step-by-step)
Step 1: Define scope based on real processing
Build a simple scoping statement tied to facts:
- Services/products in scope.
- Categories of PII processed (customer content, end-user identifiers, telemetry, support tickets).
- Countries/regions where PII is stored or accessed (including support/admin access locations).
- Subprocessors that touch PII.
Output: PII processing scope memo (owned by GRC with Legal and Security input).
Step 2: Identify applicable legislation and regulatory requirements
For each jurisdiction implicated by your scope (data location, data subjects, and access locations), identify PII protection obligations that apply to a processor in your role. Your output must be explicit and documented. 1
Minimum fields for each entry in your register:
- Jurisdiction / regulator context (e.g., “EU/EEA processing”).
- Obligation theme (lawful processing, security, incident notification, cross-border transfer, data subject rights assistance, retention/deletion).
- Applicability rationale (why it applies to your processing model).
- Internal owner (Legal for interpretation, Security/Engineering for implementation, Support for request handling).
- Control/procedure mapping (links to your control library, SOPs, and technical standards).
- Evidence pointers (what proves compliance).
Step 3: Capture contractual PII requirements as first-class obligations
Treat contract obligations as “requirements” in the same register, not as a separate folder of PDFs. The requirement explicitly includes contractual obligations. 1
Contract sources to ingest:
- DPA templates and negotiated DPAs.
- Security addenda and customer policies incorporated by reference.
- Government/regulated-industry addenda (where used).
- Subprocessor contracts (flow-down obligations you must meet).
Practical approach: normalize contract terms into obligation statements (e.g., “provide breach notice within contractually required timeframe,” “support audits under defined conditions,” “use specific encryption standards where promised”), then map each statement to the responsible SOP/control.
Step 4: Document “the organization’s approach” to meet requirements
This is where many teams stop at a list. ISO/IEC 27018 expects your approach to be documented, meaning:
- Which policy/control set addresses each obligation.
- How obligations are implemented in SDLC, change management, access control, logging, incident response, and customer request handling.
- How exceptions are handled and approved.
Create a one-page “Approach” section per obligation cluster (e.g., “Incident response and notification approach”) that points to:
- The policy standard (what you require),
- The procedure/playbook (how you execute),
- The system configuration standard (how it’s enforced),
- The evidence (how it’s proven).
Step 5: Operationalize updates (the “kept up to date” test)
Design an update mechanism with triggers and ownership:
- Triggers: new region launch, new subprocessor, new product collecting PII, new contract template, major contract deviation, material change in processing, audit findings.
- Cadence: review on a scheduled basis and on trigger events (you can set your cadence as internal policy; the requirement is “kept up to date,” not a specific interval). 1
- Ownership: Legal owns interpretation; GRC owns the register and evidence links; Security/Engineering own implementing controls.
A practical mechanism is a ticketed change workflow: any triggering event creates a task to review the obligations register, update mappings, and attach evidence.
Step 6: Make it usable (don’t bury it)
Auditors will test whether the document exists and whether teams actually follow it. Put the obligations register where operators work:
- In your GRC system (controls mapped to obligations).
- In contract lifecycle management notes (for negotiated terms).
- In your security exception process (exceptions must reference impacted obligations).
If you use Daydream to manage third-party risk and compliance workflows, treat the obligations register as a governed dataset: link each obligation to the controls it relies on, to third-party subprocessors that are involved, and to the evidence you already collect. That reduces duplicate questionnaires and helps you prove that contract promises align with your operational controls.
Required evidence and artifacts to retain
Auditors typically want traceability and currency. Retain:
- PII obligations register (version-controlled; includes legal/regulatory + contractual entries).
- Scope memo describing services, PII categories, jurisdictions, and subprocessors.
- Control-to-obligation mapping (matrix or GRC system export).
- “Approach to meet requirements” documentation (policy/procedure references per obligation cluster).
- Change log showing updates, approvers, and rationale (especially after new regions, new subprocessors, or contract template updates).
- Contract artifacts: DPA templates, redlines for negotiated DPAs, and a normalized obligation extraction for materially different terms.
- Training/communications evidence for teams that execute obligations (support handling requests, incident response notifications, etc.).
- Exception records showing how conflicts between a contract term and your standard approach were resolved.
Common exam/audit questions and hangups
Expect questions like:
- “Show the complete list of PII-related legal, regulatory, and contractual requirements you follow, and who owns each.”
- “How do you decide which jurisdictions apply for a given customer?”
- “Show me the last update and what triggered it.”
- “Pick a contract with non-standard DPA terms. Where is it captured in your obligations register, and what control changed because of it?”
- “How do you ensure subprocessors don’t break your contractual promises to customers?”
Hangups auditors focus on:
- Register exists but is stale.
- Register lists laws but no mapping to controls/evidence.
- Contracts are handled ad hoc; obligations aren’t normalized.
- No link between data residency choices and applicable obligations.
Frequent implementation mistakes (and how to avoid them)
-
Mistake: Treating this as a Legal spreadsheet.
Fix: Make it a joint artifact. Legal supplies obligation statements; GRC ties them to controls and evidence; Engineering confirms technical implementation. -
Mistake: Only tracking “laws where we have offices.”
Fix: Scope by where PII is processed, accessed, and whose PII it is. Processor obligations follow processing reality. 1 -
Mistake: Ignoring negotiated contract terms.
Fix: Require a contract-to-obligation extraction step for any non-standard DPA/security addendum, with a control impact review before signature. -
Mistake: No update trigger tied to product launches and subprocessors.
Fix: Add a checkbox in product launch and procurement workflows: “Does this change PII processing scope?” If yes, it auto-creates an obligations update task. -
Mistake: No evidence pointers.
Fix: Every obligation entry should point to at least one evidence source (policy, log, ticket type, audit report excerpt, configuration standard).
Enforcement context and risk implications
No public enforcement cases were provided in the supplied sources for this requirement, so treat “enforcement” here as audit and contractual exposure. Failure modes create predictable business risk:
- Customer contract breach risk: If you promise specific PII protections in a DPA and cannot show mapped controls, you risk disputes, audit failures, and renewal friction.
- Regulatory noncompliance risk: If applicable obligations are not identified, you are likely missing required procedures (for example, notification handling or rights-request assistance), which increases incident and investigation impact.
- Assurance risk: ISO/IEC 27018 assessments often fail on governance basics. A stale or untraceable register undermines confidence in the rest of your PII control environment. 1
Practical execution plan (30/60/90-day)
Use this as a fast operational ramp. Adjust deliverables to your size and complexity.
First 30 days (Immediate stabilization)
- Confirm in-scope services and PII processing boundaries; publish the scope memo.
- Stand up the obligations register template with mandatory fields (owner, mapping, evidence, currency).
- Ingest contract templates (standard DPA/security addendum) and extract obligations into the register.
- Define update triggers and assign owners (Legal, GRC, Security, Procurement).
By 60 days (Coverage and traceability)
- Populate the register for all jurisdictions implicated by your processing scope.
- Map top obligations to your existing control framework and procedures; fill gaps with targeted SOPs (incident response notice workflow, rights-request assistance workflow, deletion/return process on termination).
- Implement a contract deviation intake: any non-standard DPA term must be entered into the register with an owner and mapping before approval.
By 90 days (Sustainability and audit readiness)
- Add change management integration: region launches, new subprocessors, and product changes automatically prompt a register review.
- Conduct an internal “traceability test”: pick an obligation and walk it to controls and evidence; remediate weak links.
- Prepare an auditor-ready export (register + mapping + sample evidence pack) and train control owners on how to present it.
Frequently Asked Questions
Does “applicable legislation” mean every privacy law globally?
No. It means every law and regulatory requirement that applies to your actual PII processing activities, and you must document the rationale for applicability. The scope follows your data locations, access patterns, and customer contexts. 1
We’re a processor. Do we still need to track requirements aimed at controllers?
Track controller-focused requirements only to the extent they create processor duties (for example, assistance obligations) or are flowed down contractually. Your register should separate “direct processor obligation” from “supporting controller obligation” for clarity.
What qualifies as “kept up to date” for auditors?
Auditors look for a defined update mechanism plus evidence it runs: trigger-based updates, a visible change log, and clear ownership. A static document with no update history rarely passes. 1
How do we handle customer contracts with unique DPA terms?
Require obligation extraction for non-standard terms, then map each term to an existing control or create a contractual exception with compensating measures. Store the mapping alongside the contract record so you can prove execution.
Can we satisfy this with policies alone?
Policies help describe your approach, but ISO/IEC 27018 expects explicit identification and documentation of obligations plus a maintained linkage to how you meet them. You will also need procedures and evidence references to make it auditable. 1
What’s the fastest way to make this operational across third parties and subprocessors?
Treat subprocessors as part of scope, then map obligations to third-party due diligence, contract clauses, and ongoing monitoring evidence. Tools like Daydream help by linking obligation statements to subprocessor inventory, contract artifacts, and recurring evidence requests in one workflow.
Footnotes
Frequently Asked Questions
Does “applicable legislation” mean every privacy law globally?
No. It means every law and regulatory requirement that applies to your actual PII processing activities, and you must document the rationale for applicability. The scope follows your data locations, access patterns, and customer contexts. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
We’re a processor. Do we still need to track requirements aimed at controllers?
Track controller-focused requirements only to the extent they create processor duties (for example, assistance obligations) or are flowed down contractually. Your register should separate “direct processor obligation” from “supporting controller obligation” for clarity.
What qualifies as “kept up to date” for auditors?
Auditors look for a defined update mechanism plus evidence it runs: trigger-based updates, a visible change log, and clear ownership. A static document with no update history rarely passes. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
How do we handle customer contracts with unique DPA terms?
Require obligation extraction for non-standard terms, then map each term to an existing control or create a contractual exception with compensating measures. Store the mapping alongside the contract record so you can prove execution.
Can we satisfy this with policies alone?
Policies help describe your approach, but ISO/IEC 27018 expects explicit identification and documentation of obligations plus a maintained linkage to how you meet them. You will also need procedures and evidence references to make it auditable. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)
What’s the fastest way to make this operational across third parties and subprocessors?
Treat subprocessors as part of scope, then map obligations to third-party due diligence, contract clauses, and ongoing monitoring evidence. Tools like Daydream help by linking obligation statements to subprocessor inventory, contract artifacts, and recurring evidence requests in one workflow.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream