PII disclosure notification

To meet the ISO/IEC 27018 PII disclosure notification requirement, you must notify each cloud customer promptly whenever you receive a legally binding law enforcement request to disclose that customer’s PII, unless law prohibits you from notifying. Operationalize this with an intake-and-triage workflow, a customer notification procedure, documented legal hold handling, and audit-ready evidence for every request.

Key takeaways:

  • You need a repeatable workflow for law enforcement requests: validate, scope, decide, notify (or document prohibition), and disclose.
  • The “unless prohibited” clause requires disciplined legal review and proof of why you did not notify.
  • Auditors will look for complete request files, notification logs, and contract/process alignment with your role as a public cloud PII processor.

“PII disclosure notification” in ISO/IEC 27018 is narrow, but examiners treat it as a high-sensitivity control because it sits at the intersection of law enforcement access, customer trust, and contractual commitments. If you are a public cloud provider acting as a PII processor, you will receive subpoenas, court orders, or other compulsory demands from authorities. ISO/IEC 27018 expects you to treat those demands as a controlled process, not an ad hoc email thread.

For a CCO or GRC lead, the fastest path to compliance is to (1) define what counts as a “legally binding request,” (2) route every request through a consistent legal and security triage, and (3) notify the affected customer unless notification is prohibited. The hard part in practice is not writing the policy; it’s handling edge cases (multi-tenant data, unclear account mapping, gag provisions, emergency requests, and cross-border service teams) without missing customer notification or over-disclosing.

This page translates the requirement into an operational playbook: who it applies to, what to build, what to retain as evidence, what auditors ask, and how to execute quickly without guessing at legal interpretations.

Regulatory text

Requirement (verbatim): “The public cloud PII processor shall notify the cloud service customer of any legally binding request for disclosure of PII by a law enforcement authority, unless the disclosure is otherwise prohibited.” 1

What the operator must do

You must implement a process that:

  1. Identifies and centrally captures any legally binding request from law enforcement for PII.
  2. Determines which cloud service customer(s) are affected.
  3. Notifies the customer of the request before disclosure, where possible, or as soon as permitted if timing or legal constraints exist.
  4. If notification is prohibited, documents the prohibition basis and maintains evidence that notification was not allowed.
  5. Ensures disclosures are scoped to the request and executed through controlled channels.

This is a “shall” requirement. Auditors expect consistency, traceability, and proof that exceptions were handled under defined criteria, not discretion.

Plain-English interpretation (requirement-level)

If law enforcement compels you to hand over a customer’s PII, you must tell the customer that the request exists and what it demands—unless you are legally barred from telling them. If you can’t notify, you still need a complete internal record showing what the request was, who approved the response, what was disclosed, and why notice was prohibited.

Who it applies to

Entities

  • Public cloud PII processors (cloud service providers processing PII on behalf of customers). 1

Operational contexts where this becomes “real”

  • Your company receives subpoenas, warrants, court orders, or other compulsory requests.
  • Requests arrive via mail, email, portals, or in-person service.
  • You operate multi-tenant platforms where isolating a specific customer’s PII requires careful technical and legal scoping.
  • You run shared support operations and need strict access control during evidence collection and production.

What you actually need to do (step-by-step)

Use this workflow as your baseline operating procedure. The goal is repeatability and an audit trail.

1) Establish a single intake path (and stop “side door” requests)

  • Publish an internal-only “Law Enforcement Request Intake” process for all front-line teams (support, trust & safety, SOC, account teams).
  • Route all requests to a defined queue (case management system or ticketing) owned by Legal/Compliance with Security support.
  • Train staff to forward requests immediately and not respond directly, even to “urgent” officers.

Operational tip: The control fails most often when a regional support team “helps” outside the workflow.

2) Verify the request is legally binding and from a law enforcement authority

  • Validate the request type (e.g., subpoena/court order) and authenticity (issuer, signature, service method).
  • Confirm it is from a law enforcement authority (or served through appropriate legal channels).
  • Record validation steps in the case file.

Decision point: If the request is not legally binding, treat it as a non-compulsory inquiry and handle under your separate data request policy. Do not treat this ISO control as satisfied by generic transparency reporting.

3) Identify the impacted customer(s) and PII scope

  • Map identifiers in the request (account IDs, email domains, tenant IDs, IPs, device identifiers) to the correct customer tenancy.
  • Determine whether the requested data is:
    • Customer content
    • Account metadata
    • Logs/telemetry
    • Backups/archives
  • Confirm data location and retention realities (what exists vs. what is requested).

Multi-tenant hangup: Build a technical scoping checklist to prevent over-collection. Over-collection creates breach risk and contractual exposure.

4) Perform a notification permissibility check (“unless prohibited”)

  • Legal reviews whether you are allowed to notify the customer.
  • Explicitly check for:
    • Secrecy/gag provisions in the order
    • Statutory restrictions or court-imposed non-disclosure
    • Timing restrictions (e.g., delayed notice)
  • Document the conclusion in the case file:
    • “Notify allowed” or “Notify prohibited”
    • Who approved it
    • What condition triggers later notice (if delayed notice)

Control objective: You should be able to show, case-by-case, why a customer was notified or not notified.

5) Notify the customer (content and method)

When notification is allowed, notify through a controlled channel:

  • Use the customer’s designated legal/security contact from your contract records (not an ad hoc operational contact).
  • Provide enough detail to be meaningful without disclosing beyond what is appropriate:
    • That a legally binding law enforcement request was received
    • Date received
    • Issuing authority (as allowed)
    • High-level categories of PII requested
    • Response deadline (if you can share it)
    • Whether you intend to comply, object, or seek clarification (as appropriate)
  • Record delivery evidence (timestamp, recipient, method).

Practical note: Create a standard notification template with fillable fields and a legal-approved set of “allowed disclosures” so you can move fast without improvising.

6) Execute production through controlled handling

  • Limit access to the production task force (need-to-know).
  • Use secure export methods, encryption in transit, and approved transfer channels.
  • Keep a record of:
    • Exact data produced
    • Date/time of production
    • Approvals
    • Transfer method
    • Recipient confirmation (where available)

7) Close the loop: delayed notice, post-production actions, and lessons learned

  • If notice was delayed/prohibited, track the condition that allows later notice and trigger notification when permitted.
  • Run a short retrospective on:
    • Intake quality
    • Customer mapping accuracy
    • Over/under production risk
    • Opportunities to tighten templates and checklists

Required evidence and artifacts to retain

Auditors will expect a “request file” per event plus program-level documentation. Keep:

Program-level artifacts

  • Law enforcement request handling policy/procedure aligned to the ISO requirement 1
  • Roles and responsibilities (Legal, Security, Support, Privacy)
  • Notification templates (allowed vs. prohibited vs. delayed notice variants)
  • Training records for intake teams and responders
  • A customer contact registry for legal/security notices (or reference to where it is maintained)

Case-level artifacts 1

  • Copy of the request (or a controlled-access record if storage is restricted)
  • Authenticity/validation notes
  • Data scoping worksheet (what systems were searched, what data was found)
  • Legal determination on notification permissibility, including prohibition rationale when applicable
  • Customer notification copy plus delivery proof, or documented prohibition
  • Production package manifest (what was disclosed) and approvals
  • Timeline log of actions taken

Common exam/audit questions and hangups

Expect questions like:

  • “Show me all law enforcement requests for the period and the associated customer notifications.”
  • “How do you determine a request is legally binding?”
  • “Where do you document the decision not to notify, and who approves it?”
  • “How do you prevent over-disclosure in a multi-tenant environment?”
  • “How do you ensure the right customer contact receives notice?”
  • “If notification is delayed, how do you track and execute later notice?”

Common hangup: teams have a policy but no evidence of consistent execution. Another hangup: requests handled in email without a case record, making it impossible to prove notification decisions.

Frequent implementation mistakes (and how to avoid them)

  1. Relying on an annual transparency report instead of direct customer notice.
    Fix: this control is about notifying the specific customer for the specific request.

  2. No documented “prohibited from notifying” decision.
    Fix: require a formal Legal sign-off field in every case, even if the outcome is “notify allowed.”

  3. Over-collecting data “just in case.”
    Fix: enforce a scoping checklist and require a second review (Legal + Security) of the production manifest.

  4. Not knowing which customer is impacted.
    Fix: maintain accurate tenant-to-contact mappings and require account identification before any production work.

  5. Front-line staff responding directly to law enforcement.
    Fix: train, test with internal simulations, and lock down who can communicate externally.

Enforcement context and risk implications

No public enforcement cases were provided in the supplied source catalog, so this page does not list specific actions. Practically, the risk is still material: failure to notify can trigger contractual disputes, customer churn, and claims that your cloud did not meet processor obligations. Over-disclosure has its own consequences: you may expose other customers’ data, create breach notification obligations, and lose the defensibility of your legal response process.

Practical 30/60/90-day execution plan

You asked for speed. This is a build order that works in real shops.

First 30 days (stand up the minimum viable control)

  • Assign ownership: Legal lead + Security co-owner; name a backup approver.
  • Create the single intake channel and instruct all staff to route requests there.
  • Publish a short SOP with a one-page checklist: validate, scope, notify/prohibit, produce, record.
  • Draft and approve customer notification templates and “prohibited/delayed notice” language blocks.
  • Decide where evidence lives (case system) and what must be attached for closure.

Day 31–60 (make it reliable and auditable)

  • Build a case record template with mandatory fields (request type, customer, notification decision, approvals, production manifest).
  • Implement a customer legal/security contact registry workflow (who maintains it, how it stays current).
  • Add guardrails: access controls for production tasks, logging, and review steps.
  • Run a tabletop exercise using a realistic request to test end-to-end execution and evidence capture.

Day 61–90 (reduce error rates and operational friction)

  • Create technical playbooks per data type (logs, content, backups) with scoping defaults and escalation points.
  • Add a “delayed notice tracker” to prevent silent non-notification when the prohibition expires.
  • Establish periodic internal review of closed cases for completeness and over-disclosure risk.
  • If you use Daydream for third-party risk and compliance operations, map this requirement to a control record and attach request files as evidence objects so audits don’t become a spreadsheet hunt.

Frequently Asked Questions

What counts as a “legally binding request” for purposes of this requirement?

Treat it as a compulsory legal process that requires disclosure, such as a court order or similar binding instrument. Your procedure should require Legal to validate the request type and authenticity before any disclosure or customer notice decision. 1

Do we have to notify the customer before we disclose the PII?

ISO/IEC 27018 requires notification unless prohibited; it does not prescribe exact timing in the excerpt. Operationally, notify before disclosure when permitted; if notice is delayed or prohibited, document why and track when notice becomes allowed. 1

What does “unless the disclosure is otherwise prohibited” mean in practice?

It means you may be legally barred from informing the customer about the request (for example, due to a non-disclosure condition). Your control needs a mandatory Legal determination and retained evidence showing why notice was not allowed. 1

Can we satisfy this by pointing customers to our law enforcement guidelines page?

No. A public web page can support transparency, but the requirement is customer-specific notification for each legally binding request, unless prohibited. Keep a case record showing the actual notice sent (or the prohibition). 1

What evidence will an auditor ask for if we were prohibited from notifying?

Expect to show the request, Legal’s documented conclusion that notice was prohibited, and the internal timeline of actions taken. Also show how you track delayed notice if the prohibition lifts. 1

How do we prevent over-disclosure in a multi-tenant cloud environment?

Use a scoping worksheet, require technical mapping to the correct tenant, and have a second reviewer approve the production manifest. Restrict access to personnel with a need-to-know and record exactly what was produced. 1

Footnotes

  1. ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

Frequently Asked Questions

What counts as a “legally binding request” for purposes of this requirement?

Treat it as a compulsory legal process that requires disclosure, such as a court order or similar binding instrument. Your procedure should require Legal to validate the request type and authenticity before any disclosure or customer notice decision. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

Do we have to notify the customer before we disclose the PII?

ISO/IEC 27018 requires notification unless prohibited; it does not prescribe exact timing in the excerpt. Operationally, notify before disclosure when permitted; if notice is delayed or prohibited, document why and track when notice becomes allowed. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

What does “unless the disclosure is otherwise prohibited” mean in practice?

It means you may be legally barred from informing the customer about the request (for example, due to a non-disclosure condition). Your control needs a mandatory Legal determination and retained evidence showing why notice was not allowed. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

Can we satisfy this by pointing customers to our law enforcement guidelines page?

No. A public web page can support transparency, but the requirement is customer-specific notification for each legally binding request, unless prohibited. Keep a case record showing the actual notice sent (or the prohibition). (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

What evidence will an auditor ask for if we were prohibited from notifying?

Expect to show the request, Legal’s documented conclusion that notice was prohibited, and the internal timeline of actions taken. Also show how you track delayed notice if the prohibition lifts. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

How do we prevent over-disclosure in a multi-tenant cloud environment?

Use a scoping worksheet, require technical mapping to the correct tenant, and have a second reviewer approve the production manifest. Restrict access to personnel with a need-to-know and record exactly what was produced. (Source: ISO/IEC 27018:2019 Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO/IEC 27018: PII disclosure notification | Daydream