Identify and document purpose

To meet the ISO/IEC 27701 “identify and document purpose” requirement, you must define the specific purpose for every PII processing activity and record it in a durable system before the processing starts. Operationally, this means every product, workflow, and third-party data exchange has a mapped, approved purpose statement that is consistent across notices, contracts, and internal records. 1

Key takeaways:

  • Maintain a purpose register at the processing-activity level, not a vague “we use data to improve services” statement.
  • Require purpose capture and approval as a gating step in change management, onboarding, and third-party intake.
  • Keep purpose statements consistent across your RoPA-like inventory, privacy notices, and processor/third-party agreements.

“Identify and document purpose” sounds simple until you try to enforce it across product teams, operations, and third parties. ISO/IEC 27701 expects a PII controller to name the specific purposes for which PII will be processed, and to document those purposes as an input to the rest of your privacy program. 1

For a CCO, Compliance Officer, or GRC lead, the fastest path is to treat purpose as structured data tied to each processing activity, with clear ownership and change control. You are building a defensible record that answers: “Why do we need this PII, for this workflow, and what would be out of scope?” That record becomes the anchor for downstream controls: data minimization, retention, access controls, third-party sharing limits, privacy notices, and internal approvals.

This page gives you requirement-level implementation guidance: who must comply, how to write “specific” purposes that survive audit scrutiny, where to embed purpose capture in your operating model, what evidence to retain, and what auditors usually challenge.

Regulatory text

Requirement (verbatim): “The organization shall identify and document the specific purposes for which the PII will be processed.” 1

Operator meaning: Before any processing begins, you need an explicit, documented purpose for that processing. “Specific” is the operative word. A purpose statement must be precise enough that a reviewer can tell whether a proposed new use is in-scope or a new purpose that needs separate review and approvals. 1

Plain-English interpretation

You must be able to point to a record (not tribal knowledge) that explains why you process each set of PII and what you do with it. If a team cannot articulate the purpose, they should not be collecting or using the PII yet.

A practical test: if you removed the purpose field from your processing inventory and asked a new compliance analyst to assess whether a new feature is “consistent with existing use,” could they answer without interviewing the entire product org? If not, your purposes are probably too broad.

Who it applies to (entity and operational context)

Applies to: PII controllers. This includes organizations that determine why and how PII is processed, even if the processing is executed by processors, SaaS platforms, or other third parties. 1

Operational contexts where this commonly breaks:

  • Product releases and feature flags where PII use changes without a formal review.
  • Marketing ops introducing new audiences, enrichment sources, identity graphs, or tracking.
  • Customer support tooling (ticketing, call recording, AI summarization).
  • HR and recruiting expanding background checks or assessment tooling.
  • Third-party sharing where data is “sent for processing” but the controller purpose is not documented or is inconsistent with contract language.

What you actually need to do (step-by-step)

1) Define “processing activity” as your unit of control

Pick a consistent granularity and stick to it. A good default is: one processing activity per business workflow that has a distinct purpose and data flow (e.g., “Account creation,” “Fraud detection,” “Payroll processing,” “Support ticket management”).

Output: A written scoping rule and a simple decision guide for teams.

2) Create a purpose taxonomy with controlled language

You need standard purpose categories to avoid a purpose register full of one-off prose. Use controlled values plus a short free-text description.

Example purpose categories (adapt to your business):

  • Provide contracted service / fulfill transaction
  • Security monitoring and incident response
  • Fraud prevention and abuse detection
  • Customer support and quality assurance
  • Billing and collections
  • Legal/regulatory compliance
  • Product analytics and service improvement
  • Marketing communications (opt-in/opt-out aware)
  • HR administration and workforce management

Purpose statement template (use this for each activity):

  • Purpose category: (controlled value)
  • Specific purpose statement: “Process [PII elements] for [business outcome] in [system/workflow] for [data subjects], initiated by [trigger].”
  • Out-of-scope clarifier: “Not used for [common adjacent use] without separate assessment.”

3) Build a “Purpose Register” tied to your processing inventory

Store it where it will be governed (GRC tool, privacy management platform, or a controlled repository). The key is versioning, approvals, and discoverability.

Minimum fields to capture per processing activity:

  • Activity name and owner (business + system)
  • Data subject group (customers, employees, applicants, etc.)
  • PII categories involved (high level, not every column)
  • Documented purpose (category + specific statement)
  • Source of data (direct, third party, derived)
  • Recipients (internal teams, processors, third parties)
  • Systems involved
  • Approval record (who approved and when)
  • Effective date and change history

If you manage third-party risk in Daydream, treat “purpose” as a required field in third-party intake and in each data-sharing assessment so contracts and security reviews stay aligned with controller intent.

4) Make purpose capture a gate in operational workflows

Documentation that sits off to the side decays quickly. Put purpose where work starts:

Embed purpose checks into:

  • Project intake / privacy intake: no intake completion without a purpose.
  • Change management: changes that add new PII, new recipients, or new analytics require purpose re-validation.
  • Data access requests: requesting team must cite the purpose ID/record; approvers validate fit.
  • Third-party onboarding: the business sponsor must map the third party’s processing to your documented purposes.
  • API/data export approvals: purpose must be explicitly recorded for each outbound integration.

5) Add a “new purpose” trigger and escalation path

Define what counts as a new purpose. Common triggers:

  • New data subject group
  • New recipient (especially external third party)
  • New decisioning or profiling use
  • New data category that changes sensitivity
  • Repurposing from service delivery to marketing/ads
  • Material change in how long data is kept or where it is stored

Escalation path: business owner → privacy/compliance review → security review (as needed) → legal/contracting (as needed) → approval logged in the register.

6) Train operators with examples, not policy text

Most failures come from vague drafting. Train with before/after examples:

  • Too broad: “Improve our services.”

  • Better: “Analyze in-product event data linked to user identifiers to diagnose feature errors and prioritize bug fixes in the mobile app.”

  • Too broad: “Marketing.”

  • Better: “Send lifecycle emails to existing customers about account status and feature updates using email address and usage tier.”

Required evidence and artifacts to retain

Auditors will look for proof you did this before processing, and that it stays current.

Retain:

  • Purpose Register / processing inventory extract showing purpose fields completed and approved
  • Purpose taxonomy and drafting standard (controlled values + writing guidance)
  • Workflow evidence (intake forms, change tickets, access request forms) that require purpose entry
  • Approval records (system approvals, sign-offs, meeting notes if formalized)
  • Change history for purpose updates (who/what/when/why)
  • Third-party mapping tying data sharing to documented purposes (intake artifacts, contracts references, DPIA/PIA references if you run those)

Common exam/audit questions and hangups

Expect these lines of questioning:

  • “Show me how you ensure purposes are identified before a new feature launches.”
  • “Pick a processing activity and walk me from purpose to actual data use in systems.”
  • “How do you prevent teams from reusing a dataset for a different purpose?”
  • “How do third parties fit into your purpose documentation?”
  • “How do you keep privacy notices, internal purposes, and contract scopes consistent?”

Hangups that cause findings:

  • Purpose exists, but only as prose in a slide deck, with no owner, approval date, or linkage to the processing activity.
  • A single purpose statement is reused across many unrelated workflows, which reads like a placeholder.
  • Purpose is documented internally but contradicted by third-party contract language or operational reality.

Frequent implementation mistakes (and how to avoid them)

Mistake 1: Writing “enterprise purposes” instead of activity purposes

Fix: force purpose capture at the processing-activity level; allow roll-ups for reporting, but don’t govern at the roll-up layer.

Mistake 2: No “out-of-scope” boundary

Fix: require one explicit “not used for…” line for high-risk datasets (identity, financial, health-adjacent, precise location). It prevents silent expansion.

Mistake 3: Purpose recorded after the fact

Fix: add gating controls in intake/change/access. If you can’t block, require an exception record with an owner and remediation date.

Mistake 4: Third parties treated as “their problem”

Fix: map every third-party data disclosure to your purposes. Your purpose statement should explain why the third party receives the data and what they do for you.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific actions.

Operationally, weak purpose documentation creates predictable risk:

  • Scope creep: teams repurpose data because nothing defines boundaries.
  • Inconsistent external statements: notices and contracts drift from actual use.
  • Harder incident response: you cannot quickly determine whether a dataset was processed for an approved purpose or shared beyond scope.
  • Third-party exposure: data sent to third parties without a documented controller purpose is hard to defend during audits and customer due diligence.

Practical execution plan (30/60/90)

Exact timelines depend on your environment and were not provided in the source catalog, so treat these as phased execution milestones.

First 30 days (Immediate stabilization)

  • Name an owner for the purpose standard (privacy, compliance, or GRC).
  • Define the processing-activity granularity and publish a one-page drafting guide.
  • Stand up a minimal Purpose Register (even if it’s a controlled spreadsheet temporarily) with required fields and versioning.
  • Pilot with a small set of high-visibility activities (customer onboarding, billing, support, marketing ops) to validate the template.

By 60 days (Embed into workflows)

  • Add purpose fields to project intake and third-party onboarding.
  • Update access request workflows to require a purpose reference.
  • Train product, marketing, HR, and procurement on “specific purpose” examples and common triggers for “new purpose.”
  • Start a reconciliation pass: compare recorded purposes vs privacy notice statements and third-party contract scopes; open tickets where misaligned.

By 90 days (Operational control and audit readiness)

  • Convert the register into a system with approvals and change history (GRC/privacy tooling).
  • Expand coverage across remaining processing activities and major third parties.
  • Add periodic reviews tied to change events (new systems, new integrations, new data categories) rather than calendar-only refreshes.
  • Prepare an audit packet: purpose standard, register extract, sample intake tickets, sample approvals, and third-party mappings.

Frequently Asked Questions

What counts as “specific purposes” in practice?

A specific purpose describes the business outcome and the workflow, not a generic aspiration. If you can’t tell whether a new use is out of scope by reading the purpose statement, it isn’t specific enough. 1

Do we need a purpose for internal analytics and monitoring?

Yes. Analytics and monitoring are still processing, so document the purpose per activity (e.g., reliability monitoring vs product optimization) and tie it to the systems and identifiers used. 1

How do we handle a team that wants to reuse an existing dataset for a new use case?

Treat it as a “new purpose” trigger unless the existing documented purpose clearly covers the new use. Require an update to the Purpose Register and an approval record before the new processing starts. 1

What evidence will an auditor accept to show purposes were documented before processing?

Time-stamped intake records, change tickets, or approvals tied to the processing activity are usually the cleanest evidence. A register entry without provenance is weaker than a register entry linked to an approval workflow. 1

How should we document purpose for third parties that process data on our behalf?

Document your controller purpose for disclosing the PII to the third party, and map the third party’s services to that purpose. Keep the mapping alongside onboarding and contract artifacts so procurement, security, and privacy review the same scope. 1

Can one purpose cover multiple systems?

Yes, if it’s truly the same processing activity and outcome across systems. If systems support different outcomes or recipients, split the activity so each has a distinct purpose and owner. 1

Footnotes

  1. ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management

Frequently Asked Questions

What counts as “specific purposes” in practice?

A specific purpose describes the business outcome and the workflow, not a generic aspiration. If you can’t tell whether a new use is out of scope by reading the purpose statement, it isn’t specific enough. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)

Do we need a purpose for internal analytics and monitoring?

Yes. Analytics and monitoring are still processing, so document the purpose per activity (e.g., reliability monitoring vs product optimization) and tie it to the systems and identifiers used. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)

How do we handle a team that wants to reuse an existing dataset for a new use case?

Treat it as a “new purpose” trigger unless the existing documented purpose clearly covers the new use. Require an update to the Purpose Register and an approval record before the new processing starts. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)

What evidence will an auditor accept to show purposes were documented before processing?

Time-stamped intake records, change tickets, or approvals tied to the processing activity are usually the cleanest evidence. A register entry without provenance is weaker than a register entry linked to an approval workflow. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)

How should we document purpose for third parties that process data on our behalf?

Document your controller purpose for disclosing the PII to the third party, and map the third party’s services to that purpose. Keep the mapping alongside onboarding and contract artifacts so procurement, security, and privacy review the same scope. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)

Can one purpose cover multiple systems?

Yes, if it’s truly the same processing activity and outcome across systems. If systems support different outcomes or recipients, split the activity so each has a distinct purpose and owner. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO/IEC 27701: Identify and document purpose | Daydream