Records related to processing PII

To meet the ISO 27701 records related to processing PII requirement, you must define what privacy records you need and securely maintain them so you can prove compliant PII processing on demand, especially your records of processing activities. Operationally, this means building and governing a living inventory of PII processing that captures purpose, data categories, recipients, transfers, retention, and security measures. 1

Key takeaways:

  • Maintain a controller-grade “record of processing” that maps each PII processing activity end-to-end, not just systems.
  • Treat records as controlled evidence: ownership, change control, secure storage, and retrieval all matter.
  • Design your records to answer regulator/auditor questions fast: what data, why, where, who gets it, how long, and how it’s protected.

“Records related to processing PII” sounds like paperwork until you’re asked to prove, quickly and credibly, that your organization processes personal data for defined purposes, with appropriate protections, and within stated retention limits. ISO/IEC 27701:2019 Clause 7.2.8 requires you to determine and securely maintain the records needed to support your obligations for PII processing, including records of processing activities. 1

For a CCO, privacy lead, or GRC owner, the practical goal is simple: make your PII processing traceable. That traceability should survive staff turnover, system migrations, and third-party changes. In practice, auditors and customers look for a single, controlled place where processing activities are documented, approved, updated, and backed by evidence (contracts, technical controls, retention rules, transfer mechanisms, and security measures).

This page gives you requirement-level implementation guidance: scope, minimal data fields, who owns what, how to run updates, what to retain, and how to avoid the common traps that lead to audit findings.

Regulatory text

ISO/IEC 27701:2019 Clause 7.2.8 / Annex A.7.2.8 states: “The organization shall determine and securely maintain the necessary records in support of its obligations for the processing of PII, including records of processing activities.” 1

Operator meaning: you need a defined set of privacy records (not an ad hoc folder) and you must keep them secure, current, and retrievable. At minimum, maintain records of processing activities that allow you to explain processing purposes, categories of PII, recipients, transfers, retention periods, and security measures. 1

Plain-English interpretation (what the requirement is really asking)

You must be able to answer, with evidence:

  • What PII you process and where it lives (systems, data stores, subprocessors/third parties).
  • Why you process it (defined purposes tied to a business function).
  • Who receives it (internal roles and external third parties).
  • Whether it leaves your environment (cross-border or other transfers) and under what controls.
  • How long you keep it (retention and deletion triggers).
  • How you protect it (security measures relevant to the processing).
    All of that needs to be written down as formal records, stored securely, and governed like audit evidence. 1

Who it applies to

Entity scope: This requirement applies to PII controllers operating a privacy information management system aligned to ISO 27701. 1

Operational contexts where it becomes real work:

  • Multiple business units collecting PII (HR, marketing, sales, customer support, product).
  • Use of third parties for hosting, analytics, customer messaging, payment processing, background checks, benefits administration, or support tooling.
  • Frequent product changes that introduce new telemetry, identifiers, or integrations.
  • M&A, system migrations, or data lake centralization where “what data is where” changes quickly.

What you actually need to do (step-by-step)

1) Define the record set (what “necessary records” means for you)

Start by defining the minimum set of privacy records you will maintain to support PII obligations. ISO 27701 explicitly includes records of processing activities, so treat that as the backbone record. 1

Practical output: a “Privacy Records Standard” (short document) that lists:

  • Required record types (at least: record of processing activities).
  • Mandatory fields per record.
  • Update triggers (new system, new purpose, new third party, new transfer, retention change).
  • Owners and approvers.
  • Where records are stored and how access is controlled.

2) Build a Record of Processing Activities (ROPA) that is processing-centric

A common failure mode is building a “system inventory” and calling it a ROPA. Auditors want processing activities described end-to-end. Create a processing register where each line item is a processing activity (example: “Employee onboarding,” “Customer support ticketing,” “Marketing email campaigns,” “Product analytics event logging”).

Minimum fields to capture (aligns to the summary expectations for controller records):

  • Processing activity name and business owner
  • Purpose(s)
  • Categories of PII (and data subjects, if you track that internally)
  • Sources of the PII (direct from individual, generated by system, from third party)
  • Recipients (internal functions and external third parties)
  • Transfers (including cross-environment/cross-region transfers, if applicable)
  • Retention period and deletion method/trigger
  • Security measures relevant to the processing
    1

3) Map third parties and subprocessors to each processing activity

For each processing activity, list the third parties that touch the data (hosting, SaaS tools, support providers, consultants). Then link to:

  • The governing agreement (DPA, MSA, data processing terms).
  • The service component (which product/module uses them).
  • The data elements shared and allowed purposes.

This is where teams get caught in audits: the ROPA says “analytics vendor,” but the contract isn’t discoverable, or the contract doesn’t match reality.

4) Define secure maintenance requirements (access control + integrity + retention of the records themselves)

“Securely maintain” is both confidentiality and integrity of the record set. Treat the ROPA and supporting privacy records as controlled documents:

  • Restrict edit rights to a small set of accountable owners.
  • Keep an auditable change history (who changed what, when, and why).
  • Store in an approved repository with backup and access logging aligned to your ISMS practices.
  • Define how long you retain privacy records and how you handle archival for historical processing (useful for incident response and regulatory inquiries).
    1

5) Operationalize updates with clear triggers and a lightweight workflow

Create “ROPA update triggers” that hook into existing change processes:

  • New product feature that collects identifiers, telemetry, or user content.
  • New HR process or benefits program.
  • New third party or a third party’s subprocessors change.
  • Changes to retention schedules, storage locations, or security controls.

Execution pattern that works: make the ROPA update a required deliverable in your intake for security reviews, DPIA-style reviews (if you run them), procurement onboarding, and architecture reviews.

6) Run periodic quality checks

Records drift. Build a review cadence tied to real operational events:

  • Sample a set of processing activities and verify evidence (contracts, system configs, retention rules).
  • Reconcile your ROPA against procurement’s third-party list and IT’s system inventory.
  • Validate retention fields against actual deletion jobs, ticketing workflows, or platform policies.

If you want this to move fast without turning into a spreadsheet program, Daydream can act as the system of record for processing activities, link third parties and evidence to each activity, and preserve change history for audit readiness.

Required evidence and artifacts to retain

Keep artifacts that prove the record is accurate and controlled:

Core records

  • Record of processing activities (current version plus change history)
  • Privacy Records Standard (what records you maintain, mandatory fields, governance)
  • Data retention schedule entries that map to processing activities

Supporting evidence (linked to each processing activity where possible)

  • Third-party contracts and DPAs tied to the activity
  • Data flow diagrams or architecture notes for high-risk processing
  • Security control references relevant to the activity (encryption, access controls, logging)
  • Operational procedures for deletion/retention enforcement (runbooks, job configs, tickets)

Governance evidence

  • Named owners, approvers, and review logs
  • Access control list for the repository and proof of restricted editing rights

Common exam/audit questions and hangups

Expect questions like:

  • “Show me your record of processing activities and who approves changes.” 1
  • “Pick one processing activity. Prove the recipients and transfers are complete.”
  • “Where is the retention period enforced in practice?”
  • “How do you ensure new third parties are added to the relevant processing records?”
  • “How are these records protected from unauthorized changes?”

Hangups that slow audits:

  • Records scattered across Confluence, spreadsheets, and ticket comments.
  • No consistent naming for processing activities, leading to duplicates and omissions.
  • Retention fields that say “per policy” without a specific schedule or trigger.
  • Third-party lists that do not reconcile to procurement.

Frequent implementation mistakes (and how to avoid them)

  1. Treating a system inventory as a ROPA.
    Fix: model records around processing activities; link systems as attributes.

  2. No evidence linkage.
    Fix: require each processing activity to link to contracts, diagrams, and control references.

  3. Over-permissioned records.
    Fix: separate “suggested edits” from “approved edits,” and limit who can publish changes.

  4. Retention as a promise, not an implemented control.
    Fix: capture the operational mechanism (job, workflow, admin setting) that enforces retention.

  5. Third parties recorded once, not per processing activity.
    Fix: map third parties to each activity so you can answer “who receives this dataset” quickly.

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite specific regulators or penalties.

Operationally, weak records create three recurring risk outcomes:

  • You cannot answer access/deletion/incident questions quickly because you can’t trace where PII is processed.
  • You sign third-party agreements that conflict with actual data flows.
  • You fail audits because records exist but are not controlled, secure, or current.

Practical 30/60/90-day execution plan

First 30 days (foundation)

  • Assign ownership: one accountable privacy/GRC owner for the ROPA, and business owners per processing activity.
  • Publish the “Privacy Records Standard” defining required fields, repository, and approvals. 1
  • Stand up a secure repository with access controls and change tracking for privacy records.

Days 31–60 (build + populate)

  • Create the initial processing activity list from: system inventory, procurement third-party list, and key business processes.
  • Populate the minimum fields for the highest-risk/highest-volume activities first (HR, customer support, core product, marketing).
  • Link at least one piece of evidence per activity (contract, diagram, retention rule, or security control reference).

Days 61–90 (operationalize)

  • Implement update triggers in procurement onboarding and engineering change workflows.
  • Run a quality review: select several activities and verify recipients, transfers, and retention are accurate in practice.
  • Prepare an audit-ready “ROPA export” and a short walkthrough deck that explains governance, storage, and change control.

Frequently Asked Questions

Do we need a single document, or can records be distributed across tools?

ISO 27701 requires you to “securely maintain” necessary records, including records of processing activities. 1 Distributed records can work only if you can control access, preserve integrity, and retrieve a complete view quickly.

What counts as “necessary records” beyond a record of processing activities?

The requirement is outcome-based: determine what records you need to support PII processing obligations and maintain them securely. 1 In practice, teams keep the ROPA plus linked evidence like third-party agreements, retention rules, and security control references.

How detailed do our processing activity entries need to be?

Detailed enough to explain purpose, categories of PII, recipients, transfers, retention, and security measures for that activity. 1 If an auditor can’t follow the data from collection through sharing and deletion, the entry is too thin.

Who should own updates to the ROPA?

Assign a business owner for each processing activity and a central privacy/GRC owner to manage standards, approvals, and quality checks. This meets the “determine and securely maintain” expectation through defined accountability. 1

How do we handle third parties that support multiple processing activities?

Record the third party once in your third-party inventory, but map it to every processing activity where it receives or accesses PII. That mapping is what allows you to answer “who receives this data” accurately. 1

What’s the fastest way to make this audit-ready without living in spreadsheets?

Use a system that can store processing activities as structured records, link third-party contracts and evidence, enforce access controls, and keep change history. Daydream is often used as the system of record for that workflow, especially when multiple teams contribute updates.

Footnotes

  1. ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management

Frequently Asked Questions

Do we need a single document, or can records be distributed across tools?

ISO 27701 requires you to “securely maintain” necessary records, including records of processing activities. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management) Distributed records can work only if you can control access, preserve integrity, and retrieve a complete view quickly.

What counts as “necessary records” beyond a record of processing activities?

The requirement is outcome-based: determine what records you need to support PII processing obligations and maintain them securely. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management) In practice, teams keep the ROPA plus linked evidence like third-party agreements, retention rules, and security control references.

How detailed do our processing activity entries need to be?

Detailed enough to explain purpose, categories of PII, recipients, transfers, retention, and security measures for that activity. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management) If an auditor can’t follow the data from collection through sharing and deletion, the entry is too thin.

Who should own updates to the ROPA?

Assign a business owner for each processing activity and a central privacy/GRC owner to manage standards, approvals, and quality checks. This meets the “determine and securely maintain” expectation through defined accountability. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)

How do we handle third parties that support multiple processing activities?

Record the third party once in your third-party inventory, but map it to every processing activity where it receives or accesses PII. That mapping is what allows you to answer “who receives this data” accurately. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)

What’s the fastest way to make this audit-ready without living in spreadsheets?

Use a system that can store processing activities as structured records, link third-party contracts and evidence, enforce access controls, and keep change history. Daydream is often used as the system of record for that workflow, especially when multiple teams contribute updates.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
ISO/IEC 27701: Records related to processing PII | Daydream