Organization's purposes
To meet the ISO 27701 “Organization’s purposes” requirement, you must ensure any PII you process for a customer is processed only for the purposes the customer has documented in its instructions. Operationally, this means translating “documented instructions” into enforceable contract terms, mapped processing activities, and technical/organizational controls that prevent any off-instruction use. 1
Key takeaways:
- You need a clear, retrievable record of customer instructions for purpose, scope, and limits, tied to each processing activity. 1
- You must implement controls that make “off-purpose” processing hard or impossible (access, segregation, change control, and logging). 1
- Auditors will test for mismatches between what the contract says and what systems, teams, and subprocessors actually do with the data. 1
“Organization’s purposes” sounds like a privacy principle, but in ISO/IEC 27701 Clause 8.2.2 it is an operational constraint: as a PII processor, you do not get to invent purposes for customer PII. Your job is to process strictly within the customer’s documented instructions, and to have working controls that keep the business inside those boundaries. 1
This requirement is easy to “agree to” and surprisingly easy to fail in practice. Common failure modes include product analytics that quietly reuse customer content, ML training on support tickets, broad internal access for troubleshooting, or subprocessors whose services expand over time without purpose re-authorization. None of those are inherently prohibited in the abstract; they become nonconformities when they exceed the customer’s documented purposes and instructions. 1
The goal of this page is to help you operationalize the requirement quickly: identify where customer purposes live, connect them to processing activities, and implement the controls and evidence that auditors expect.
Regulatory text
ISO/IEC 27701 Clause 8.2.2 / Annex B.8.2.2 states: “The organization shall ensure that PII processed on behalf of a customer is only processed for the purposes expressed in the documented instructions of the customer.” 1
What the operator must do:
- Obtain and maintain documented customer instructions that clearly state permitted purposes for processing; 2) ensure every instance of processing (people, systems, subprocessors) stays within those purposes; and 3) prevent, detect, and correct any processing outside the instructions. 1
Plain-English interpretation (what “Organization’s purposes” means)
If you process PII for a customer, you are acting under the customer’s direction for defined purposes, not your own. You can only process the PII for the purposes the customer has documented, and you must be able to prove your operations match those instructions. 1
A practical test
Ask: “Could we show a customer, an auditor, and our engineers a single source of truth that answers: what purpose is this PII processed for, where, by whom, using which systems, and under what limits?” If the answer is no, you have execution risk even if your contract language looks fine. 1
Who it applies to
Entity scope
- PII processors processing PII on behalf of a customer. 1
Operational scope (where this shows up)
- Customer production environments (hosting, support operations, managed services)
- Internal admin tooling and observability (logs, traces, backups)
- Customer support (ticketing, screen shares, call recordings)
- Data pipelines (ETL, warehousing, analytics)
- Subprocessors (cloud infrastructure, customer success tools, email/SMS providers)
- Engineering workflows (debug datasets, test environments) 1
What you actually need to do (step-by-step)
Step 1: Define “documented instructions” and where they live
Create an explicit internal definition of acceptable instruction sources. Typical examples include:
- Data Processing Agreement (DPA) and order form / statement of work
- Written customer configuration directives (admin settings, signed change requests)
- Support tickets that contain a clear instruction and approval trail
- Subprocessor authorizations and service descriptions attached to the agreement 1
Operator move: maintain a customer-instructions register that points to the authoritative document(s) per customer and captures: permitted purposes, data types, allowed processing operations, geographic constraints if specified by the customer, and approved subprocessors.
Step 2: Translate instructions into a “purpose-to-processing map”
For each product/service line, map:
- Purpose (as stated by the customer)
- Processing activities required to deliver that purpose (collect, store, disclose, delete, etc.)
- Systems involved (production DBs, logging, backups, analytics)
- Roles with access (support, SRE, engineering)
- Subprocessors involved and their role in the purpose 1
Evidence-friendly output: a “processing activity matrix” where each row is a processing activity and the first column is “Customer documented purpose / instruction reference.”
Step 3: Close the “shadow processing” gap (common audit finding)
Run a focused discovery for processing that often falls outside written purposes:
- Product telemetry that includes identifiers or content
- Session replay tools
- ML/AI training datasets
- Non-prod copies of prod data
- Long-lived backups and archives
- Debug logging with payload capture 1
For each item, decide:
- Covered by existing instructions: document the linkage.
- Not covered: stop the processing, or obtain updated written customer instructions and contract terms before continuing. 1
Step 4: Implement controls that enforce purpose limitation in operations
Auditors care less about philosophical alignment and more about whether your controls stop drift.
Minimum control set to operationalize the requirement:
- Contract/DPA controls: explicit “processor may process only on documented instructions” language, and a change mechanism for new purposes. 1
- Access controls: role-based access to customer PII; restrict engineering access; use time-bound access for support when feasible; log admin access. 1
- Data segregation: prevent cross-customer data mixing in analytics and debugging stores unless explicitly instructed/authorized by each customer. 1
- Change management: any new feature that processes customer PII (including logging/telemetry changes) triggers a privacy review that checks alignment with documented purposes. 1
- Subprocessor governance: ensure subprocessors only receive the data needed for the documented purpose; keep subprocessor scope aligned with customer instructions. 1
- Monitoring and detection: audit logs for access and exports; alert on unusual access patterns; periodic reviews against the purpose-to-processing map. 1
Where Daydream fits naturally: if you struggle to keep customer instructions, subprocessor scope, and real processing activities in sync across teams, Daydream can act as the system of record for third-party and customer-driven processing constraints, tie them to evidence, and streamline control testing without chasing documents across inboxes. 1
Step 5: Build a permissioned exception path (because reality happens)
Create a simple workflow for when teams want to do something new with customer PII:
- Describe the proposed processing and purpose.
- Identify affected customers and data.
- Confirm whether existing instructions cover it.
- If not covered, route to Legal/Privacy to obtain updated documented customer instructions.
- Implement technical controls and update the purpose-to-processing map. 1
Required evidence and artifacts to retain
Auditors will expect you to show both “paper” and “reality.”
Core artifacts
- Executed DPA / SOW / order form language that defines permitted purposes and instruction hierarchy 1
- Customer-instructions register 1
- Purpose-to-processing map / processing activity matrix tied to instruction references
- Subprocessor list with scope descriptions and customer instruction linkage
- Access control policy and records showing restricted access to customer PII
- Audit logs for administrative access and data exports where applicable
- Change management records (tickets/PRs) showing privacy review for new PII processing
- Training/acknowledgment records for staff handling customer PII 1
Practical evidence tip: keep “one customer, end-to-end” evidence packets ready (contract → instruction → mapped processing → system controls → logs). Audits often sample a small set and go deep.
Common exam/audit questions and hangups
Expect questions like:
- “Show me where customer processing purposes are documented for Customer A.” 1
- “Which systems process Customer A’s PII, and how do you know they’re within instruction?” 1
- “How do you prevent engineering from using production PII for debugging or testing beyond purpose?” 1
- “What triggers a review when a new feature introduces a new PII processing activity?” 1
- “How do you ensure subprocessors process only per customer instructions?” 1
Hangups that cause findings:
- Instructions exist but are vague, scattered, or not connected to actual system design.
- Analytics/logging pipelines are treated as “internal,” with no purpose review.
- Subprocessor scope is described at a high level, but data flows are broader in practice. 1
Frequent implementation mistakes (and how to avoid them)
-
Mistake: treating the DPA as sufficient evidence.
Fix: build the purpose-to-processing map and show system-level controls that enforce it. 1 -
Mistake: assuming “service improvement” is always an allowed purpose.
Fix: only process for “service improvement” if it is expressed in the customer’s documented instructions; otherwise, obtain updated instructions or turn off that use case for that customer. 1 -
Mistake: forgetting support tooling.
Fix: inventory ticketing, call recordings, screen shares, and attachments; tie them to explicit purposes and retention/deletion handling aligned to instructions. 1 -
Mistake: “temporary” debug data becomes permanent.
Fix: enforce time-bound access and data lifecycle controls for debug datasets; document the instruction basis or stop collecting that data. 1
Enforcement context and risk implications
ISO/IEC 27701 is a certifiable standard, not a regulator, so the immediate consequence is typically audit nonconformity, certification risk, and customer trust impact if you cannot demonstrate processing strictly within customer instructions. The practical risk is uncontrolled “purpose creep,” where product, analytics, and support behavior expands faster than contract updates, creating inconsistent commitments across customers. 1
A practical 30/60/90-day execution plan
First 30 days (Immediate stabilization)
- Appoint an owner for customer instructions (often Privacy, GRC, or Legal Ops).
- Create the customer-instructions register template and populate it for your highest-risk or largest customers.
- Inventory systems and subprocessors that touch customer PII; flag analytics/logging/support tools for deeper review.
- Implement a “no new PII processing without review” gate in your change process. 1
By 60 days (Operational mapping and control alignment)
- Build the purpose-to-processing map for each major service line.
- Reconcile “shadow processing” items; stop or re-authorize anything not covered by documented instructions.
- Tighten access pathways for support and engineering; ensure access is logged and reviewable.
- Update subprocessor descriptions so scope matches real data flows and customer instructions. 1
By 90 days (Evidence readiness and continuous control)
- Assemble audit-ready evidence packets for sampled customers (instructions → processing map → controls → logs).
- Train customer-facing and engineering teams on what counts as documented instructions and what requires re-authorization.
- Establish a recurring review cadence to confirm processing activities still match customer purposes, especially after product releases and subprocessor changes. 1
Frequently Asked Questions
What counts as “documented instructions” from the customer?
The standard requires purposes “expressed in the documented instructions of the customer,” so you need written, retrievable instruction sources such as a DPA/SOW, signed change orders, or clearly authorized written requests. Keep a register that links each instruction to the processing it permits. 1
Can we use customer PII for internal analytics or product improvement?
Only if that purpose is expressed in the customer’s documented instructions. If your analytics pipeline processes PII beyond delivery of the service the customer instructed, you need updated instructions or you need to change the pipeline to avoid that PII. 1
Does this requirement apply to logs and backups?
Yes if the logs or backups contain customer PII and are part of “PII processed on behalf of a customer.” Tie logging/backups to an allowed purpose in the customer’s instructions (for example, service operation, security, or recovery), and control access accordingly. 1
How do we handle subprocessors under this requirement?
You remain responsible for ensuring PII is processed only for customer-instructed purposes, even when a subprocessor is involved. Keep subprocessor scope aligned to documented customer instructions and map each subprocessor to the processing activities it supports. 1
Our contract language is broad. Do we still need a purpose-to-processing map?
Yes. Audits test whether operations match documented instructions, and “broad language” often fails to describe real systems, data flows, and access paths. The map is how you prove the linkage from instruction to actual processing. 1
What’s the fastest way to get audit-ready for this control?
Pick a small set of representative customers and build end-to-end evidence packets that show instruction → processing map → controls → logs. That exercise exposes purpose creep quickly and gives you a repeatable method for the rest of the customer base. 1
Footnotes
Frequently Asked Questions
What counts as “documented instructions” from the customer?
The standard requires purposes “expressed in the documented instructions of the customer,” so you need written, retrievable instruction sources such as a DPA/SOW, signed change orders, or clearly authorized written requests. Keep a register that links each instruction to the processing it permits. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)
Can we use customer PII for internal analytics or product improvement?
Only if that purpose is expressed in the customer’s documented instructions. If your analytics pipeline processes PII beyond delivery of the service the customer instructed, you need updated instructions or you need to change the pipeline to avoid that PII. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)
Does this requirement apply to logs and backups?
Yes if the logs or backups contain customer PII and are part of “PII processed on behalf of a customer.” Tie logging/backups to an allowed purpose in the customer’s instructions (for example, service operation, security, or recovery), and control access accordingly. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)
How do we handle subprocessors under this requirement?
You remain responsible for ensuring PII is processed only for customer-instructed purposes, even when a subprocessor is involved. Keep subprocessor scope aligned to documented customer instructions and map each subprocessor to the processing activities it supports. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)
Our contract language is broad. Do we still need a purpose-to-processing map?
Yes. Audits test whether operations match documented instructions, and “broad language” often fails to describe real systems, data flows, and access paths. The map is how you prove the linkage from instruction to actual processing. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)
What’s the fastest way to get audit-ready for this control?
Pick a small set of representative customers and build end-to-end evidence packets that show instruction → processing map → controls → logs. That exercise exposes purpose creep quickly and gives you a repeatable method for the rest of the customer base. (Source: ISO/IEC 27701:2019 Security techniques — Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management)
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream