Skip to content

What does control A.3.14 require?

Records related to PII processing shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release.

This control sits within the Shared security controls annex (A.3) and addresses a fundamental governance requirement: the records that demonstrate your privacy compliance must themselves be secure. If records can be lost, altered or accessed without authorisation, they lose their value as evidence of compliance.

What does the Annex B implementation guidance say?

Annex B (section B.3.14) provides the following guidance:

  • Historical policy review — Review of both current and historical policies may be required in certain situations, such as resolving customer disputes or responding to investigations by supervisory authorities
  • Retain copies of privacy documentation — Keep copies of privacy policies and procedures for the period specified in the organisation’s retention schedule, including previous versions when policies are updated

The guidance highlights that records protection is not just about current documents. Organisations may need to demonstrate what policies were in place at a specific point in time — for example, to show that adequate safeguards existed when a breach occurred, or to respond to a data subject complaint that references historical processing.

How does this map to GDPR?

Control A.3.14 maps to GDPR Article 5(2) (accountability principle) and Article 24(2) (implementation of appropriate data protection policies). The accountability principle requires controllers to be able to demonstrate compliance, which depends entirely on having reliable, protected records. If records are lost or tampered with, the organisation cannot fulfil this obligation.

What changed from ISO 27701:2019?

For a step-by-step approach, see the Transition from 2019 to 2025.

In the 2019 edition, this requirement was covered by Clause 6.15.1.3 (protection of records). The 2025 edition retains the core requirements as A.3.14 with clearer separation between the control statement and implementation guidance in B.3.14. The emphasis on retaining historical versions of privacy policies remains a key feature of the guidance. See the Annex F correspondence table for the full mapping.




ISMS.online's powerful dashboard

Start your free trial

Sign up for your free trial today and get hands on with all the compliance features that ISMS.online has to offer




What evidence do auditors expect?

When assessing compliance with A.3.14, auditors will typically look for:

  • Records retention policy — A documented policy specifying how long PII processing records are retained, including minimum retention periods for different record categories
  • Version control — Evidence that previous versions of privacy policies, procedures and processing records are retained and accessible, with clear version numbering and dates
  • Access controls — Restrictions on who can access, modify and delete privacy records, with audit logging of any changes
  • Backup and recovery — Evidence that records are backed up and can be recovered in the event of system failure or data loss
  • Integrity controls — Mechanisms to detect and prevent falsification of records, such as audit trails, digital signatures or tamper-evident storage

What are the related controls?

Control Relationship
A.3.9 Access rights Access to privacy records must be restricted to authorised personnel
A.3.12 Incident response Breach records must be protected as part of the organisation’s records management
A.3.13 Legal and contractual requirements Retention periods may be driven by legal obligations
A.3.15 Independent review Auditors need access to historical records to verify ongoing compliance
A.3.16 Compliance with policies Records protection practices should be verified during compliance reviews

Who does this control apply to?

A.3.14 is a shared control that applies to both PII controllers and PII processors. Controllers must protect records demonstrating their compliance with data protection laws, including processing records, consent records and privacy impact assessments. Processors must protect records of processing activities carried out on behalf of controllers, breach notifications and contractual documentation.




ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.

ISMS.online supports over 100 standards and regulations, giving you a single platform for all your compliance needs.




Why choose ISMS.online for protecting PII processing records?

ISMS.online provides practical tools for maintaining secure, auditable privacy records:

  • Version-controlled document management — Every policy, procedure and record is version-controlled with full change history, so you can always retrieve the version that was in force at any point in time
  • Role-based access controls — Restrict access to privacy records by role, ensuring only authorised personnel can view, edit or export sensitive documentation
  • Tamper-evident audit trail — All changes to records are logged with timestamps and user identities, providing evidence of integrity
  • Automated retention management — Set retention periods for different record types with alerts before expiry, ensuring compliance with your retention schedule
  • Secure cloud storage — Records are stored with encryption at rest and in transit, with automated backups and disaster recovery

FAQs

Why is it important to retain previous versions of privacy policies?

Supervisory authorities or courts may need to review the policies that were in place at a specific point in time — for example, when a breach occurred, when a data subject’s PII was processed, or when a complaint was made. Without historical versions, the organisation cannot demonstrate what safeguards were in place. Retaining dated, version-controlled copies of all privacy documentation is essential for accountability.


How long should PII processing records be retained?

The standard does not prescribe a specific retention period. This should be defined in the organisation’s retention schedule based on applicable legal requirements, contractual obligations and business needs. GDPR does not specify exact retention periods for compliance records, but organisations should retain them for long enough to respond to supervisory authority investigations and data subject complaints, which can arise several years after processing occurred.


What types of records does this control cover?

This covers all records related to PII processing, including: processing activity records, privacy policies and procedures, consent records, data protection impact assessments, breach reports, data subject request logs, supplier agreements, training records and audit reports. The common thread is that any record used to demonstrate privacy compliance should be protected under this control.



Max Edwards

Max works as part of the ISMS.online marketing team and ensures that our website is updated with useful content and information about all things ISO 27001, 27002 and compliance.

Take a virtual tour

Start your free 2-minute interactive demo now and see
ISMS.online in action!

platform dashboard full on mint

We’re a Leader in our Field

4/5 Stars
Users Love Us
Leader - Spring 2026
High Performer - Spring 2026 Small Business UK
Regional Leader - Spring 2026 EU
Regional Leader - Spring 2026 EMEA
Regional Leader - Spring 2026 UK
High Performer - Spring 2026 Mid-Market EMEA

"ISMS.Online, Outstanding tool for Regulatory Compliance"

— Jim M.

"Makes external audits a breeze and links all aspects of your ISMS together seamlessly"

— Karen C.

"Innovative solution to managing ISO and other accreditations"

— Ben H.