An analysis by Winners Consulting Services Co., Ltd. finds that the latest 2024 research on criminal compliance from the University of Barcelona reveals that implementing a Criminal Compliance System (CCS) in the IT security sector is no longer an option but a core mechanism for preventing cybercrime risks and protecting corporate reputation. For Taiwanese enterprises facing the triple compliance pressure of GDPR, Taiwan's Personal Information Protection Act (PIPA), and ISO 27701, this provides a systematic framework worth referencing.
Source: Criminal compliance system: implementation of a compliance model in the information technology security sector (Màrquez Postigo, Sandra, arXiv, 2024)
Original Link: https://core.ac.uk/download/613716714.pdf
About the Author and This Study
Sandra Màrquez Postigo is a graduate of the Faculty of Law at the University of Barcelona (Universitat de Barcelona). This paper is her final degree thesis (Treball Final de Grau) for the 2023-2024 academic year, supervised by criminal law scholar Dr. Javier Cigüela Sola. Although it is an undergraduate thesis, its research perspective is quite mature: the author not only approaches the topic from the Spanish domestic legal framework but also broadly examines international trends in criminal compliance within the IT security sector, analyzing them through the lens of the EU legal framework.
The importance of this study lies in its use of a systematic literature review to comprehensively outline the legal basis, core elements, and implementation steps of Criminal Compliance. This fills a gap in academic literature, which has less frequently addressed the "criminal liability aspect" of IT security compliance. For Taiwanese corporate executives, this research offers an integrated perspective that combines legal risk management with cybersecurity governance, making it a valuable reference for their Privacy Information Management System (PIMS) strategies.
From Criminal Compliance to Cybersecurity Governance: Five Core Propositions from the Paper
The central argument of this paper is that compliance has evolved from a "trendy management tool" into a "key resource" for demonstrating an organization's commitment to ethical integrity, good governance, and long-term sustainability. The following are the main findings identified by the author through normative legal research:
Core Finding 1: A Criminal Compliance System (CCS) is the first line of defense against cybercrime.
The paper clearly states that an effective compliance program is a "critical bulwark" against criminal activities. Especially in the field of cybersecurity, with the rapid evolution of cybercrime since 2016, companies lacking a systematic CCS framework not only face financial losses from ransomware attacks and data theft but may also incur criminal liability for internal control failures. The author emphasizes that a CCS is not just a defensive tool but also the institutional foundation for building a corporate ethical culture.
Core Finding 2: The design and implementation of a CCS require five key steps.
The paper systematically outlines a design framework for a criminal compliance system, which includes: (1) risk assessment and identification, (2) design of control measures, (3) development of compliance policies, (4) training and personnel involvement, and (5) monitoring and continuous improvement. These five steps are highly consistent with the implementation logic of ISO 27701—particularly the privacy risk assessment (corresponding to DPIA) and continuous improvement mechanisms required by the standard. This indicates that there is a common, integrable foundation between criminal compliance and a Privacy Information Management System (PIMS) at the structural level.
Core Finding 3: Multidisciplinary professional talent is essential for the success of a CCS.
The paper specifically highlights that compliance work in the IT security field is highly complex, and professionals with a single legal or technical background are insufficient to manage the overall picture. The author points out the need for a combination of expertise from law, information security, risk management, and organizational behavior—this is precisely the talent gap that Taiwanese companies often face when promoting integrated compliance.
Three Key Implications of the Study for PIMS Practices in Taiwan
Although this study is based on the Spanish and EU legal systems, its core framework is highly relevant for Taiwanese enterprises. Especially with the ongoing advancement of the draft amendment to Taiwan's PIPA in 2023, the increasing enforcement of GDPR, and the growing demand for ISO 27701 certification, the following three implications deserve the attention of Taiwanese executives:
Implication 1: Personal data protection cannot rely solely on technical safeguards; a legal liability management mechanism must be established concurrently. Article 48 of Taiwan's PIPA stipulates administrative penalties for enterprises that fail to take appropriate security measures, while Article 83 of the GDPR imposes fines of up to €20 million or 4% of global annual turnover for serious violations. The paper notes that the core value of a CCS lies in integrating "legal liability" into daily management, which aligns with the spirit of ISO 27701 Clause 6.15, requiring a lawful basis for processing personal data. Taiwanese companies should shift their regulatory compliance mechanisms from reactive responses to proactive management.
Implication 2: DPIA (Data Protection Impact Assessment) should become a standard operating procedure, not a one-time activity. The paper emphasizes that a CCS requires "continuous monitoring" and "periodic review," which corresponds to the Data Protection Impact Assessment (DPIA) mechanism required by Article 35 of the GDPR. When implementing ISO 27701, Taiwanese companies should establish an SOP for conducting regular DPIAs and link the assessment results to their cybersecurity incident response plans to form a closed-loop management system.
Implication 3: The study's methodological limitations remind Taiwanese enterprises of the need for localized adaptation. Objectively, this paper is primarily based on the EU legal framework (especially Article 31bis of the Spanish Criminal Code) and lacks direct correspondence with the regulatory environment in the Asia-Pacific region, including Taiwan. When applying this framework, Taiwanese companies must integrate it with the local regulations of Taiwan's PIPA, the latest guidelines from competent authorities (such as the National Development Council and the Financial Supervisory Commission), and Asia-Pacific regulatory dynamics like the facial recognition guidelines issued by Japan's PPC in 2023. Such context-specific adjustments are necessary to create a truly applicable Taiwanese version of the GDPR compliance framework.
Winners Consulting Services Helps Taiwanese Enterprises Build Integrated Criminal Compliance and Privacy Protection Mechanisms
Winners Consulting Services Co., Ltd. assists Taiwanese enterprises in implementing the ISO 27701 standard, establishing personal data protection mechanisms that comply with GDPR and Taiwan's PIPA, and conducting DPIAs. Integrating the criminal compliance system framework revealed in this paper, we offer the following concrete action recommendations:
- Conduct a CCS Gap Assessment: Compare your existing cybersecurity compliance mechanisms against the five-step framework proposed in the paper (risk identification → control design → policy development → training → monitoring and improvement), with a special focus on whether "criminal liability risk" has been included in the scope of your ISO 27701 management.
- Establish a Regular DPIA Operational Mechanism: In accordance with GDPR Article 35 and ISO 27701 Clause 7.2.5, design a DPIA execution template and an annual review plan suitable for your company's scale, and ensure that the assessment results effectively feed back into the organization's data protection policies.
- Form a Multidisciplinary Compliance Task Force: Echoing the paper's emphasis on multidisciplinary talent, we recommend that Taiwanese companies ensure their ISO 27701 certification task force includes representatives from legal, information security, HR, and business departments, and plan for no less than 8 hours of professional compliance training annually.
Winners Consulting Services Co., Ltd. offers a Free PIMS Health Check to help Taiwanese enterprises establish an ISO 27701-compliant management system within 7 to 12 months.
Learn More About PIMS Services → Apply for a Free Health Check Now →Frequently Asked Questions
- What is the relationship between a Criminal Compliance System (CCS) and the PIMS of ISO 27701? Do companies need to implement them separately?
- They are highly complementary in structure, and an integrated implementation is recommended. A Criminal Compliance System (CCS) focuses on managing a company's legal liability for criminal acts, while ISO 27701 concentrates on privacy protection for personal information. However, research by Màrquez Postigo (2024) reveals a significant overlap between the five-step CCS framework (risk assessment, control design, policy development, training, monitoring) and the PDCA cycle of ISO 27701. For Taiwanese companies facing both administrative penalties under Taiwan's PIPA and cross-border requirements from GDPR, an integrated strategy allows them to cover both sets of requirements within a single framework, saving at least 30% on redundant implementation costs. Winners Consulting Services offers such integrated implementation services.
- What are the most common compliance challenges for Taiwanese companies implementing ISO 27701?
- The three most common challenges for Taiwanese companies implementing ISO 27701 are: first, a lack of multidisciplinary talent proficient in both legal affairs and information security; second, integration gaps between their existing ISO 27001 framework and the privacy extension requirements of ISO 27701, especially in aligning Clause 6.15 'Legal basis for processing personal information' with Article 19 of Taiwan's PIPA regarding 'specific purposes of collection'; and third, the absence of a standardized process for DPIAs, often performing them as a one-time task rather than an ongoing mechanism. This paper's emphasis on continuous training and multidisciplinary involvement directly addresses these challenges.
- What are the core requirements of ISO 27701 certification, and how long does implementation typically take?
- The core requirements of ISO 27701 are built upon the ISO 27001 information security management system, adding privacy-specific controls. Key areas include establishing a lawful basis for collecting and processing personal information (corresponding to GDPR Article 6 and Taiwan PIPA Article 19), mechanisms for responding to data subject rights, implementing Privacy by Design principles, and a formal DPIA process. Regarding the timeline, companies already certified with ISO 27001 typically need 6 to 9 months to implement the ISO 27701 extension. For those without ISO 27001, a full implementation period of 10 to 14 months is recommended. The standard advisory period at Winners Consulting Services is 7 to 12 months, adjusted based on the company's size and maturity.
- What resources are needed to implement ISO 27701, and how can the expected benefits be quantified?
- Implementation costs vary by company size, but for a mid-sized enterprise (200-500 employees), the total cost—including external consultants, training, system adjustments, and certification fees—typically ranges from NT$1.5 million to NT$3.5 million. The expected benefits can be quantified in three ways: (1) Reduced legal risk: GDPR fines can reach €20 million or 4% of global annual turnover, and ISO 27701 certification serves as tangible proof of 'appropriate protective measures.' (2) Enhanced customer trust: For B2B businesses dealing with European or American clients, ISO 27701 is becoming a prerequisite in supplier vetting. (3) Improved internal efficiency: A systematic compliance framework reduces incident response costs, with some companies reporting a 25% increase in internal audit efficiency.
- Why choose Winners Consulting Services for assistance with Privacy Information Management System (PIMS) issues?
- Winners Consulting Services Co., Ltd. is a specialized consulting firm in Taiwan focusing on PIMS and ISO 27701 certification, offering several key advantages. First, we provide localized guidance that deeply integrates the frameworks of GDPR, Taiwan's PIPA, and ISO 27701, helping clients achieve multiple compliance goals under a single management system. Second, our team has a multidisciplinary background in law, information security, and organizational management, addressing the need for diverse expertise highlighted in this research. Third, our standard 7-to-12-month advisory service provides end-to-end support from gap analysis and system design to personnel training and certification audits. Fourth, we offer a free PIMS health check, allowing companies to assess their current status and prioritize improvements before committing resources.
FAQ
- 刑事合規系統(CCS)與ISO 27701的個資管理機制有何關係?企業需要分別建置嗎?
- 兩者在架構層面高度互補,建議整合建置而非分別處理。刑事合規系統(CCS)聚焦於企業對犯罪行為的法律責任管理,ISO 27701則專注於個人資料的隱私保護管理。Màrquez Postigo(2024)的研究揭示,CCS的五步驟框架(風險評估、控制設計、政策制定、訓練、監控)與ISO 27701的PDCA管理循環高度重疊。台灣企業若同時面對台灣個資法的行政罰則與GDPR的跨境合規要求,建議採用整合性合規策略,以單一框架同步覆蓋兩套要求,可節省至少30%的重複建置成本。積穗科研提供此類整合性導入服務,歡迎諮詢。
- 台灣企業導入ISO 27701時最常遇到哪些合規挑戰?
- 台灣企業在ISO 27701導入過程中,最常見的三大挑戰依序為:第一,缺乏同時熟悉法務與資訊安全的複合型人才;第二,現有ISO 27001認證架構與ISO 27701隱私擴充要求的整合落差,尤其是ISO 27701第6.15條「個資處理合法性基礎」與台灣個資法第19條「蒐集特定目的」的對應解釋;第三,DPIA(個資衝擊評估)缺乏標準化流程,僅執行一次而未建立常態化機制。GDPR第35條要求特定高風險處理活動必須執行DPIA,違反者可依第83條被裁罰最高1,000萬歐元。本論文強調持續訓練與多學科投入的必要性,正是針對這類挑戰提出的具體解方。
- ISO 27701認證的核心要求是什麼?大約需要多少時間完成導入?
- ISO 27701的核心要求建立在ISO 27001資訊安全管理系統的基礎上,新增隱私資訊管理擴充控制項,主要涵蓋:個資蒐集與處理的合法性基礎(對應GDPR第6條及台灣個資法第19條)、資料主體權利回應機制、隱私設計原則(Privacy by Design)與DPIA執行流程。就導入時程而言,已持有ISO 27001認證的企業通常需要6至9個月完成ISO 27701的擴充建置;尚未導入ISO 27001的企業建議預留10至14個月的完整建置期。積穗科研的標準輔導期為7至12個月,依企業規模與現有機制成熟度彈性調整。
- 導入ISO 27701需要投入多少資源?預期效益如何量化?
- 導入成本因企業規模而異。中型企業(員工200至500人)的完整導入總費用(含外部顧問、教育訓練、系統調整與認證費用)通常介於新台幣150萬至350萬元之間。預期效益可從三個面向量化:第一,法律風險降低——GDPR違規罰款最高達2,000萬歐元或全球年營業額4%,ISO 27701認證可作為「已採取適當保護措施」的具體證明;第二,客戶信任提升——對歐美企業的B2B業務,ISO 27701認證已逐漸成為供應商資格審查必要條件;第三,內部管理效率提升——系統性合規機制可降低事件應變成本,部分企業回報內部稽核效率提升約25%。
- 為什麼找積穗科研協助隱私資訊管理(PIMS)相關議題?
- 積穗科研股份有限公司(Winners Consulting Services Co. Ltd.)是台灣專注於隱私資訊管理(PIMS)與ISO 27701認證輔導的專業顧問機構,具備以下核心優勢:第一,深度整合GDPR、台灣個資法與ISO 27701三套框架的本土化輔導能力,協助企業在單一管理架構下同步達成多重合規目標;第二,顧問團隊涵蓋法律、資訊安全與組織管理的多學科背景,呼應本論文強調的多學科人才需求;第三,標準輔導期為7至12個月,提供從缺口分析、機制設計、人員訓練到驗證審查的全程陪跑服務;第四,提供免費的PIMS機制診斷,讓企業在正式投入前即能掌握現況與優先改善方向。
Was this article helpful?
Related Services & Further Reading
Related Services
Risk Glossary
- ▶
Privacy Risk Assessment Methodology
PRIAM 是一套由法國資料保護機構(CNIL)開發的結構化方法論,旨在系統性地識別、分析及評估個人資料處理活動對當事人權利與自由構成的風險。它將 GDPR 的法律要求轉化為可操作的評估步驟,是企業執行隱私衝擊評估(PIA)的核心工具,以確保合規並降低違規風險。
- ▶
Privacy Impact Analysis
隱私衝擊分析(PIA)是一套系統化流程,用以識別、評估及減緩新專案或系統處理個人資料時對當事人隱私的潛在負面衝擊。它不僅是法規遵循(如GDPR)的關鍵工具,更是企業展現當責性、建立客戶信任的具體實踐。
- ▶
Non-data-driven Targeting
一種不依賴個人用戶數據,而是根據網頁內容或地理位置等情境資訊投放廣告的行銷策略。在GDPR等法規限制下,企業可採用此法降低隱私合規風險,同時維持廣告觸及率。
- ▶
Data Breach Detection
指透過技術與程序,識別未經授權存取、洩漏或竊取敏感資料的過程。適用於監控內外部威脅,對企業而言,是及時應變、降低損害與遵循法規(如個資法)的關鍵第一步。
- ▶
Data Loss Prevention (DLP)
資料外洩防護(DLP)是一套旨在偵測並阻止資料外洩、濫用或未授權存取的策略與工具組合。其應用於端點、網路與雲端,協助企業保護智慧財產、符合法規要求,並預防因內外部威脅造成的敏感資料外洩。
Want to apply these insights to your enterprise?
Get a Free Assessment