August 7, 2024

ISO 27001:2022 Annex A Control 6.2: Terms and Conditions of Employment

Annex A control 6.2 of the 2022 version of the ISO 27001 standard can be mapped to ISO 27001:2013 Annex A 7.1.2

By
Full name
Share this post
A woman smiles while using a tablet, surrounded by digital notifications and a data chart.

Any new employee must be subject to a contractual agreement, in order to give them a clear understanding of the company’s and their own responsibility for information security. This is at the core of Annex A control 6.2.

Requiring workers to sign an employment contract or another form of agreement ensures that new staff are familiar with the company’s information security policy and the roles and responsibilities within it.

Understanding control 6.2

Control 6.2 aims to make sure employees are aware of their responsibility over protecting company assets and confidential information. The control describes the terms and conditions of employment within an organisation’s ISMS, supporting compliance with a range of legal and regulatory requirements.

Employees must be aware of the confidentiality obligations they hold, as well as other relevant terms and conditions, before starting work. This may involve tech or social media restrictions.

Annually reviewing control 6.2 ensures that changes to business procedures or structures are reflected in employee documentation.

Meeting the requirements of Annex 6.2

Complying with control 6.2 is relatively simple, as an employment contract or letter outlining all terms and conditions of employment is all that’s required. This is particularly important for roles and duties relating to information security.

The organisation’s information security policy and relevant topic-specific policies should be taken into account when creating contractual obligations. Control 6.2 states that an employment contract should cover the following points:

  • Signed confidentiality or nondisclosure agreements by those given access to confidential information, before they are given access
  • A rundown of legal rights and responsibilities, such as data protection laws and copyright laws
  • Outline of responsibilities surrounding information asset management and the classification of information
  • A record of the information processing facilities, information services, information assets and other associated assets handled by personnel
  • The responsibility for handling information from interested parties
  • Actions taken and explained in the event of personnel disregarding information security requirements
  • Agreement to terms and conditions by personnel

What’s changed since 2013?

Control 6.2 from ISO 27001:2022 replaces control 7.1.2 from ISO 27001:2013, and there is no difference between the two except for certain phraseology and the annex number.

Risk Management
Compliance Reporting
Policy Management
Incident Management
Audits and Assessments

Ready to Take Control of Your Privacy Compliance?

See how Hicomply can accelerate your path to CAF compliance in a 15-minute demo.

Risk Management

Identify, assess, and mitigate security risks with an integrated risk register.Hicomply’s automated risk management software maps controls across ISO 27001, SOC 2, and NIST frameworks — helping teams track risk treatment plans, assign ownership, and monitor real-time compliance status.Build a resilient ISMS that reduces audit findings and demonstrates continuous improvement.

Compliance Reporting

Generate instant, audit-ready compliance reports across multiple frameworks — from ISO 27001 and SOC 2 to GDPR, DORA, and NHS DSPT.Automated evidence collection and built-in dashboards provide a single source of truth for your compliance posture, saving weeks of manual work during audits.

Policy Management

Centralise, version, and publish all your information security policies in one place.Hicomply automates approvals, reminders, and distribution, ensuring your ISMS documentation stays current and aligned with frameworks like ISO 42001 and NIST CSF.Say goodbye to outdated PDFs — manage policies dynamically and maintain full traceability.

Incident Management

Capture, investigate, and resolve security incidents with structured workflows and automated evidence trails.Hicomply integrates with ticketing tools like Jira, Zendesk, and Azure DevOps to streamline incident response and link findings to risk and control updates — a key step for SOC 2 Type II readiness.

Audits and Assessments

Simplify internal and external audit preparation with built-in audit templates and automated task assignments.
Hicomply’s audit management platform aligns with ISO 27001, ISO 9001, and ISO 14001, giving teams a clear overview of control effectiveness, audit evidence, and corrective actions — all from one dashboard.

Getting Started
Computer Software
IT and Services
Legal Services
Professional Services
Growth