Skip to content
Control Stack logo Control Stack
ISM-1451 ASD Information Security Manual (ISM)

Document Data Ownership in Service Contracts

Ensure contracts with service providers clearly state who owns the data.

🏛️ Framework

ASD Information Security Manual (ISM)

🧭 Control effect

Preventative

🔐 Classifications

NC, OS, P, S, TS

🗓️ ISM last updated

Nov 2022

✏️ Control Stack last updated

22 Feb 2026

🎯 E8 maturity levels

N/A

Official control statement
Types of data and its ownership is documented in contractual arrangements with service providers.

Source: ASD Information Security Manual (ISM)

Plain language

When you sign a contract with a service provider, it's essential to clearly define who owns the data that's being handled. If data ownership isn't documented, you might face disputes, lose control over your information, or expose sensitive data to unauthorised parties.

Why it matters

If data types and ownership aren’t documented in service contracts, IP rights may be lost and data use/return can be disputed, increasing risk of unauthorised use or disclosure.

Operational notes

Review service contracts for explicit data types, ownership, use, location, retention and return/destruction clauses; update these terms before renewals and when services or data flows change.

Implementation tips

  • Procurement team should include a data ownership clause: Ensure all contracts include a specific clause that outlines who owns the data generated or processed. Consult with legal advisors to draft clear terms that can be consistently applied.
  • Legal advisors should review contracts: Before signing, have your legal team go over the contract to confirm that data ownership is clearly stated. This helps prevent misunderstandings and protects your rights over the data.
  • IT managers should maintain a checklist: Develop a checklist of must-have contractual terms, including data ownership, especially when engaging with new service providers. Use this checklist to ensure no critical element is overlooked during negotiations.
  • Office managers should hold training sessions: Organise sessions for contract administrators to explain the importance of data ownership and how to check for it in contracts. This ensures that everyone understands the value of securing data ownership.
  • Compliance officers should conduct regular contract audits: Set a routine for reviewing existing contracts to ensure all have clear data ownership clauses. Report any missing clauses to legal and management teams for prompt resolution.

Audit / evidence tips

  • Ask: copies of service agreements: Request the latest versions of service contracts with providers

    Good: is a clause that explicitly defines data ownership and responsibilities

  • Ask: to see contract review procedures: Request documents showing how contracts are reviewed prior to signing

    Good: practice is a documented checklist used consistently for all contracts

  • Ask: about training records: Request records of training sessions for those handling contracts

  • Ask: audit reports on contracts: Request recent internal audit reports on contractual compliance. Check if they include assessments of data ownership clauses

    Good: report identifies any gaps and proposes solutions

  • Ask: legal review documentation: Request confirmations or sign-offs from legal experts who reviewed the contracts

    Good: sign-off clearly mentions data ownership verification

Cross-framework mappings

How ISM-1451 relates to controls across ISO/IEC 27001, Essential Eight, and ASD ISM.

These mappings show relationships between controls across frameworks. They do not imply full equivalence or certification.

ISO 27001

Control Notes Details
Partially meets (2)
Annex A 5.19 ISM-1451 ensures data types and ownership are clearly documented in service contracts
Annex A 5.20 ISM-1451 requires organisations to document data types and ownership in service provider contracts

Mapping detail

Mapping

Direction

Controls