Procedures Defining Information Security Control Requirements for the Privacy