"The Grace Period Has Ended": An Approach to Operationalize GDPR Requirements

被引:51
作者
Ayala-Rivera, Vanessa [1 ]
Pasquale, Liliana [1 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci, Lero UCD, Dublin, Ireland
来源
2018 IEEE 26TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE 2018) | 2018年
关键词
GDPR; Compliance; Privacy; Requirements; LEGAL REQUIREMENTS;
D O I
10.1109/RE.2018.00023
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The General Data Protection Regulation (GDPR) aims to protect personal data of EU residents and can impose severe sanctions for non-compliance. Organizations are currently implementing various measures to ensure their software systems fulfill GDPR obligations such as identifying a legal basis for data processing or enforcing data anonymization. However, as regulations are formulated vaguely, it is difficult for practitioners to extract and operationalize legal requirements from the GDPR. This paper aims to help organizations understand the data protection obligations imposed by the GDPR and identify measures to ensure compliance. To achieve this goal, we propose GuideMe, a 6-step systematic approach that supports elicitation of solution requirements that link GDPR data protection obligations with the privacy controls that fulfill these obligations and that should be implemented in an organization's software system. We illustrate and evaluate our approach using an example of a university information system. Our results demonstrate that the solution requirements elicited using our approach are aligned with the recommendations of privacy experts and are expressed correctly.
引用
收藏
页码:136 / 146
页数:11
相关论文
共 24 条
  • [1] [Anonymous], 2017, PRIVACY EU GDPR 2017
  • [2] Boella G, 2014, 2014 IEEE 7TH INTERNATIONAL WORKSHOP ON REQUIREMENTS ENGINEERING AND LAW (RELAW), P14, DOI 10.1109/RELAW.2014.6893476
  • [3] Pseudonymization and impacts of Big (personal/anonymous) Data processing in the transition from the Directive 95/46/EC to the new EU General Data Protection Regulation
    Bolognini, Luca
    Bistolfi, Camilla
    [J]. COMPUTER LAW & SECURITY REVIEW, 2017, 33 (02) : 171 - 181
  • [4] Breaux T., 2014, Introduction to IT privacy: a handbook for technologists
  • [5] A distributed requirements management framework for legal compliance and accountability
    Breaux, Travis D.
    Anton, Annie I.
    Spafford, Eugene H.
    [J]. COMPUTERS & SECURITY, 2009, 28 (1-2) : 8 - 17
  • [6] Cavoukian A., 2012, Operationalizing privacy by design: A guide to implementing
  • [7] Christmann C, 2015, CLOUD COMPUTING, P1
  • [8] A Critical Analysis of Privacy Design Strategies
    Colesky, Michael
    Hoepman, Jaap-Henk
    Hillen, Christiaan
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 33 - 40
  • [9] Dittel A., 2016, DATA SECURITY REQUIR
  • [10] Drozd O., 2015, IFIP INT SUMMER SCH, P129