Challenges in the Implementation of Privacy Enhancing Semantic Technologies (PESTs) Supporting GDPR

被引:2
作者
Saniei, Rana [1 ]
机构
[1] Univ Politecn Madrid, Ontol Engn Grp, Madrid, Spain
来源
AI APPROACHES TO THE COMPLEXITY OF LEGAL SYSTEMS XI-XII | 2021年 / 13048卷
基金
欧盟地平线“2020”;
关键词
Compliance; Semantic web; Rule-based reasoning; Data Protection Impact Assessment; Privacy Enhancing Technologies; PRINCIPLES; NORMS;
D O I
10.1007/978-3-030-89811-3_20
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The EU General Data Protection Regulation (GDPR) imposes different requirements for data controllers collecting personal data to protect individuals' privacy. This fact triggered many studies and projects to investigate Privacy Enhancing Technologies (PETs) for the fulfillment of the compliance requirements. In this paper, after reviewing some of the current challenges and gaps in GDPR compliance, we argue the use of Semantic Technologies in PETs in the form of an Intelligent Compliance Agent (ICA) to support data controllers in carrying out a Data Protection Impact Assessment (DPIA). Models and ontologies representing entities involved in the DPIA process can help data controllers determine the risk of their processing activities. Additionally, an inference engine, equipped with a knowledge base of DPIA-related obligations, can effectively assist data controllers in taking specific actions when a legal fact is triggered based on met conditions.
引用
收藏
页码:283 / 297
页数:15
相关论文
共 41 条
  • [1] Agarwal Sushant, 2018, Privacy Technologies and Policy. 6th Annual Privacy Forum (APF 2018). Revised Selected Papers: Lecture Notes in Computer Science (LNCS 11079), P131, DOI 10.1007/978-3-030-02547-2_8
  • [2] Monitoring the GDPR
    Arfelt, Emma
    Basin, David
    Debois, Soren
    [J]. COMPUTER SECURITY - ESORICS 2019, PT I, 2019, 11735 : 681 - 699
  • [3] LegalRuleML: Design Principles and Foundations
    Athan, Tara
    Governatori, Guido
    Palmirani, Monica
    Paschke, Adrian
    Wyner, Adam
    [J]. REASONING WEB: WEB LOGIC RULES, 2015, 9203 : 151 - 188
  • [4] Bartolini C., 2015, RECONCILING DATA PRO
  • [5] Basin D.A., 2017, P INT WORKSHOP COMPE, P19
  • [6] Monitoring Security Policies with Metric First-order Temporal Logic
    Basin, David
    Klaedtke, Felix
    Mueller, Samuel
    [J]. SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 23 - 33
  • [7] Bench-Capon T.J. M., 1992, Artificial Intelligence and Law, V1, P65
  • [8] Bonatti PA, 2018, PROCEEDINGS OF THE TWENTY-SEVENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P1746
  • [9] BPR4GDPR, BUS PROC REENG FUNCT
  • [10] Cisco, 2020, PRIV PROF ACH POS RE