SlideShare a Scribd company logo
1 of 20
Methods and Tools for GDPR Compliance through
Privacy and Data
Protection 4 Engineering
Alejandra Ruiz, Jabier Martinez, Javier Puelles, Izaskun Santamaria (Tecnalia)
Yod Samuel Martin, Jacobo Quintáns, Juan Carlos Yelmo (UPM)
Guillaume Mockly, Estibaliz Arzoz Fernández, Amelie Gyrard, Antonio Kung (Trialog)
Assurance Tool and Method (WP6)
This project has received funding from the European Union's Horizon 2020
programme under Grant Agreement No 787034.
11/06/2021
Supplier Chain
Component
Release
Module Assurance
Case Development
(Independent)
Safety Assessment
Safety
Assessment
Certification
Liaison
Product Engineering
“Project”
Quality
Management
Implementation
Validation &
Verification
Design
Introduction & Objectives
WP6
2
Assurance
“Project”
Assurance Case
Development
Evidence
Management Assurance Process
Management
Compliance
Management
Standards & Regulations
Information Management
Interpretation
Standards
Specification
Privacy
Assessment
(Independent)
Privacy Assessment
Product Engineering
“Project”
Quality
Management
Implementation
Validation &
Verification
Design
Product Engineering
Privacy Reference
Frameworks
Introduction & Objectives
 WP6 Methods and tools for assurance
 Participants: Tecnalia (leader), Trialog, UPM
 Duration: M10 – M33
 Objectives:
 A method to demonstrate compliance with privacy and data protection regulation, including the systematic capture and
recording of evidences, their association to requirements and artefacts, their traceability to the GDPR and other
regulations and standards, and the argumentation of compliance derived from the evidences.
 A standard metamodel to represent the relevant terms to GDPR compliance, including relevant processes, roles...etc.
 A computer-readable knowledge base which contains models of the normative framework that represent GDPR and other
regulation (e.g. WP29 guidance) as well as other data protection standards and mappings between one another, and
assurance patterns.
 A software tool, developed by extending OpenCert, which implements the functions needed to support the method and
which hosts the knowledge base.
 Output:
 Specification of the method and tool: D6.1, D6.2 and D6.3
 Method releases: D6.4 and D6.5
 Tool releases: D6.6 and D6.7
 Knowledge base: D6.8
WP6
3
Results: Outline
 Demonstrated feasibility of
 using state-of-the-art assurance principles for privacy engineering
 modelling privacy regulations as reference framework models
 handling ecosystems of privacy reference frameworks
 providing reusable privacy assurance patterns
Tool-supported
WP6
4
Results
 Using state-of-the-art assurance principles for privacy engineering
A privacy assurance case, is a structured argument supported by a body of evidence, which
provides a convincing and valid justification that a system meets its assurance requirements,
for a given application in a given operating environment *
WP6
5
*Adapted to privacy from the safety world:
Denney et al.
“Hierarchical Safety Cases.” In NASA Formal Methods, 2013
Results
 Using state-of-the-art assurance principles for privacy engineering
WP6
6
GPDR Art. 5: Principles relating to processing of personal data
Paragraph 1
 Lawfulness, fairness and transparency
 Purpose limitation
 Data minimisation
 Accuracy
 Storage limitation
 Integrity and confidentiality
Supplier Chain
Component
Release
Module Assurance
Case Development
(Independent)
Safety Assessment
Safety
Assessment
Certification
Liaison
Product Engineering
“Project”
Quality
Management
Implementation
Validation &
Verification
Design
Results
 Using state-of-the-art assurance principles for privacy engineering
WP6
7
Assurance
“Project”
Assurance Case
Development
Evidence
Management Assurance Process
Management
Compliance
Management
Standards & Regulations
Information Management
Interpretation
Standards
Specification
Privacy
Assessment
(Independent)
Privacy Assessment
Product Engineering
“Project”
Quality
Management
Implementation
Validation &
Verification
Design
Model-based solutions for Privacy assurance projects
Results
 Modelling privacy regulations as reference framework models
Diversity of reference frameworks
 Process-based
 Requirements-based
 Evidence-based
 Legal text
Objectives for modelling: Abstraction and Formalization
WP6
8
Privacy reference frameworks modelled as development processes
General and Application-domain-specific
Results
 Handling ecosystems of privacy reference frameworks
Several privacy reference frameworks apply (and increasing)
WP6
9
Mapping models
GDPR
Art. 35 and 36: Data
protection impact
assessment and prior
consultation
Data Protection Impact
Assessment template
for Smart Grid and
Smart Metering
ISO/IEC 29134
Information technology —
Security techniques —
Guidelines for privacy
impact assessment
Assurance
Project
Definition
Assurance Case
Management
Evidence
Management
Compliance
Management
Reporting
Results
Providing reusable privacy assurance patterns
WP6
10
RefFrameworks Modelling Equivalences Modelling
Results
Providing reusable privacy assurance patterns
Patterns:
 the process of the ref framework is followed
 the expected evidences are considered
 to connect privacy controls with its expected assurance needs
Reusable privacy assurance patterns contain conditions and parts to be refined
They need to be instantiated and refined
WP6
11
Manually created knowledge base, and automatic model transformations
Results
WP6
12
Evidence
Management
Prescriptive
Knowledge
Management
Privacy
Argumentation
Management
Assurance Project
Lifecycle
Management
Project
Repository
Measurement
&
Transparency
Assurance Configuration
Management
System Management
Standards &
Understandings
Argument
Patterns
Risk Control
(WP3)
Product
Engineering
Tools
(WP4, WP5)
Link
Connect
Providing reusable privacy assurance patterns
Results: Overall method
WP6
13
Assurance
Project
Definition
Assurance Case
Management
Evidence
Management
Compliance
Management
Reporting
RefFrameworks Modelling Equivalences Modelling
Reference
Framework models
Mapping
models
Goal Structuring
Notation models
Evidence
models
Results: Tool features and improvements
WP6
14
Assurance
Project
Definition
Assurance Case
Management
Evidence
Management
Compliance
Management
Reporting
RefFrameworks Modelling Equivalences Modelling
Reference
Framework models
Mapping
models
Goal Structuring
Notation models
Evidence
models
(EPL-2)
https://gitlab.eclipse.org/eclipse/opencert/opencert/-/tree/release/2.0
Results: Knowledge base
Privacy Reference Frameworks
 General
 GDPR Data Protection Impact Assessments (DPIA) covering Art. 35 and 36, and WP29 DPIA guidance
 ISO/IEC 29134:2017 (Information technology - Security techniques - Guidelines for privacy impact
assessment)
 Case studies
 ISO/SAE 21434 Road vehicles — Cybersecurity engineering. Process for risk assessment
 EU Smart Grid Data Protection Impact Assessment (DPIA) template
WP6
15
Results: Knowledge base
Mapping models
 ISO/IEC 29134:2017 (Information technology - Security techniques - Guidelines for privacy
impact assessment)
to GDPR Data Protection Impact Assessments (DPIA)
 D7.9 Alignment of Smart Grid DPIA to GDPR DPIA and ISO/IEC 29134:2017
WP6
16
Results: Knowledge base
Privacy Assurance Patterns
 General
 GDPR DPIA argumentation patterns (13 based on Recital 75, Art. 35 and 36)
 NIST SP 800-53 rev 5, Control SI-18 - Information disposal
 NIST SP 800-53 rev 5, Control SI-20 - De-identification
 Case studies
 Connected vehicle: Correct pseudonym management (internally using NIST Control SI-20 pattern)
 SmartGrid: Pre-assessment on the need to conduct a DPIA is completed. Smart Grid DPIA template
 Automatically generated assurance patterns: e.g., Data Protection Risk Assessment is completed from
SmartGrid DPIA template reference framework
WP6
17
Results: Knowledge base
 Public
 https://gitlab.eclipse.org/eclipse/opencert/opencert/-
/tree/release/2.0/examples/privacy
Private
 Reference frameworks and mapping models of standards or documents which are not
freely distributed: Derivative works with high amount of information and text from the
original work
 ISO/IEC 29134:2017 and its mapping model to GPDR
 ISO/SAE 21434
WP6
18
Conclusions and further steps beyond the
project
WP6
19
Using state-of-the-art assurance
principles for privacy engineering
Modelling privacy regulations as
reference framework models
Handling ecosystems of privacy
reference frameworks
Providing reusable privacy
assurance patterns
Tool-supported
Model-based
Open source and flexible
KB available
Community uptake (Industry and Research)
More automation support
Methods and Tools for GDPR Compliance through
Privacy and Data
Protection 4 Engineering
For more information, visit:
www.pdp4e-project.eu
Thank you for your attention
This project has received funding from the European Union's Horizon 2020
programme under Grant Agreement No 787034.

More Related Content

What's hot

Long term security evolution of ai and data protection antonio kung trialog...
Long term security evolution of ai and data protection   antonio kung trialog...Long term security evolution of ai and data protection   antonio kung trialog...
Long term security evolution of ai and data protection antonio kung trialog...Privacy Data Protection for Engineering
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysSolarwinds N-able
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overviewElsa Prieto
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...ijseajournal
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...IJNSA Journal
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...IJNSA Journal
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016Elsa Prieto
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)ijwscjournal
 
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)ijgca
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)ijcga
 

What's hot (20)

Ipen2018
Ipen2018Ipen2018
Ipen2018
 
Long term security evolution of ai and data protection antonio kung trialog...
Long term security evolution of ai and data protection   antonio kung trialog...Long term security evolution of ai and data protection   antonio kung trialog...
Long term security evolution of ai and data protection antonio kung trialog...
 
Granular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio KungGranular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio Kung
 
Ipen 2019 roma status of privacy engineering standardisation v2
Ipen 2019 roma   status of privacy engineering standardisation v2Ipen 2019 roma   status of privacy engineering standardisation v2
Ipen 2019 roma status of privacy engineering standardisation v2
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
 
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
Book
BookBook
Book
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
N-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 daysN-able webinar:Build recurring revenue in 45 days
N-able webinar:Build recurring revenue in 45 days
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...9th International Conference of Security, Privacy and Trust Management (SPTM ...
9th International Conference of Security, Privacy and Trust Management (SPTM ...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...Call for Papers - 6th International Conference on Cryptography and Informatio...
Call for Papers - 6th International Conference on Cryptography and Informatio...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
Witdom overview 2016
Witdom overview 2016Witdom overview 2016
Witdom overview 2016
 
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
2nd International Conference on IOT, Big Data and Security (IOTBS 2022)
 
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
3 rd International Conference on Cloud, Big Data and IoT (CBIoT 2022)
 
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
3rd International Conference on Big Data, Blockchain and Security (BDBS 2022)
 

Similar to Wp6 public

UNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiUNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiBL4CKSWAN Srl
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsIRJET Journal
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2Abi Reddy
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricMark Underwood
 
DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYIRJET Journal
 
Security and Trust in an Industrial Grid Project
Security and Trust in an Industrial Grid ProjectSecurity and Trust in an Industrial Grid Project
Security and Trust in an Industrial Grid ProjectAndreas Schreiber
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
 
Security Patterns: Research Direction, Metamodel, Application and Verification
Security Patterns: Research Direction, Metamodel, Application and VerificationSecurity Patterns: Research Direction, Metamodel, Application and Verification
Security Patterns: Research Direction, Metamodel, Application and VerificationHironori Washizaki
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityAssociate Professor in VSB Coimbatore
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Ulf Mattsson
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Miningijujournal
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCapgemini
 

Similar to Wp6 public (20)

UNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - GuasconiUNINFO - BIG DATA & Information Security Standards - Guasconi
UNINFO - BIG DATA & Information Security Standards - Guasconi
 
Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4Wp5 overall approach_3-pd_pbdmodules_v4
Wp5 overall approach_3-pd_pbdmodules_v4
 
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security AspectsBig Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
 
Wp4 overall approach_v1
Wp4 overall approach_v1Wp4 overall approach_v1
Wp4 overall approach_v1
 
MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2MN691 Assignment 3 - Final Report 2
MN691 Assignment 3 - Final Report 2
 
Implications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy FabricImplications of GDPR for IoT Big Data Security and Privacy Fabric
Implications of GDPR for IoT Big Data Security and Privacy Fabric
 
Paris wp5 pd-pb_d_case_study
Paris wp5 pd-pb_d_case_studyParis wp5 pd-pb_d_case_study
Paris wp5 pd-pb_d_case_study
 
DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
 
Security and Trust in an Industrial Grid Project
Security and Trust in an Industrial Grid ProjectSecurity and Trust in an Industrial Grid Project
Security and Trust in an Industrial Grid Project
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Security Patterns: Research Direction, Metamodel, Application and Verification
Security Patterns: Research Direction, Metamodel, Application and VerificationSecurity Patterns: Research Direction, Metamodel, Application and Verification
Security Patterns: Research Direction, Metamodel, Application and Verification
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
A review on privacy preservation in data mining
A review on privacy preservation in data miningA review on privacy preservation in data mining
A review on privacy preservation in data mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
A Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data MiningA Review on Privacy Preservation in Data Mining
A Review on Privacy Preservation in Data Mining
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 

Recently uploaded (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 

Wp6 public

  • 1. Methods and Tools for GDPR Compliance through Privacy and Data Protection 4 Engineering Alejandra Ruiz, Jabier Martinez, Javier Puelles, Izaskun Santamaria (Tecnalia) Yod Samuel Martin, Jacobo Quintáns, Juan Carlos Yelmo (UPM) Guillaume Mockly, Estibaliz Arzoz Fernández, Amelie Gyrard, Antonio Kung (Trialog) Assurance Tool and Method (WP6) This project has received funding from the European Union's Horizon 2020 programme under Grant Agreement No 787034. 11/06/2021
  • 2. Supplier Chain Component Release Module Assurance Case Development (Independent) Safety Assessment Safety Assessment Certification Liaison Product Engineering “Project” Quality Management Implementation Validation & Verification Design Introduction & Objectives WP6 2 Assurance “Project” Assurance Case Development Evidence Management Assurance Process Management Compliance Management Standards & Regulations Information Management Interpretation Standards Specification Privacy Assessment (Independent) Privacy Assessment Product Engineering “Project” Quality Management Implementation Validation & Verification Design Product Engineering Privacy Reference Frameworks
  • 3. Introduction & Objectives  WP6 Methods and tools for assurance  Participants: Tecnalia (leader), Trialog, UPM  Duration: M10 – M33  Objectives:  A method to demonstrate compliance with privacy and data protection regulation, including the systematic capture and recording of evidences, their association to requirements and artefacts, their traceability to the GDPR and other regulations and standards, and the argumentation of compliance derived from the evidences.  A standard metamodel to represent the relevant terms to GDPR compliance, including relevant processes, roles...etc.  A computer-readable knowledge base which contains models of the normative framework that represent GDPR and other regulation (e.g. WP29 guidance) as well as other data protection standards and mappings between one another, and assurance patterns.  A software tool, developed by extending OpenCert, which implements the functions needed to support the method and which hosts the knowledge base.  Output:  Specification of the method and tool: D6.1, D6.2 and D6.3  Method releases: D6.4 and D6.5  Tool releases: D6.6 and D6.7  Knowledge base: D6.8 WP6 3
  • 4. Results: Outline  Demonstrated feasibility of  using state-of-the-art assurance principles for privacy engineering  modelling privacy regulations as reference framework models  handling ecosystems of privacy reference frameworks  providing reusable privacy assurance patterns Tool-supported WP6 4
  • 5. Results  Using state-of-the-art assurance principles for privacy engineering A privacy assurance case, is a structured argument supported by a body of evidence, which provides a convincing and valid justification that a system meets its assurance requirements, for a given application in a given operating environment * WP6 5 *Adapted to privacy from the safety world: Denney et al. “Hierarchical Safety Cases.” In NASA Formal Methods, 2013
  • 6. Results  Using state-of-the-art assurance principles for privacy engineering WP6 6 GPDR Art. 5: Principles relating to processing of personal data Paragraph 1  Lawfulness, fairness and transparency  Purpose limitation  Data minimisation  Accuracy  Storage limitation  Integrity and confidentiality
  • 7. Supplier Chain Component Release Module Assurance Case Development (Independent) Safety Assessment Safety Assessment Certification Liaison Product Engineering “Project” Quality Management Implementation Validation & Verification Design Results  Using state-of-the-art assurance principles for privacy engineering WP6 7 Assurance “Project” Assurance Case Development Evidence Management Assurance Process Management Compliance Management Standards & Regulations Information Management Interpretation Standards Specification Privacy Assessment (Independent) Privacy Assessment Product Engineering “Project” Quality Management Implementation Validation & Verification Design Model-based solutions for Privacy assurance projects
  • 8. Results  Modelling privacy regulations as reference framework models Diversity of reference frameworks  Process-based  Requirements-based  Evidence-based  Legal text Objectives for modelling: Abstraction and Formalization WP6 8 Privacy reference frameworks modelled as development processes General and Application-domain-specific
  • 9. Results  Handling ecosystems of privacy reference frameworks Several privacy reference frameworks apply (and increasing) WP6 9 Mapping models GDPR Art. 35 and 36: Data protection impact assessment and prior consultation Data Protection Impact Assessment template for Smart Grid and Smart Metering ISO/IEC 29134 Information technology — Security techniques — Guidelines for privacy impact assessment
  • 11. Results Providing reusable privacy assurance patterns Patterns:  the process of the ref framework is followed  the expected evidences are considered  to connect privacy controls with its expected assurance needs Reusable privacy assurance patterns contain conditions and parts to be refined They need to be instantiated and refined WP6 11 Manually created knowledge base, and automatic model transformations
  • 12. Results WP6 12 Evidence Management Prescriptive Knowledge Management Privacy Argumentation Management Assurance Project Lifecycle Management Project Repository Measurement & Transparency Assurance Configuration Management System Management Standards & Understandings Argument Patterns Risk Control (WP3) Product Engineering Tools (WP4, WP5) Link Connect Providing reusable privacy assurance patterns
  • 13. Results: Overall method WP6 13 Assurance Project Definition Assurance Case Management Evidence Management Compliance Management Reporting RefFrameworks Modelling Equivalences Modelling Reference Framework models Mapping models Goal Structuring Notation models Evidence models
  • 14. Results: Tool features and improvements WP6 14 Assurance Project Definition Assurance Case Management Evidence Management Compliance Management Reporting RefFrameworks Modelling Equivalences Modelling Reference Framework models Mapping models Goal Structuring Notation models Evidence models (EPL-2) https://gitlab.eclipse.org/eclipse/opencert/opencert/-/tree/release/2.0
  • 15. Results: Knowledge base Privacy Reference Frameworks  General  GDPR Data Protection Impact Assessments (DPIA) covering Art. 35 and 36, and WP29 DPIA guidance  ISO/IEC 29134:2017 (Information technology - Security techniques - Guidelines for privacy impact assessment)  Case studies  ISO/SAE 21434 Road vehicles — Cybersecurity engineering. Process for risk assessment  EU Smart Grid Data Protection Impact Assessment (DPIA) template WP6 15
  • 16. Results: Knowledge base Mapping models  ISO/IEC 29134:2017 (Information technology - Security techniques - Guidelines for privacy impact assessment) to GDPR Data Protection Impact Assessments (DPIA)  D7.9 Alignment of Smart Grid DPIA to GDPR DPIA and ISO/IEC 29134:2017 WP6 16
  • 17. Results: Knowledge base Privacy Assurance Patterns  General  GDPR DPIA argumentation patterns (13 based on Recital 75, Art. 35 and 36)  NIST SP 800-53 rev 5, Control SI-18 - Information disposal  NIST SP 800-53 rev 5, Control SI-20 - De-identification  Case studies  Connected vehicle: Correct pseudonym management (internally using NIST Control SI-20 pattern)  SmartGrid: Pre-assessment on the need to conduct a DPIA is completed. Smart Grid DPIA template  Automatically generated assurance patterns: e.g., Data Protection Risk Assessment is completed from SmartGrid DPIA template reference framework WP6 17
  • 18. Results: Knowledge base  Public  https://gitlab.eclipse.org/eclipse/opencert/opencert/- /tree/release/2.0/examples/privacy Private  Reference frameworks and mapping models of standards or documents which are not freely distributed: Derivative works with high amount of information and text from the original work  ISO/IEC 29134:2017 and its mapping model to GPDR  ISO/SAE 21434 WP6 18
  • 19. Conclusions and further steps beyond the project WP6 19 Using state-of-the-art assurance principles for privacy engineering Modelling privacy regulations as reference framework models Handling ecosystems of privacy reference frameworks Providing reusable privacy assurance patterns Tool-supported Model-based Open source and flexible KB available Community uptake (Industry and Research) More automation support
  • 20. Methods and Tools for GDPR Compliance through Privacy and Data Protection 4 Engineering For more information, visit: www.pdp4e-project.eu Thank you for your attention This project has received funding from the European Union's Horizon 2020 programme under Grant Agreement No 787034.