SlideShare a Scribd company logo
1 of 9
IBM Research - Haifa




Conceptual Framework and Architecture for Privacy Audit



  Ksenya Kveler, Kirsten Bock, Pietro Colombo, Tamar Domany,
                  Elena Ferrari, Alan Hartman



                         IBM Haifa Research Laboratory – KK, TD, AH
                 Unabhaengiges Landeszentrum fuer Datenschutz - KB
                               University of Insubria – PC, EF

                                                                      © 2012 IBM Corporation
IBM Research - Haifa




Agenda

   Motivation
   Tool Enhanced Audit Process
   Data Protection Goals
   Data Privacy Compliance Metrics
   Architecture For Privacy Audit




                                      © 2012 IBM Corporation
IBM Research - Haifa




Motivation

    Many organizations collect a lot of private data

    Most of them want to comply with the law BUT
     
         The privacy protection laws are complex and heterogeneous
     
         Privacy compliance audits are expensive




                                                                     © 2011 IBM Corporation
IBM Research - Haifa



Tool Enhanced Audit Process
   Stage 1: Determine targets of evaluation
      Based on data protection goals – rather than laws
      Analysis of data collection and storage processes
      Analysis of the types of data collected

   Stage 2: Design metrics
      Create a UML representation of the privacy requirements
      Map the processes and IT artifacts onto the model
      Derive metrics related to the DPG

   Stage 3: Build assessment tools
      Separate metric assessor plugins for each metric


                                                             © 2011 IBM Corporation
IBM Research - Haifa




Data Protection Goals
                       Protection Measures                                                                    Assessment and
                                                                                                              Finding of Protection
                                                                                                              Needs
                            1. Legal Balancing of Protection Goals
                            2. Protection Measures Catalogues
                            3. Scalability (normal, high, very high)
      Data
      Protection Goals
     Intervenability                                                                       Legal
                                 Additional External Actors                                Relationships
                                 • Research (engineering, economics, social scienes)
       Unlinkability             • Security Services
                                 • Regulators, BNA, Bureau of Standards                         Process owners =
                                 • Access-, Content-, IT-Provider                               Responsibilities

     Transparency                                                                        Roles and Responsibilities
                                                                          Sub-Processsing
                                                                                        Operative Support of DP by:
                                                          Data (Data Center, Cloud
     Confidentiality                                      IT-Provider, …)               External Standards (e.g. ISO2910X), BSI/DSec-Audits
                                          Operator
                                        Provider                        Operative Support of DP by:                          Data (& formats)
                                                                        Data Protection Management System
           Integrity            Metering Point                                                                               Processes (& adresses)
                                   Operator                                                                                  Systems (& legal and
        Availability        User              Operative Support of DP by:                                                    technical interfaces)
                                              User Controlled Identity Management

                             Key-      Appl. Specific Admin.                Aggregated     Gateway        …                 Processes              © Rost
                             Data      Data           Data                  Data           Data


                                                                                                                                      © 2012 IBM Corporation
IBM Research - Haifa




Data Privacy Compliance Metrics

    Privacy conceptual model defines a language for expressing privacy
    requirements


    Constraints on the model are weighted by the assessor, and associated
    with Data Protection Goals


    The system under assessment is mapped onto the privacy requirements
    model


    Metrics are derived from the weighted sum of constraints satisfied by the
    system under assessment




6                                                                © 2012 IBM Corporation
IBM Research - Haifa




Architecture for Data Privacy Audit




7                                     © 2012 IBM Corporation
IBM Research - Haifa




Sample Audit Report




                            © 2012 IBM Corporation
IBM Research - Haifa




Main contributions
   Linkage between data protection goals and privacy compliance metrics

   Conceptual model for privacy requirements including a set of UML
    classes and constraints

   Extensible and transparent architecture for privacy compliance
    assessment tools




                                                                © 2012 IBM Corporation

More Related Content

What's hot

Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 
Security and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareSecurity and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareMarie-Michelle Strah, PhD
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceMarie-Michelle Strah, PhD
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)pabatan
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Informationpabatan
 
Li charles emerging biometrics identity services in the cloud 02122015b - ...
Li charles    emerging biometrics identity services in the cloud 02122015b - ...Li charles    emerging biometrics identity services in the cloud 02122015b - ...
Li charles emerging biometrics identity services in the cloud 02122015b - ...Charles Li
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsJeremy Hilton
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Identity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudIdentity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudCharles Li
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...IRJET Journal
 
An Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementAn Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementSafeNet
 
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
ISACA Los Angeles  2010   Compliance - Ulf MattssonISACA Los Angeles  2010   Compliance - Ulf Mattsson
ISACA Los Angeles 2010 Compliance - Ulf MattssonUlf Mattsson
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
 
Information awareness program
Information awareness programInformation awareness program
Information awareness programkhattar31
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteVCW Security Ltd
 

What's hot (20)

Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Security and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: HealthcareSecurity and Privacy in SharePoint 2010: Healthcare
Security and Privacy in SharePoint 2010: Healthcare
 
Gw3312111217
Gw3312111217Gw3312111217
Gw3312111217
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)Enterprise Digital Rights Management (Persistent Security)
Enterprise Digital Rights Management (Persistent Security)
 
Fasoo Company And Product Information
Fasoo Company And Product InformationFasoo Company And Product Information
Fasoo Company And Product Information
 
Bf25342345
Bf25342345Bf25342345
Bf25342345
 
Li charles emerging biometrics identity services in the cloud 02122015b - ...
Li charles    emerging biometrics identity services in the cloud 02122015b - ...Li charles    emerging biometrics identity services in the cloud 02122015b - ...
Li charles emerging biometrics identity services in the cloud 02122015b - ...
 
Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17Carl Binder Resume Myrtle Beach address 1-24-17
Carl Binder Resume Myrtle Beach address 1-24-17
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic Relationships
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Identity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the CloudIdentity Assertion, Emerging Trends,Identity Service in the Cloud
Identity Assertion, Emerging Trends,Identity Service in the Cloud
 
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...Attribute Based Secure Information Recovery Retrieval System for Decentralize...
Attribute Based Secure Information Recovery Retrieval System for Decentralize...
 
iCode Security Architecture Framework
iCode Security Architecture FrameworkiCode Security Architecture Framework
iCode Security Architecture Framework
 
An Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key ManagementAn Enterprise Guide to Understanding Key Management
An Enterprise Guide to Understanding Key Management
 
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
ISACA Los Angeles  2010   Compliance - Ulf MattssonISACA Los Angeles  2010   Compliance - Ulf Mattsson
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Information awareness program
Information awareness programInformation awareness program
Information awareness program
 
GTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security SuiteGTB DLP - Content Aware Security Suite
GTB DLP - Content Aware Security Suite
 

Viewers also liked

Biotech septic tank ramah lingkungan + gratis ongkos kirim (0888 142 8895)
Biotech septic tank ramah lingkungan + gratis ongkos kirim (0888 142 8895)Biotech septic tank ramah lingkungan + gratis ongkos kirim (0888 142 8895)
Biotech septic tank ramah lingkungan + gratis ongkos kirim (0888 142 8895)PT BioSeven Fiberglass Indonesia
 
Aurubis Leadership Devlopment Program Case Study
Aurubis Leadership Devlopment Program Case StudyAurubis Leadership Devlopment Program Case Study
Aurubis Leadership Devlopment Program Case StudyBorislav Ignatov
 
Question 4: How did you use New Media Technologues in the Construction, Plann...
Question 4: How did you use New Media Technologues in the Construction, Plann...Question 4: How did you use New Media Technologues in the Construction, Plann...
Question 4: How did you use New Media Technologues in the Construction, Plann...MBangura1995
 
amigos varios
amigos variosamigos varios
amigos variososofiap
 
Louis vuitton handbags for sexy man to show
Louis vuitton handbags for sexy man to showLouis vuitton handbags for sexy man to show
Louis vuitton handbags for sexy man to showseohugh
 
Entrevista en Diario de Navarra
Entrevista en Diario de NavarraEntrevista en Diario de Navarra
Entrevista en Diario de NavarraJose Luis Orihuela
 

Viewers also liked (7)

Biotech septic tank ramah lingkungan + gratis ongkos kirim (0888 142 8895)
Biotech septic tank ramah lingkungan + gratis ongkos kirim (0888 142 8895)Biotech septic tank ramah lingkungan + gratis ongkos kirim (0888 142 8895)
Biotech septic tank ramah lingkungan + gratis ongkos kirim (0888 142 8895)
 
Aurubis Leadership Devlopment Program Case Study
Aurubis Leadership Devlopment Program Case StudyAurubis Leadership Devlopment Program Case Study
Aurubis Leadership Devlopment Program Case Study
 
Question 4: How did you use New Media Technologues in the Construction, Plann...
Question 4: How did you use New Media Technologues in the Construction, Plann...Question 4: How did you use New Media Technologues in the Construction, Plann...
Question 4: How did you use New Media Technologues in the Construction, Plann...
 
amigos varios
amigos variosamigos varios
amigos varios
 
Hrm assgn.
Hrm assgn.Hrm assgn.
Hrm assgn.
 
Louis vuitton handbags for sexy man to show
Louis vuitton handbags for sexy man to showLouis vuitton handbags for sexy man to show
Louis vuitton handbags for sexy man to show
 
Entrevista en Diario de Navarra
Entrevista en Diario de NavarraEntrevista en Diario de Navarra
Entrevista en Diario de Navarra
 

Similar to Privacy audittalkfinal

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Metadata Use Cases
Metadata Use CasesMetadata Use Cases
Metadata Use Casesdmurph4
 
Metadata Use Cases You Can Use
Metadata Use Cases You Can UseMetadata Use Cases You Can Use
Metadata Use Cases You Can Usedmurph4
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
PCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropPCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropIBM Danmark
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCDATAVERSITY
 
Management information system question and answers
Management information system question and answersManagement information system question and answers
Management information system question and answerspradeep acharya
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWebJosep Arroyo
 
IBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Sverige
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011IBM Sverige
 
01 im overview high level
01 im overview high level01 im overview high level
01 im overview high levelJames Findlay
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Data Privacy By Design with AWS
Data Privacy By Design with AWSData Privacy By Design with AWS
Data Privacy By Design with AWSKrzysztof Kąkol
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 

Similar to Privacy audittalkfinal (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Metadata Use Cases
Metadata Use CasesMetadata Use Cases
Metadata Use Cases
 
Metadata Use Cases You Can Use
Metadata Use Cases You Can UseMetadata Use Cases You Can Use
Metadata Use Cases You Can Use
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Cloud Auditing
Cloud AuditingCloud Auditing
Cloud Auditing
 
PCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat WardropPCTY 2012, Risk Based Access Control v. Pat Wardrop
PCTY 2012, Risk Based Access Control v. Pat Wardrop
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
Management information system question and answers
Management information system question and answersManagement information system question and answers
Management information system question and answers
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWeb
 
IBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureDataIBM Smarter Business 2012 - PureSystems - PureData
IBM Smarter Business 2012 - PureSystems - PureData
 
Legal issues in the cloud renzo marchini & gene landy
Legal issues in the cloud   renzo marchini & gene landyLegal issues in the cloud   renzo marchini & gene landy
Legal issues in the cloud renzo marchini & gene landy
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
 
01 im overview high level
01 im overview high level01 im overview high level
01 im overview high level
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Data Privacy By Design with AWS
Data Privacy By Design with AWSData Privacy By Design with AWS
Data Privacy By Design with AWS
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 

Privacy audittalkfinal

  • 1. IBM Research - Haifa Conceptual Framework and Architecture for Privacy Audit Ksenya Kveler, Kirsten Bock, Pietro Colombo, Tamar Domany, Elena Ferrari, Alan Hartman IBM Haifa Research Laboratory – KK, TD, AH Unabhaengiges Landeszentrum fuer Datenschutz - KB University of Insubria – PC, EF © 2012 IBM Corporation
  • 2. IBM Research - Haifa Agenda  Motivation  Tool Enhanced Audit Process  Data Protection Goals  Data Privacy Compliance Metrics  Architecture For Privacy Audit © 2012 IBM Corporation
  • 3. IBM Research - Haifa Motivation  Many organizations collect a lot of private data  Most of them want to comply with the law BUT  The privacy protection laws are complex and heterogeneous  Privacy compliance audits are expensive © 2011 IBM Corporation
  • 4. IBM Research - Haifa Tool Enhanced Audit Process  Stage 1: Determine targets of evaluation  Based on data protection goals – rather than laws  Analysis of data collection and storage processes  Analysis of the types of data collected  Stage 2: Design metrics  Create a UML representation of the privacy requirements  Map the processes and IT artifacts onto the model  Derive metrics related to the DPG  Stage 3: Build assessment tools  Separate metric assessor plugins for each metric © 2011 IBM Corporation
  • 5. IBM Research - Haifa Data Protection Goals Protection Measures Assessment and Finding of Protection Needs 1. Legal Balancing of Protection Goals 2. Protection Measures Catalogues 3. Scalability (normal, high, very high) Data Protection Goals Intervenability Legal Additional External Actors Relationships • Research (engineering, economics, social scienes) Unlinkability • Security Services • Regulators, BNA, Bureau of Standards Process owners = • Access-, Content-, IT-Provider Responsibilities Transparency Roles and Responsibilities Sub-Processsing Operative Support of DP by: Data (Data Center, Cloud Confidentiality IT-Provider, …) External Standards (e.g. ISO2910X), BSI/DSec-Audits Operator Provider Operative Support of DP by: Data (& formats) Data Protection Management System Integrity Metering Point Processes (& adresses) Operator Systems (& legal and Availability User Operative Support of DP by: technical interfaces) User Controlled Identity Management Key- Appl. Specific Admin. Aggregated Gateway … Processes © Rost Data Data Data Data Data © 2012 IBM Corporation
  • 6. IBM Research - Haifa Data Privacy Compliance Metrics  Privacy conceptual model defines a language for expressing privacy requirements  Constraints on the model are weighted by the assessor, and associated with Data Protection Goals  The system under assessment is mapped onto the privacy requirements model  Metrics are derived from the weighted sum of constraints satisfied by the system under assessment 6 © 2012 IBM Corporation
  • 7. IBM Research - Haifa Architecture for Data Privacy Audit 7 © 2012 IBM Corporation
  • 8. IBM Research - Haifa Sample Audit Report © 2012 IBM Corporation
  • 9. IBM Research - Haifa Main contributions  Linkage between data protection goals and privacy compliance metrics  Conceptual model for privacy requirements including a set of UML classes and constraints  Extensible and transparent architecture for privacy compliance assessment tools © 2012 IBM Corporation

Editor's Notes

  1. The DPG cube allows for a standardized approach to data protection assessment. An Assessment requires precise knowledge of its target. The cube model allows to identify and determine all aspects and “players” relevant for a data protection assessment: the processes, roles and responsibilities and protection measures necessary to address the requirements of data protection represented by the six fundamental data protection goals. Using the protection goals allows a two-way check: To identify whether all and sufficient technical and organizational measures are taken that are required by data protection law and to determine whether all relevant processes have been identified. In doing so roles can be determined and responsibilities can be assigned which is essential for accountability. Yet, accountability (who is responsible for what?) is what is still missing in the majority of processing operations. In an assessment it is important to assess that there is a responsible entity for each and every operation.
  2. Privacy conceptual model is the meta-model of a modeling language for the privacy domain Privacy requirements are specified as logic predicates that 1) bind elements of this modeling language among them and 2) constrain their properties Logic components of existing applications are mapped to privacy domain conceptual elements The mapping results in a model which is an instance of the aforementioned meta-model Privacy metrics define compliance criteria of the mapped system to the reference requirements A privacy metric expresses a quantifiable similarity criterion of the expected system state with its actual state