Requirements Engineering

, Volume 15, Issue 1, pp 119–137

Evaluating existing security and privacy requirements for legal compliance

  • Aaron K. Massey
  • Paul N. Otto
  • Lauren J. Hayward
  • Annie I. Antón
Special Issue—Security Requirements Engineering

DOI: 10.1007/s00766-009-0089-5

Cite this article as:
Massey, A.K., Otto, P.N., Hayward, L.J. et al. Requirements Eng (2010) 15: 119. doi:10.1007/s00766-009-0089-5
  • 460 Views

Abstract

Governments enact laws and regulations to safeguard the security and privacy of their citizens. In response, requirements engineers must specify compliant system requirements to satisfy applicable legal security and privacy obligations. Specifying legally compliant requirements is challenging because legal texts are complex and ambiguous by nature. In this paper, we discuss our evaluation of the requirements for iTrust, an open-source Electronic Health Records system, for compliance with legal requirements governing security and privacy in the healthcare domain. We begin with an overview of the method we developed, using existing requirements engineering techniques, and then summarize our experiences in applying our method to the iTrust system. We illustrate some of the challenges that practitioners face when specifying requirements for a system that must comply with law and close with a discussion of needed future research focusing on security and privacy requirements.

Keywords

Security requirementsPrivacy requirementsLegal complianceRefactoring requirements

Copyright information

© Springer-Verlag London Limited 2009

Authors and Affiliations

  • Aaron K. Massey
    • 1
  • Paul N. Otto
    • 1
    • 2
  • Lauren J. Hayward
    • 1
  • Annie I. Antón
    • 1
  1. 1.Department of Computer ScienceNorth Carolina State UniversityRaleighUSA
  2. 2.School of LawDuke UniversityDurhamUSA