Skip to main content

A Structured Approach to GDPR Compliance

  • Conference paper
  • First Online:
Digital Transformation of Collaboration (COINs 2019)

Part of the book series: Springer Proceedings in Complexity ((SPCOM))

  • 632 Accesses

Abstract

The European General Data Protection Regulation (GDPR, EU 2016/679), adopted by the European Parliament has profoundly changed the legislative approach to the protection of personal data by the European Union. The GDPR provisions require organizations to make deep changes. Organizations have to shift from an approach based on the adoption of minimum-security measures, provided by the EU Directive of 1994, to a proactive approach based on accountability. Organizations that manage personal data of EU citizens have to adopt systems of verification and continuous improvement and adopt principles such as privacy by design and privacy by default. The rule of “privacy by design” calls for privacy to be taken into account throughout the whole engineering process. A key point is the methods for checking compliance with GDPR. This paper proposes a structured approach based on business process modelling, to support compliance with the GDPR. We have identified an approach that has to identify the most important key points for GDPR compliance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://www.eclipse.org/bpmn2-modeler/.

References

  1. E.-O. Wilhelm, A brief history of the General Data Protection Regulation

    Google Scholar 

  2. M. Pesic, H. Schonenberg, W.M.P. Van Der Aalst, DECLARE: full support for loosely-structured processes, in Proceedings—IEEE International Enterprise Distributed Object Computing Workshop, EDOC (2007)

    Google Scholar 

  3. T.T. Hildebrandt, R.R. Mukkamala, Declarative event-based workflow as distributed dynamic condition response graphs (2011). arXiv:1110.4161

  4. D. Harel, M. Politi, I. Books24x7, Modeling Reactive Systems with Statecharts (1998)

    Google Scholar 

  5. A.M. Fernandez-Saez, D. Caivano, M. Genero, M.R.V. Chaudron, On the use of UML documentation in software maintenance: results from a survey in industry, in 2015 ACM/IEEE 18th International Conference on Model Driven Engineering Languages and Systems, MODELS 2015—Proceedings (2015), pp. 292–301

    Google Scholar 

  6. O.M. Group, OMG unified modeling language TM (OMG UML), Superstructure v.2.5. InformatikSpektrum (2015)

    Google Scholar 

  7. P. Ardimento, D. Caivano, M. Cimitile, G. Visaggio, Empirical investigation of the efficacy and efficiency of tools for transferring software engineering knowledge. J. Inf. Knowl. Manag. 7(3), 197–207 (2008)

    Article  Google Scholar 

  8. S. España, N. Condori-Fernandez, A. González, O. Pastor, An empirical comparative evaluation of requirements engineering methods. J. Braz. Comput. Soc. 16(1), 3–19 (2010)

    Article  Google Scholar 

  9. R. Hull et al., Introducing the guard-stage-milestone approach for specifying business entity lifecycles, in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2011)

    Google Scholar 

  10. Object Management Group, Case Management Model and Notation (CMMN) (2013)

    Google Scholar 

  11. Object Management Group, Business Process Model and Notation (BPMN) Version 2.0 (2011)

    Google Scholar 

  12. M. Cremonini, E. Damiani, S.C. di Vimercati, P. Samarati, A. Corallo, G. Elia, Security, Privacy, and Trust in Mobile Systems and Applications (IGI Global, 2005)

    Google Scholar 

  13. M. Enamul Kabir, H. Wang, E. Bertino, A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl. (2011)

    Google Scholar 

  14. C. Ardito, U. Barchetti, A. Capodieci, A. Guido, L. Mainetti, Business process design meets business practices through enterprise patterns. Int. J. e-Collab. 10(1), 57–73 (2014)

    Google Scholar 

  15. U. Barchetti, A. Capodieci, A.L. Guido, L. Mainetti, Modelling collaboration processes through design patterns. Comput. Inf. 30(1), 113–135 (2011)

    Google Scholar 

  16. A. Capodieci, L. Mainetti, L. Alem, An innovative approach to digital engineering services delivery: an application in maintenance, in 2015 11th International Conference on Innovations in Information Technology (IIT) (IIT’15), Dubai, UAE (2015), pp. 336–343

    Google Scholar 

  17. W. Labda, N. Mehandjiev, P. Sampaio, Modeling of privacy-aware business processes in BPMN to protect personal data, in Proceedings of the 29th Annual ACM Symposium on Applied Computing, New York, NY, USA (2014), pp. 1399–1405

    Google Scholar 

  18. A.D. Brucker, Integrating security aspects into business process models. Inf. Technol. 55(6), 239–246 (2013)

    Google Scholar 

  19. Y. Cherdantseva, J. Hilton, O. Rana, Towards SecureBPMN—aligning BPMN with the information assurance and security domain, in Business Process Model and Notation (2012), pp. 107–115

    Google Scholar 

  20. O. Altuhhov, R. Matulevičius, N. Ahmed, An extension of business process model and notation for security risk management. Int. J. Inf. Syst. Model. Des. (IJISMD) 4(4), 93–113 (2013)

    Article  Google Scholar 

  21. P. Pullonen, R. Matulevičius, D. Bogdanov, PE-BPMN: privacy-enhanced business process model and notation, in Business Process Management (2017), pp. 40–56

    Google Scholar 

  22. M. Salnitri, F. Dalpiaz, P. Giorgini, Designing secure business processes with SecBPMN. Softw. Syst. Model. 16(3), 737–757 (2017)

    Article  Google Scholar 

  23. M.E.A. Chergui, S.M. Benslimane, A valid BPMN extension for supporting security requirements based on cyber security ontology, in Model and Data Engineering (2018), pp. 219–232

    Google Scholar 

  24. C.L. Maines, D. Llewellyn-Jones, S. Tang, B. Zhou, A cyber security ontology for BPMN-security extensions, in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (2015), pp. 1756–1763

    Google Scholar 

  25. C.L. Maines, B. Zhou, S. Tang, Q. Shi, Adding a third dimension to BPMN as a means of representing cyber security requirements, in 2016 9th International Conference on Developments in eSystems Engineering (DeSE) (2016), pp. 105–110

    Google Scholar 

  26. K.S. Sang, B. Zhou, BPMN security extensions for healthcare process, in 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (2015), pp. 2340–2345

    Google Scholar 

  27. A. Rodríguez, E. Fernández-Medina, M. Piattini, A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. (2007)

    Google Scholar 

  28. M. Menzel, I. Thomas, C. Meinel, Security requirements specification in service-oriented business process management, in 2009 International Conference on Availability, Reliability and Security (2009), pp. 41–48

    Google Scholar 

  29. M. Palmirani, M. Martoni, A. Rossi, C. Bartolini, L. Robaldo, PrOnto: privacy ontology for legal reasoning, in Electronic Government and the Information Systems Perspective (2018), pp. 139–152

    Google Scholar 

  30. D. Basin, S. Debois, T. Hildebrandt, On purpose and by necessity: compliance under the GDPR, in Financial Cryptography and Data Security (FC) (2018)

    Google Scholar 

  31. A. Capodieci, L. Mainetti, Business process awareness to support GDPR compliance, in In Proceedings of the 9th International Conference on Information Systems and Technologies (ICIST 2019). ACM, New York, NY, USA, Article 2 (2019), 6 pages. https://doi.org/10.1145/3361570.3361573

Download references

Acknowledgements

This work was partially supported by the “EASYPAL” project no. Y95B457, funded by Innolabs Apulia Region (Italy), entitled “Sostegno alla creazione di soluzioni innovative finalizzate a specifici problemi di rilevanza sociale” under the POR Puglia FESR 2014-2020 research program sub-azione 1.4.B.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Antonio Capodieci .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Capodieci, A., Mainetti, L. (2020). A Structured Approach to GDPR Compliance. In: Przegalinska, A., Grippa, F., Gloor, P. (eds) Digital Transformation of Collaboration. COINs 2019. Springer Proceedings in Complexity. Springer, Cham. https://doi.org/10.1007/978-3-030-48993-9_16

Download citation

Publish with us

Policies and ethics