Tool-Supporting Data Protection Impact Assessments with CAIRIS

The General Data Protection Regulation (GDPR) encourages the use of Data Protection Impact Assessments (DPIAs) to integrate privacy into organisations' activities and practices from early design onwards. To date, however, there has been little prescription about how Security & Privacy Requirements Engineering processes map to the necessary activities of a DPIA, and how these activities can be tool-supported. To address this problem, we present a tool-supported process for undertaking DPIAs using existing Requirements Engineering approaches and the CAIRIS platform. We illustrate this process using a real-world case study example where it was used to elicit privacy risks for a prototype medical application to support chemotherapy treatment.

[1]  Stefanos Gritzalis,et al.  Addressing privacy requirements in system design: the PriS method , 2008, Requirements Engineering.

[2]  Marit Hansen,et al.  A Process for Data Protection Impact Assessment Under the European General Data Protection Regulation , 2016, APF.

[3]  Alimohammad Shahri,et al.  Four reference models for transparency requirements in information systems , 2018, Requirements Engineering.

[4]  Lina Jasmontaite,et al.  Data Protection by Design and by Default , 2018 .

[5]  J. Murphy The General Data Protection Regulation (GDPR) , 2018, Irish medical journal.

[6]  Kristian Beckers,et al.  Comparing Privacy Requirements Engineering Approaches , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.

[7]  M. Angela Sasse,et al.  Bringing security home: a process for developing secure and usable systems , 2003, NSPW '03.

[8]  Shamal Faily,et al.  Designing Usable and Secure Software with IRIS and CAIRIS , 2018, Springer International Publishing.

[9]  Eric Yu,et al.  Social Modeling for Requirements Engineering , 2011, Cooperative information systems.

[10]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[11]  Paolo Giorgini,et al.  Security Requirements Engineering: Designing Secure Socio-Technical Systems , 2016 .

[12]  Axel van Lamsweerde,et al.  Requirements Engineering: From System Goals to UML Models to Software Specifications , 2009 .

[13]  Adam Shostack,et al.  Threat Modeling: Designing for Security , 2014 .