Process Modeling as a Basis for Auditing Information Privacy

Information privacy has become an important task for every data processing organization. To meet its demands, organizations apply privacy-enhancing technologies and identity management to their business processes. But the increasing number of privacy breaches shows that this task is complex and not well understood. In this position paper, a formal method for modeling an proving information privacy within a process model is envisioned. Such a model would allow an integration at process design, increase the understanding and effectiveness of the privacy protection mechanisms, and enable compliance checks and data protection auditing. Acknowledgment: This research work was funded by the Federal Ministry of Education and Research of the Federal Republic of Germany (Funding-Id: 01|S08016B). 1 Information Privacy in Business Processes With the shift from a paper-based to a digital information society, collection and processing of data have become much easier and very fast. Without the proper carefulness, information easily can be used for purposes they are neither intended for nor permitted to. This problem is documented by the increasing number of incidents regarding data leakages, missuses of personal data and even identity thefts. Like in the latest incident, where a secret file of the US-Army was found by a civilian on an second-hand mp3-player, often the reason is the missing awareness in using non-confidential communication channels. This results in loss of control on information flow and enables data misuse and theft. A predictable and comprehensible information flow could avoid such incidents or even aids investigation. We call this information privacy. Reasonable information privacy requires at least reconcilement of privacy and accountability of a data subject’s electronic interaction (empowering the data subject in its self-determination) [CSS05] and a privacy-aware identity and information lifecycle management within the data processing organizations (including compliance, data protection, and access control) [MB07]. Both depend on the underlying business processes and the involved information privacy techniques. 1In January 2009, the New Zealand news channel One News gets possession of a 60 page long file containing name and contact information of US-Soldiers, details on equipment, and other secret information. The file was stored on an mp3-player bought at a second-hand shop by a civilian.