an IT information system. In the EnCoRe
1
(“Ensuring Consent and Revocation”) project, we
are exploring this approach while specifically
focusing on an important aspect of privacy: the
management of users’ preferences with regard to the
handling of their personal data (their expressions of
consent and revocation).
Based on this position, our general approach is as
follows:
1. Policies regarding the handling of personal
data may be represented at different levels of
abstractions within an enterprise, and so a unified,
conceptual representation which allows us to
compare and integrate them is desirable;
2. Current policy management approaches, tools
and representations are suited only to particular
classes of policies within this hierarchy, and so we
aim to define approaches which bridge levels from
legal requirements all the way down to technically
implementable privacy and security policy;
3. When handling policies we want to take into
account privacy preferences expressed by data
subjects (end-users) and enforce them, hence
enabling a user-centric perspective to privacy.
4. We envisage the need for a formal access
control model embodying policy and preference
concepts which enables reasoning from an abstract
level (including legal, social and business aspects) to
a technical, implementable level.
The different levels of privacy policies and their
key characteristics are discussed in section 2.
Section 3 analyses the pros and cons of current
approaches to privacy management and proposes a
hybrid approach to the development and
enforcement of privacy policies, which takes into
account:
• legal, security and business requirements,
• the outcomes of risk and privacy impact
assessment,
• what is feasible technologically.
Section 4 discusses different levels of policy
representations and illustrates the neeed to move
towards a unified conceptual model, which should
formalise the elements of policies in the hierarchy.
This is presented in the context of a practical
example of policy enforcement for consent and
revocation. Section 5 summarises these ideas and
concludes.
1
See www.encore-project.info.
2 POLICY LAYERS IN
ENTERPRISES
As discussed above, organisations need to cope with
a variety of policies and constraints at different
levels of abstraction, dictated by legal, social,
business and individuals. This includes security and
privacy requirements as well as data subjects’ (end-
users’) preferences.
At the highest level of the hierarchy, there is a
set of requirements which are set out by
international agreements and directives, such as the
European Data Protection Directive or the EU Safe
Harbour agreement. Further, many countries have
national data protection legislation, such as the Data
Protection Act 1998 in the UK, or the HIPAA,
GLBA, SB 1386, COPPA and various State Breach
laws in US. With regards to regulation in particular,
there are export and transborder flow restrictions on
personal data that need to be enforced. Privacy laws
and regulations constitute the topmost layers of
policy hierarchy regarding personal data with which
an enterprise must comply. Such policies are often
expressed in natural language as is typically the case
with related data subjects’ preferences.
At this high level of abstraction, security
requirements may include adherence to the
Sarbanes-Oxley Act (SOX) for financial reporting,
or the PCI Data Security Standard (DSS). These may
be refined to a set of policies at a lower level.
Similarly, business requirements include contractual
obligations, information lifecycle policies and the
enterprise’s own internal guidelines. All of the
above influence how personal data is collected,
stored and administered.
At the lowest level there are various operational,
technical policies that are machine readable and
enforceable by policy management frameworks.
This includes XACML, EPAL, P3P (Cranor et al.,
2006), P-RBAC (Ni et al., 2007), and other technical
policy languages.
Hence there are many levels of policies an
enterprise has to cope with. Ideally all these kinds of
policies should be managed and enforced
successfully, in such a way that their requirements
and stipulations are unambiguous and mutually
consistent.
In practice this can be difficult. However we
believe that by introducing a conceptual model, we
can bridge some of the disconnection between
higher and lower levels of policies.
We believe it is important to explore how to
build a conceptual model of policies bridging the
existing gaps. This involves investigating the
tradeoffs between pragmatism and generality of
policy representation approaches (so as to choose an
SECRYPT 2010 - International Conference on Security and Cryptography
172