allows to express legal requirements from the GDPR
into a Business Process. The legal requirements are
modelled according to approaches used in legal in-
formatics, such as legal ontologies. The integration
of the two domains of legal informatics and business
processes allows to not only express the legal require-
ments, but also associate them with specific activities
that entail the processing of personal data. This con-
nection can be used at all stages of the Software De-
velopment Life Cycle (SDLC): from the analysis of
the requirements to the design, from development to
testing, from deployment to monitoring.
The present work is a preliminary step to integrate
legal requirements into the SDLC. Expressing the le-
gal requirements is an added value by itself, as the BP
can be used to coordinate activities in the organization
and assign specific tasks with the related legal duties.
However, this work needs to be thoroughly extended
and validated with real case studies before it can un-
leash its full potential. For one, the logic formulæ
expressing obligations, permissions and prohibitions
still require supporting tools and methodologies.
ACKNOWLEDGMENTS
This work has been partially funded by the Lux-
embourg National Research Fund (FNR) CORE
project C16/IS/11333956 “DAPRECO: DAta Protec-
tion REgulation COmpliance”.
REFERENCES
Ahmadian, A. S., Strüber, D., Riediger, V., and Jürjens,
J. (2018). Supporting privacy impact assessment by
model-based privacy analysis. In Proceedings of the
The 33
rd
ACM/SIGAPP Symposium On Applied Com-
puting (SAC). ACM.
Basin, D., Debois, S., and Hildebrandt, T. (2018). On pur-
pose and by necessity. In Proceedings of the Twenty-
Second International Conference on Financial Cryp-
tography and Data Security (FC).
Benjamins, V. R., Casanovas, P., Breuker, J., and Gangemi,
A., editors (2005). Law and the Semantic Web, volume
3369 of Lecture Notes in Computer Science. Springer,
Berlin, Heidelberg.
Bertoli, P., Dragoni, M., Ghidini, C., Martufi, E., Nori,
M., Pistore, M., and Di Francescomarino, C. (2013).
Modeling and monitoring business process execu-
tion. In Service-Oriented Computing, pages 683–687.
Springer.
Bieker, F., Martin, N., Friedewald, M., and Hansen, M.
(2018). Data protection impact assessment. In
Hansen, M., Kosta, E., Nai-Fovino, I., and Fischer-
Hübner, S., editors, Privacy and Identity Manage-
ment, volume 526 of IFIP Advances in Informa-
tion and Communication Technology, pages 207–220.
Springer.
Buchmann, E. and Anke, J. (2017). Privacy patterns
in business processes. In Eibl, M. and Gaedke,
M., editors, Proceedings of the 47. Jahrestagung der
Gesellschaft für Informatik (INFORMATIK), pages
793–798. Gesellschaft für Informatik.
Calabró, A., Lonetti, F., and Marchetti, E. (2015). Moni-
toring of business process execution based on perfor-
mance indicators. In The Euromicro Conference series
on Software Engineering and Advanced Applications
(SEAA).
Davidson, D. (1967). The logical form of action sentences.
In Rescher, N., editor, The Logic of Decision and Ac-
tion, chapter III, pages 81–120. University of Pitts-
burgh Press.
Duncan, B. (2018). Can EU general data protection regula-
tion compliance be achieved when using cloud com-
puting? In Proceedings of the Ninth International
Conference on Cloud Computing, GRIDs, and Virtual-
ization (CLOUD COMPUTING), pages 1–6. IARIA.
European Commission (2015). A digital single market strat-
egy for europe.
Ferrara, P. and Spoto, F. (2018). Static analysis for GDPR
compliance. In Ferrari, E., Baldi, M., and Baldoni, R.,
editors, Proceedings of the Second Italian Conference
on Cyber Security (ITASEC).
Fleac
˘
a, E., Fleac
˘
a, B., and Maiduc, S. (2016). Process mod-
eling as key technique for embedding the practices
of business process management in organization. In
International Conference on Exploring Services Sci-
ence, pages 89–99. Springer.
Gerth, C. (2013). Business Process Models, volume 7849
of Lecture Notes in Computer Science. Springer.
Gonçalves, A., Correia, A., and Cavique, L. (2017). Data
protection risk modeling into business process analy-
sis. In Gervasi, O., Murgante, B., Misra, S., Borruso,
G., TorreAna, C. M., Rocha, M. A., Taniar, D., Ap-
duhan, B. O., Stankova, E., and Cuzzocrea, A., edi-
tors, Computational Science and Its Applications â
˘
A¸S
ICCSA 2017, volume 10404 of Lecture Notes in Com-
puter Science, pages 667–676. Springer.
Heuck, E., Hildebrandt, T. T., Lerche, R. K., Marquard,
M., Normann, H., Strømsted, R. I., and Weber, B.
(2017). Digitalising the general data protection reg-
ulation with dynamic condition response graphs. In
Proceedings of the 15
th
International Conference on
Business Process Management (BPM), pages 124–
134.
IT Governance Privacy Team (2017). EU General Data
Protection Regulation (GDPR). IT Governance Pub-
lishing, second edition.
Jaeger, P. T., Lin, J., Grimes, J. M., and Simmons, S. N.
(2009). Where is the cloud? First Monday, 14(5).
Makinson, D. and van der Torre, L. (2000). Input/output
logics. Journal of Philosophical Logic, 29(4):383–
408.
Massacci, F., Prest, M., and Zannone, N. (2005). Us-
ing a security requirements engineering methodol-
Enhancing Business Process Modelling with Data Protection Compliance: An Ontology-based Proposal
427