the latter is to establish how the interactions between
the subjects that perform the DPIA and the Cloud
Service Providers affect data subjects’ rights to data
protection. The questions have some pre-defined an-
swers; they are weighted according to the impact they
have on privacy; the weights are used to calculate an
impact score. Each question is also associated to mul-
tiple privacy indicators to capture different privacy as-
pects (such as sensitivity, compliance and data con-
trol) that can enhance or be detrimental to privacy;
a global privacy indicator is then calculated based on
the indicators. While we share some similarities in the
risk analysis phase, our tool is agnostic with respect
to the technology used to implement the data process-
ing activities. Consequently, the Risk Analysis step
of our methodology is parametric with respect to the
particular technique used for risk evaluation.
4 CONCLUSIONS AND FUTURE
WORK
We have presented the first two steps of our tool-
assisted methodology that combines automated policy
analysis techniques with a flexible risk-based evalua-
tion to implement a substantial part of a DPIA. Some
ideas have been developed and implemented when
contributing to the definition of a DPIA methodology
for the public administration of province of Trento in
Italy that comprises more than 2,000 processing ac-
tivities (of which 650 handles special category of per-
sonal data) that are distributed across (almost) 100
organizational units. To permit effective use of the
methodology and the tool, the training sessions were
crucial.
In future work, we plan to investigate how to com-
bine data analytic techniques with selected monitor-
ing tools—such as those for Inventory Management
(IM) and Security Information and Event Manage-
ment (SIEM)—to map assets (first step) and like-
lihood indicators (second step) and implement the
run-time analysis (third) step—cf. Figure 1—of our
methodology to make the methodology continuous.
REFERENCES
Alnemr, R., Cayirci, E., Dalla Corte, L., Garaga, A.,
Leenes, R., Mhungu, R., Pearson, S., Reed, C.,
de Oliveira, A. S., Stefanatou, D., et al. (2015). A data
protection impact assessment methodology for cloud.
In Annual Privacy Forum, pages 60–92. Springer.
Bennett, C. J. and Raab, C. D. (2017). The governance
of privacy: Policy instruments in global perspective.
Routledge.
Blix, F., Elshekeil, S. A., and Laoyookhong, S. (2017). Data
protection by design in systems development: From
legal requirements to technical solutions. In 12th In-
ternational Conference for Internet Technology and
Secured Transactions (ICITST), pages 98–103. IEEE.
CNil (2015). How to carry out a pia. https://www.cnil.fr/
sites/default/files/typo/document/CNIL-PIA-1-Metho
dology.pdf.
CNil (2018). Privacy risk assessment (pia).
https://www.cnil.fr/sites/default/files/atoms/files/cnil-
pia-1-en-methodology.pdf.
Coles, J., Faily, S., and Ki-Aries, D. (2018). Tool-
supporting data protection impact assessments with
cairis. In IEEE 5th International Workshop on Evolv-
ing Security & Privacy Requirements Engineering
(ESPRE), pages 21–27. IEEE.
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., and
Samarati, P. (2007). Access control policies and lan-
guages. JCSE, 3(2):94–102.
De Masellis, R., Ghidini, C., and Ranise, S. (2015). A
declarative framework for specifying and enforcing
purpose-aware policies. In STM, volume 9331 of
Lecture Notes in Computer Science, pages 55–71.
Springer.
Guarda, P., Ranise, S., and Siswantoro, H. (2017). Security
analysis and legal compliance checking for the design
of privacy-friendly information systems. In SACMAT,
pages 247–254. ACM.
Hu, V. C., Ferraiolo, D., Kuhn, R., Friedman, A. R.,
Lang, A. J., Cogdell, M. M., Schnitzer, A., Sandlin,
K., Miller, R., Scarfone, K., et al. (2013). Guide
to attribute based access control (abac) definition
and considerations (draft). NIST special publication,
800(162).
ICO (2018). Data protection impact assessments (dpias).
https://ico.org.uk/for-organisations/guide-to-data-
protection/guide-to-the-general-data-protection-
regulation-gdpr/data-protection-impact-assessments-
dpias/.
Jin, X., Krishnan, R., and Sandhu, R. (2012). A Uni-
fied Attribute-Based Access Control Model Covering
DAC, MAC and RBAC. In DBSec, number 7371 in
LNCS, pages 41–55.
Oetzel, M. C. and Spiekermann, S. (2014). A systematic
methodology for privacy impact assessments: a de-
sign science approach. European Journal of Informa-
tion Systems, 23(2):126–150.
Ranise, S. and Siswantoro, H. (2017). Automated legal
compliance checking by security policy analysis. In
SAFECOMP Workshops, volume 10489 of Lecture
Notes in Computer Science, pages 361–372. Springer.
Turkmen, F., den Hartog, J., Ranise, S., and Zannone, N.
(2017). Formal analysis of XACML policies using
SMT. Computers & Security, 66:185–203.
van Puijenbroek, J. and Hoepman, J.-H. (2017). Privacy im-
pact assessments in practice: Outcome of a descriptive
field research in the netherlands. International Work-
shop on Privacy Engineering.
Vemou, K. and Karyda, M. (2018). An evaluation frame-
work for privacy impact assessment methods. MCIS
Proceedings. 5.
A Tool-assisted Methodology for the Data Protection Impact Assessment
283