consent is not the only way to have lawful data
processing. The pattern Minimal Information
Asymmetry requires new business processes. The
careful analysis of what data is strictly necessary for
the service, the writing of concise and straightforward
consent to each purpose, and considering the data
subject’s comprehension for what their data will be
used are some of the processes necessary to comply
with the GDPR. Also, application services for
compliance with the data subject rights are required
and essential.
This case study demonstrated how the proposed
library is helpful in the context of GDPR compliance.
It is easier to implement design modifications in
new projects, but these patterns may be used for
already working services. The diagrams support the
description of the use cases and solutions, making it
easier to understand what needs to be implemented
and added to ensure GDPR compliance.
The library can be applied to other cases. A way
to select patterns is by considering the use cases the
project must deliver and relate them with the use
cases of the library. Then, the patterns are analyzed to
see which can make more sense to apply to the
project.
5 CONCLUSIONS
Data protection is important and crucial in a business,
especially when personal data is stored and
processed. The creation of GDPR confirms it. In an
era where our data is easily acquired and processed
without the owners' knowledge and sometimes
without their consent, the regulation gives guidelines
and rules for the organizations that operate in the EU
to follow. The challenge is that there is much
information and constraints to follow, and the
language is not very explicit nor give objective rules
to follow. This research contributes to ensuring
Information Systems compliance to the GDPR,
presenting ways of achieving it, using a library of
patterns. When creating this library, the description
and modeling of the use cases were performed, and
the definition of the associated entities and GDPR
principles. A search through the sources was
conducted to select the patterns that better solve the
problems that the GDPR requirements bring to the
use cases, and when needed, new patterns were
created. In total, 22 patterns compose the library. This
collection of patterns is used in the case study,
demonstrating how services that require personal data
processing may use the proposed solution and what
changes when the patterns are applied. Although very
important in the design phase of a project, these
concerns are permanent throughout its lifecycle. To
point out that data processing occurs not only for
users but also for the company's employees.
In the future, we expect to add other patterns to
the library, especially to the use cases where the
patterns were hard to retrieve. Additionally, an
interface could be created to show the collection of
the use cases and patterns in a more dynamic way.
Another future path to explore is developing a library
that is focused on use cases for inner-company
problems since the employees are also data subjects.
With this, other concerns appear since the processing
of personal data may not require consent due to
contractual reasons.
ACKNOWLEDGMENTS
This work was supported by national funds through
Fundação para a Ciência e a Tecnologia (FCT) with
reference UIDB/50021/2020 and by the European
Commission program H2020 under the grant
agreement 822404 (project QualiChain).
REFERENCES
Intersoft Consulting, n.d. General Data Protection
Regulation (GDPR). https://gdpr-info.eu/. Last
accessed in 24.11.2020
Alexander, C., Ishikawa, S., Silverstein, M., 1977. A
Pattern Language: Towns, Buildings, Construction,
Oxford University Press.
Moné, L., 2018. How to Solve GDPR with Enterprise
Architecture: A Case Study, LeanIX.
https://www.leanix.net/en/blog/how-to-solve-gdpr-
with-enterprise-architecture Last accessed in
24.11.2020
Verheijen, R., 2017. EXIN: Privacy & Data Protection,
Whitepaper: Data Protection: Compliance is a Top -
Level Sport, EXIN and Secura.
Cavoukian, A., 2010. Privacy by Design The 7
Foundational Principles, Implementation and Mapping
of Fair Information Practices. Ontario, Canada.
Colesky, M., Hoepman, J., Hillen, C., 2016 A Critical
Analysis of Privacy Design Strategies. In 2016 IEEE
Security and Privacy Workshops (SPW), San Jose, CA.
Doty, N., Gupta, M., 2013. Privacy Design Patterns and
Anti-Patterns. UC Berkeley, School of Information.
California.
Lenhard, J., Fritsch, L., Herol, S., 2017. A Literature Study
on Privacy Patterns Research. In 2017 43rd Euromicro
Conference on Software Engineering and Advanced
Applications (SEAA). Vienna.