5 CONCLUSION
GDPR compliance can be complex, costly, and dis-
ruptive as organisations invest the time and resources
needed to update systems and processes to the secu-
rity level the regulation requires. Nonetheless, data
protection is crucial in an era where data is eas-
ily acquired and processed without the data subject’s
knowledge and consent (Teixeira, 2021). Understand-
ing what needs to be done in order to become compli-
ant can be challenging and even though the regulation
provides guidelines, ensuring all the requirements are
met can be demanding.
In this work, we developed a group of patterns fo-
cusing on ensuring that the data subject’s rights are
met in light of the GDPR through the modelling of
enterprise architecture patterns to be integrated into
an architecture. By using patterns we provide a com-
mon solution using motivations, services, processes,
and functions that organisations have to deal with and
integrate to be compliant. This paper proposes a set
of patterns that addresses the following GDPR use
cases:: Right to be Forgotten and Right to Rectify.
This first approach focuses on identifying the neces-
sary components, processes and flows within a sys-
tem to achieve compliance with requirements regard-
ing the data subject’s rights with special emphasis on
the business and application layers.
As future work, propose to assess the solution
based on the analysis of practical cases, which will
be of extreme relevance to evaluate the quality and
feasibility of the patterns.
ACKNOWLEDGEMENTS
This work was supported by national funds through
Fundac¸
˜
ao para a Ci
ˆ
encia e a Tecnologia (FCT) with
reference UIDB/50021/2020 and by the European
Commission program H2020 under the grant agree-
ment 822404 (project QualiChain).
REFERENCES
Agostinelli, S., Maggi, F., Marrella, A., and Sapio, F.
(2019). Achieving gdpr compliance of bpmn process
models. In Information Systems Engineering in Re-
sponsible Information Systems, pages 10–22.
Blanco-Lain
´
e, G., Sottet, J.-S., and Dupuy-Chessa, S.
(2019). Using an enterprise architecture model for
gdpr compliance principles. In The Practice of Enter-
prise Modeling, 12th IFIP Working Conference, pages
199–214.
Buchmann, E. and Anke, J. (2017). Privacy patterns in busi-
ness processes. In Proceedings of 47th Jahrestagung
der Gesellschaft f
¨
ur Informatik.
Burmeister, F., Drews, P., and Schirmer, I. (2019). A
privacy-driven enterprise architecture meta-model for
supporting compliance with the general data protec-
tion regulation. In Proceedings of the 52nd Hawaii In-
ternational Conference on System Sciences (HICSS),
volume 52.
Cavoukian, A. (2011). Privacy by design – the 7 founda-
tional principles. Technical report, Information and
Privacy Commissioner of Ontario, Canada.
Cavoukin, A. and Dixon, M. (2013). Privacy and security
by design: An enterprise architecture approach. Tech-
nical report, Information and Privacy Commissioner,
Canada.
Colesky, M. and et al. (2016 (accessed January 2, 2021)).
Privacy Patterns. https://privacypatterns.org/patterns/
Protection-against-tracking.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.-
H., M
´
etayer, D., Tirtea, R., and Schiffner, S. (2014).
Privacy and Data Protection by Design - from Policy
to Engineering. European Union Agency for Network
and Information Security (ENISA).
Diamantopoulou, V., Kalloniatis, C., Gritzalis, S., and
Mouratidis, H. (2017). Supporting privacy by design
using privacy process patterns. In Proceedings of IFIP
International Information Security Conference, pages
491–505.
Doty, N. (2013). Privacy design patterns and anti-patterns
patterns misapplied and unintended consequences.
Lankhorst, M. (2017 (accessed September 10, 2020)). 8
Steps Enterprise Architects Can Take to Deal with
GDPR. https://bizzdesign.com/.
Logemann, T. (2018 (accessed November 19, 2020)). Gen-
eral Data Protection Regulation - GDPR. https://
gdpr-info.eu.
Mon
´
e, L. (2018). Mastering the gdpr with enterprise archi-
tecture. Technical report, LeanIX GmbH, Germany.
Okoye, J. N. (2017). Privacy by design. Master’s the-
sis, Norwegian University of Science and Technology,
Norway.
Pandit, H. J., O’Sullivan, D., and Lewis, D. (2018). Gdpr
data interoperability model. In Proceedings of 23rd
EURAS Annual Standardisation Conference.
Perroud, T. and Inversini, R. (2013). Enterprise Archi-
tecture Patterns: Practical Solutions for Recurring
IT-Architecture Problems Patterns. Springer-Verlag
Berlin Heidelberg, Berlin, 1st edition.
Teixeira, C. (2021). Enterprise architecture patterns for gdpr
compliance, information systems and computer engi-
neering. Master’s thesis, Instituto Superior T
´
ecnico,
Lisbon University.
The Open Group (2012 (accessed February 25, 2021)).
ArchiMate® 3.1 Specification. https://pubs.
opengroup.org/architecture/archimate3-doc/toc.html.
Verheijen, R. (2017). Whitepaper: Data Pro-
tection: Compliance is a Top-Level Sport.
Netherlands. https://www.exin.com/whitepaper/
data-protection-compliance-top-level-sport.
ICEIS 2021 - 23rd International Conference on Enterprise Information Systems
750