<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>GDPR-driven Change Detection in Consent and Activity Metadata</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Harshvardhan J. Pandit</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Declan O'Sullivan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dave Lewis</string-name>
          <email>dave.lewisg@adaptcentre.ie</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ADAPT Centre, Trinity College Dublin</institution>
          ,
          <addr-line>Dublin</addr-line>
          ,
          <country country="IE">Ireland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>This position paper explores changes concerning the relationship between consent and activities in context of the General Data Protection Regulation (GDPR). Detecting and recording such changes with their e ects can provide assistance in demonstration and management of compliance. We present an approach for using metadata-driven change detection and representation towards supporting querying for GDPR compliance. We use P-Plan (an extension to PROV) for representing provenance of activities and ODRL for representing consent. We explore the presented approach by means of a use-case.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Consent under the General Data Protection Regulation (GDPR)1 can be
considered as an evolving entity based on the right to change or withdraw consent
as well as the requirement to re-acquire consent upon certain changes in
processing. In this paper, we explore this relationship between change in consent
and the change in activities related to it. We consider consent as a set of
permissions and prohibitions over activities that use the personal data, where the
given consent provides the legal basis for their execution. We reuse the example
use of `Sue' [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], a data subject that uses a tness tracking service for logging
tness activity. This service uses the given consent to send advertisements to the
registered email, which is later withdrawn. This results in the consent
representation re ecting this change, as well as a removing the corresponding activity
from work ow.
      </p>
      <p>The scope of this position paper is limited to identifying the relationship
between changes in consent and activity metadata, along with approaches
towards their detection and representation. The use-case provides an example for
understanding the approach and the changes involved. We discuss these using
PPlan2 (an extension to PROV) to represent provenance of activities and ODRL
to represent consent. This work provides a discussion on how this change can
be detected and modeled, with potential applications in systems that assist in
GDPR compliance.</p>
      <p>Pandit et al.</p>
    </sec>
    <sec id="sec-2">
      <title>Change in consent</title>
      <p>Using ODRL, each permission and prohibition (odrl:Rule) is expressed as an
individual policy concerning the use of personal data (odrl:Asset ) through an activity
(odrl:Action). The changed consent in the case study, depicted3 in Fig 1, shows
odrl:Rule being updated from odrl:permission to odrl:prohibition. Since each
permission or prohibition within the consent is represented as a distinct odrl:Rule,
once a policy is instantiated, its odrl:Asset (personal data) and odrl:Action
(activity) will not change. Therefore, the Change object captures only the change
type (withdrawal of consent) and change in rule from permit to prohibit. The
captured change is useful in determining the e ects of change in consent. In
the case study, the change results in a prohibition over the activity of sending
advertisements using email. This cause-e ect relationship is further explored in
Section 4.</p>
    </sec>
    <sec id="sec-3">
      <title>Representing change in activities</title>
      <p>We use P-Plan, an extension of PROV since PROV represents things that
have happened in the past, whereas P-Plan models the intent of what should
happen. P-Plan acts as a template for work ows that are then used to
capture executions using PROV, and provides a way to model interactions between
activities, personal data, and consent at an abstract level. This approach for
expression of consent and data metadata related to GDPR can be achieved using</p>
      <sec id="sec-3-1">
        <title>3 Using diagram structures and colours from ODRL's documentation</title>
        <p>
          targeted vocabularies such as GDPRov [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. for provenance and GDPRtEXT [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
for compliance terms and concepts.
        </p>
        <p>
          Detecting changes within activities (work ows) represented using p-plan:Plan
is helpful to determine whether an updated consent is required from the data
subject based as stipulated by GDPR requirements. Fig 2. depicts captured
changes for the use case, where the step sendAdvertisements has been removed
following changes in consent. The Change object links the original and updated
work ows along with specifying the change type as `remove' and a change graph
containing di ering elements in the two work ows. The task of change detection
for work ows is considerably complex, and can be simpli ed by reducing the
graph to simpler forms for easier analysis [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Linking the changes to enable compliance queries</title>
      <p>Demonstrating changes in consent led to corresponding changes in activity
workows is part of compliance towards GDPR obligations. In the speci ed use-case,
the withdrawal of consent resulted in a change in the ODRL policies representing
consent, and led to a corresponding change in the activity work ows represented
using P-Plan. This cause-e ect relationship can be represented as a provenance
trace as shown4 in Fig 3, and can act as documentation towards GDPR
obliga</p>
      <sec id="sec-4-1">
        <title>4 Arrows use same notation as PROV to depict information ow</title>
        <p>tions. This can aid in the compliance process to demonstrate whether withdrawal
of consent resulted in appropriate changes in work ows.
This position paper discusses the detection and representation of changes in the
context of consent and activities for GDPR compliance. The outlined approach
deals with change within consent and activity metadata along with linking such
changes in a cause-e ect relationship. The approach discusses the use of ODRL
for representing consent, with P-Plan (an extension of PROV) used to represent
provenance of activities and work ows. A case study is used to explore and
discuss the approach with a view towards documentation and demonstration of
compliance.</p>
        <p>In terms of potential future work, the change detection approach described
in this paper can be used to automate processes associated with compliance,
especially where a large number of data subjects are involved. A change in consent
metadata is useful to identify its e ects on the processing of personal data. As
part of the compliance process, an individual's provenance trace may need to
be queried for all changes in given consent. By identifying and storing change in
consent and activity metadata along with their provenance, it is possible to
retrospectively demonstrate that such changes were accompanied by the necessary
actions necessary to maintain compliance.</p>
        <p>Ongoing compliance is a process mentioned in the GDPR where compliance is
authoritatively assessed on an ongoing or periodical basis. Such assessments can
be documented by linking them to a captured representation or a snapshot model
of the system expressed as a work ow at that period of time. Such a work ow
has the known state of being compliant based on the assessment. Future updates
to the work ow may need a re-assessment of its compliance based on the changes
introduced in the update. A change detection approach for such work ows can
be optimised to highlight only those changes that are relevant to the compliance
obligations, such as the use of personal data within activities.</p>
        <p>Linking changes between `events' such as change in consent and change in
activity work ows, it is possible to create a system that can perform a `self-check'
analysis for compliance based on whether expected activities occur upon
detection of certain changes. This can automate the process of compliance analysis
on graphs which contain a large number of data subjects where it is not possible
to manually investigate the e ects and behaviour of each individual change in
given consent and activities. The automated system can analyse the provenance
logs to ensure that the required changes have correctly occurred, and can be
used to detect and alert for situations where manual intervention is required to
ensure compliance.</p>
        <p>It is possible that the approach may not be scalable where a large amount of
metadata is generated. In such cases, the approach is still useful as a mechanism
to demonstrate that required behaviour takes place within a model of the system.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgements</title>
      <p>This paper is supported by the ADAPT Centre for Digital Content Technology,
which is funded under the SFI Research Centres Programme (Grant 13/RC/2106)
and is co-funded under the European Regional Development Fund.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirrane</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polleres</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wenning</surname>
          </string-name>
          , R.:
          <article-title>Transparent Personal Data Processing: The Road Ahead</article-title>
          . In: Computer Safety, Reliability, and Security. pp.
          <volume>337</volume>
          {
          <fpage>349</fpage>
          . Lecture Notes in Computer Science, Springer, Cham (Sep
          <year>2017</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -66284-8 28, https://link.springer. com/chapter/10.1007/978-3-
          <fpage>319</fpage>
          -66284-8_
          <fpage>28</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Garijo</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Corcho</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gil</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gutman</surname>
            ,
            <given-names>B.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dinov</surname>
            ,
            <given-names>I.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thompson</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Toga</surname>
            ,
            <given-names>A.W.</given-names>
          </string-name>
          :
          <article-title>Frag ow automated fragment detection in scienti c work ows</article-title>
          .
          <source>In: e-Science (e-Science)</source>
          ,
          <source>2014 IEEE 10th International Conference on. vol. 1</source>
          , pp.
          <volume>281</volume>
          {
          <fpage>289</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Pandit</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fatema</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>O'Sullivan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>GDPRtEXT - GDPR as a Linked Data Resource</article-title>
          .
          <source>In: 15th European Semantic Web Conference</source>
          (in-press. Heraklion, Crete, Greece (
          <year>2018</year>
          ), http://purl.org/ADAPT/pub/E18ESWC_GDPRtEXT
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Pandit</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Modelling Provenance for GDPR Compliance using Linked Open Data Vocabularies</article-title>
          .
          <source>In: Proceedings of the 5th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2017) (PrivOn)</source>
          (
          <year>2017</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-1951/#paper-
          <fpage>06</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>