<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Towards Knowledge-Based Systems for GDPR Compliance</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Harshvardhan J. Pandit</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Declan O'Sullivan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dave Lewis</string-name>
          <email>dave.lewisg@adaptcentre.ie</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>ADAPT Centre, Trinity College Dublin</institution>
          ,
          <addr-line>Dublin</addr-line>
          ,
          <country country="IE">Ireland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Legal compliance is traditionally seen to be su ciently demonstrable using legal documents that describe how various operations and activities follow a given set of obligations. The General Data Protection Regulation (GDPR) enforces larger responsibilities upon organisations and provides motivation for the use of technological measures that can ease its compliance. While there is no legal requirement to collaborate on compliance technologies or to use a common mechanism for de ning knowledge, doing so has several bene ts to the larger community. Through this paper, we describe how open and shared technologies targeted towards GDPR and its compliance can be used to create knowledge-based systems. Our approach uses semantic web technologies due to their open and exible nature towards describing concepts and relationships. We present a model for such a knowledge-based system along with work published to date.</p>
      </abstract>
      <kwd-group>
        <kwd>GDPR</kwd>
        <kwd>knowledge-based system</kwd>
        <kwd>legal compliance graph</kwd>
        <kwd>legal compliance</kwd>
        <kwd>provenance</kwd>
        <kwd>consent</kwd>
        <kwd>linked data</kwd>
        <kwd>semantic web</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The General Data Protection Regulation (GDPR) is an European data
protection legislation that introduces changes to the way consent and personal data
need to be managed by organisations. A large part of the motivation towards
efcient adoption of the regulation is the signi cant amount of nes that could be
levied for non-compliance. In this regard, solutions towards its compliance have
seen a large amount of interest in the industrial as well as academic community.</p>
      <p>Semantic Web provides a common base of technologies and data
representation formats that are both open and expressive. Their adoption can aid in the
building of common solutions and foster interoperability by virtue of commonly
understood knowledge forms. By using the semantic web to combine compliance
related data, it is possible to develop knowledge-based systems that can cater to
a large area of compliance tasks based on commonality in requirements. In this
paper, we present work done to date towards such a knowledge-based system.</p>
      <p>Copyright c 2018 for this paper by its authors.</p>
      <p>Licensed under CC-by-4.0 (https://creativecommons.org/licenses/by/4.0/)</p>
    </sec>
    <sec id="sec-2">
      <title>Work done to date</title>
      <p>
        We have worked [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] on exploring the information ows between di erent
organisations in the context of the GDPR with the goal of identifying a data model
for GDPR-related interoperability. We identi ed entities and the nature of
relationships between them using an analysis of the text of the GDPR to categorise
relevant articles based on points of interactions between the information ows.
Through this, we identi ed ve information categories, which are provenance,
data sharing agreements, consent, certi cation, and compliance along with the
dependencies between them. We also presented an evaluation of the available
standards based on maturity and recommendation for representation of
identied information categories.
      </p>
      <p>
        To date, we have developed and published representations for provenance
called GDPR Provenvanve Ontology (GDPRov) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] for describing the
provenance of consent and data lifecycles using GDPR terminology. We also have
investigated possible approaches towards representations for consent [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and data
sharing agreements called Data Protection Rights Language (DPRL) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
GDPRtEXT [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] provides a way to refer and link information related to speci c articles,
terms, and concepts within the GDPR in a machine-readable manner.
      </p>
      <p>This is a crucial aspect towards our aim in building a knowledge-based
system. Information representations for certi cation and compliance are part of our
planned future work.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Knowledge-based System for Compliance</title>
      <p>
        We primarily express knowledge in the form of RDF triples expressed using
suitable OWL ontologies. It is stored within a triple-store, with querying provided
by SPARQL1. The knowledge-based system and its infrastructure is depicted in
Fig. 1, and is based on the consent and data management model previously
published [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Depending on the requirements of usage, access control mechanisms
[
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] can be used to ensure authorised accesses for security purposes.
      </p>
      <p>In the context of GDPR compliance, the knowledge base stores facts,
assertions, records, and logs pertaining to tasks associated with the maintenance
and demonstration of GDPR obligations. The ve categories of information,
mentioned previously, are used to categorise the information stored within the
knowledge base. The information represented by the categories comes from the
following data sources:
Data Subject: The data subject provides consent and personal data, for which
the knowledge base would store information related to how the consent and data
were acquired, and record subsequent changes to consent. Along with this, the
exercising of rights would also be recorded as actions involving the data subject.
Data Controller: The bulk of information in the knowledge base relates to
and comes from Data Controllers and Data Processors. This includes
information about the various activities associated with consent and personal data such</p>
      <sec id="sec-3-1">
        <title>1 https://www.w3.org/TR/sparql11-query/</title>
        <p>as collection, storage, sharing, archival, and deletion. This information includes
provenance metadata about the activities and how they interact with data,
including the provision of various rights and handling data breaches.
Data Processor: A Data Processor acts on the documented instructions of a
Data Controller. The knowledge base therefore would contain these instructions
in a form that can be queried or combined with other information.
Certi cation Authority: A Certi cation Authority awards certi cations and
seals to organisations based on certain criteria. The criteria and its
evaluation mechanisms would be part of the knowledge base for introspection and
for demonstration of compliance.</p>
        <p>Supervisory Authority: Supervisory Authorities may de ne additional
obligations apart from GDPR towards its compliance. In addition, any communication
from or to the Supervisory Authority, such as in the case of data breach, also
needs to be stored and maintained for compliance purposes.</p>
        <p>Query Interface We envision a web-based interactive interface that allows
users to query and explore its results. The interactive aspect of the interface is
important as it allows the user to explore more information about the chosen
query result. For example, a query for steps that collect consent returns results as
a list of items. The user can then click on an item to get more information about
that particular step, such as whether it is part of a larger process, or what version
of terms and conditions it uses. Having interactive systems allows information
to be combined in more dynamic ways, which leads to better interfaces for the
underlying knowledge base. The interface would act to allow users to specify
SPARQL queries without knowing the technical complexities of the underlying
system.</p>
        <p>Inference Engine The quanti cation of GDPR obligations into inference rules
is a complex task. One possibility we intend to explore is the use of SHACL2,
which is a constraint expression language for RDF, to de ne sets of constraints
related to GDPR obligations. This allows the system to check whether the
required set of information is present in order for higher-order rules to be executed.
For example, using SHACL, it is possible to check whether steps for sharing
personal data always have reference to a valid consent or a legal basis as justi cation.
The task of determining whether the sharing itself is compliant with the given
consent can then be evaluated using other forms of rule-based inference such
as using SWRL3 with the assumption that all required knowledge exists. This
allows inferencing compliance based on constraints while ensuring the data itself
is present in the required and correct format.</p>
        <p>Linking knowledge using GDPRtEXT The information in the knowledge
base coming from di erent sources would have di ering identi ers and may not
be related to the required GDPR concepts. Additionally, de ning
compliancerelated information requires a way to uniformly refer to GDPR obligations so
that it can be analysed, queried, and retrieved e ectively. GDPRtEXT provides
a `glue' layer for the linking of related information using GDPR concepts. For
example, information related to handling the right to data portability can use the
appropriate GDPR terms and concepts to state their relation to this obligation.
Queries and results can then retrieve this information to display the intended
actions to be taken in the model, the log of what actually happened upon
requests, as well as the inference engine's compliance information using the same
concepts and terms as mentioned in the text of the GDPR. In future, we plan to
extend the list of terms and concepts, as well as to create additional resources for
de ning compliance-related terms and concepts speci c to the GDPR. The use
of GDPRtEXT along with other components of the knowledge-base is provided
as an overview in Fig. 2.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Applications</title>
      <p>The nature of a knowledge-based system changes based on who the intended
user(s) are. If the system is targeted towards data subjects, its aim will be to
provide information about their personal data and consent, and how it is being
collected and used. If the system is developed for controllers and processors, its
use will be to assist in the management of compliance information. This involves
checking whether the controller or processor ful ls certain obligations such as
having systems in place for handling of data breaches and various rights, as</p>
      <sec id="sec-4-1">
        <title>2 https://www.w3.org/TR/shacl/ 3 https://www.w3.org/Submission/SWRL/</title>
        <p>well as providing exploration of the consent and data lifecycles within activities.
For instances where privacy or access is a concern, only the metadata can be
stored in the system. We describe speci c use-cases of such applications below
for controllers and processors.</p>
        <p>Automated Compliance Checks: Due to the signi cant amount of potential
nes under the GDPR, the maintenance of compliance is an essential activity
for organisations. A system that can assist in this process must be scalable
to handle a large number of data subjects, which can only be done e ciently
through automation of most of its tasks. The knowledge-based system described
in this paper provides for such automation through its machine-readable data
and query system. Additionally, it is possible to record the entire process and
show that due diligence was taken when important changes were made to the
system as part of the DPIA process mentioned within the GDPR.
Compliance Documentation: Generation of compliance documentation will
be an important activity under the GDPR. Additional information may need to
be queried or accessed as part of this process that can su ciently demonstrate
adherence to obligations. For example, showing that personal data is not shared
without prior consent can be done by using the abstract model of the system
where the activities that share data are shown to depend on the permissions
speci ed within the representation of given consent. Using the knowledge-based
system, it is possible to express dynamic queries over the obligations, whose
results can be used as a form of compliance documentation. Therefore, the system
can help an organisation show adherence to relevant obligations of the GDPR
in a comprehensive manner. A periodic review of such documentation by the
organisation itself can help in the requirement for periodic assessment of
compliance.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Related Work</title>
      <p>
        Ontologies An initial work [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] addressed a draft version of the GDPR and
presented an OWL2 ontology for data controller duties from GDPR obligations
which can be used to structure compliance related information.
      </p>
      <p>
        Impact Assessment &amp; Visualisation There are existing works that address
Data Protection Impact Assessment [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and Privacy Impact Assessment [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
Both aim to provide a methodology and a template for assessments in the
context of GDPR. There has been work on creating interactive dashboards [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] for
data subjects that can show the information ows of their consent and personal
data as well as provide features for the handling of various rights. Visualisation
has also been applied for representing contracts [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and legal rules [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. These are
useful as requirements for querying of information within the knowledge base.
Smart Contracts There has been work on developing smart contracts [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] for
data sharing agreements between organisations. Such smart contracts can be
self-ful lling and can be automated. The use of Arti cial Intelligence techniques
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] has also been explored towards supporting the compliance process.
SPECIAL project The Scalable Policy-aware Linked Data Architecture For
Privacy, Transparency and Compliance (SPECIAL) project4 is an European
H2020 project that aims to provide a technical solution involving big-data
innovation and privacy-aware data protection. Apart from the publicly available
deliverables5 that describe their ndings and reports to date, they have also
published their work on building a compliance model for GDPR [
        <xref ref-type="bibr" rid="ref1 ref10">1,10</xref>
        ]. Our work
will be in uenced by their approach of modelling consent and compliance as a
set of veri able components, with a focus on query answering.
      </p>
      <p>
        Knowledge Graphs Building legal knowledge graphs has also seen work in the
areas of multilingual services [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Such knowledge graphs are expected to
assist in the provision of compliance by/through design [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] for them to integrate
e ciently into existing legal work ows. An overview of semantic web
technologies in the areas of privacy, security, and policies published in the semantic web
domain [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] discusses the various problems along with potential solutions and
approaches. These are in uential for the work discussed in this paper in terms
of practical approaches and concerns.
6
      </p>
    </sec>
    <sec id="sec-6">
      <title>Conclusion</title>
      <p>GDPR presents motivation and opportunities to apply technological solutions
for the compliance of legal obligations. Through this paper, we presented our
approach towards building a shared knowledge-based system to assist in
compliance related tasks using semantic web technologies. The knowledge-base is based
on a GDPR model previously published, and is designed based on the identi ed
information from our work on GDPR interoperability model. The
representation of the knowledge is discussed through our work published to date regarding
4 https://www.specialprivacy.eu/
5 https://www.specialprivacy.eu/publications/public-deliverables
metadata representations for provenance, consent, and data sharing agreements
in the context of GDPR. The paper discusses the approach towards
implementing the presented knowledge-base based on its data sources, inference engine,
and usability in a query interface. The paper also discusses potential
applications of the knowledge base in automating compliance checks and generating
compliance documentation. For future work, we look towards implementing a
proof-of-concept knowledge-base from a real-world data to demonstrate the
feasibility of the approach.</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgements</title>
      <p>This work is supported by the ADAPT Centre for Digital Content Technology
which is funded under the SFI Research Centres Programme (Grant 13/RC/2106)
and is co-funded under the European Regional Development Fund.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Agarwal</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steyskal</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Antunovic</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirrane</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Legislative compliance assessment: Framework, model and GDPR instantiation</article-title>
          .
          <source>In: Privacy Technologies and Policy - 6th Annual Privacy Forum, APF</source>
          <year>2018</year>
          , Barcelona, Spain, June 13-14,
          <year>2018</year>
          , Revised Selected Papers. pp.
          <volume>131</volume>
          {
          <issue>149</issue>
          (
          <year>2018</year>
          ). https://doi.org/10.1007/978- 3-
          <fpage>030</fpage>
          -02547-2 8, https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -02547-
          <issue>2</issue>
          _
          <fpage>8</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Bartolini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muthuri</surname>
          </string-name>
          , R.:
          <article-title>Reconciling Data Protection Rights and Obligations: An Ontology of the Forthcoming EU Regulation</article-title>
          .
          <source>In: Workshop on Language and Semantic Technology for Legal Domain</source>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Bieker</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Friedewald</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hansen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Obersteller</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rost</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A Process for Data Protection Impact Assessment Under the European General Data Protection Regulation</article-title>
          .
          <source>In: Privacy Technologies and Policy</source>
          . pp.
          <volume>21</volume>
          {
          <fpage>37</fpage>
          . Lecture Notes in Computer Science, Springer, Cham (Sep
          <year>2016</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -44760-5 2
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Bier</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , Kuhne,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Beyerer</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.:</surname>
          </string-name>
          <article-title>PrivacyInsight: The Next Generation Privacy Dashboard</article-title>
          .
          <source>In: Privacy Technologies and Policy</source>
          . pp.
          <volume>135</volume>
          {
          <fpage>152</fpage>
          . Lecture Notes in Computer Science, Springer, Cham (Sep
          <year>2016</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          - 44760-5 9
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Corrales</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jurcys</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kousiouris</surname>
          </string-name>
          , G.:
          <article-title>Smart Contracts and Smart Disclosure: Coding a GDPR Compliance Framework</article-title>
          .
          <source>SSRN Scholarly Paper ID 3121658</source>
          , Social Science Research Network, Rochester,
          <string-name>
            <surname>NY</surname>
          </string-name>
          (Feb
          <year>2018</year>
          ), https://papers.ssrn. com/abstract=3121658
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Esayas</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mahler</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>McGillivray</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Is a Picture Worth a Thousand Terms? Visualising Contract Terms and Data Protection Requirements for Cloud Computing Users</article-title>
          . In: Current Trends in Web Engineering. pp.
          <volume>39</volume>
          {
          <fpage>56</fpage>
          . Lecture Notes in Computer Science, Springer, Cham (Jun
          <year>2016</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -46963-8 4
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Fatema</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hadziselimovic</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pandit</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Debruyne</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>O</given-names>
            <surname>'Sullivan</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          :
          <article-title>Compliance through Informed Consent: Semantic Based Consent Permission and Data Management Model</article-title>
          .
          <source>In: Proceedings of the 5th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2017) (PrivOn)</source>
          (
          <year>2017</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-1951/#paper-
          <fpage>05</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Hadziselimovic</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fatema</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pandit</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Linked Data Contracts to Support Data Protection and Data Ethics in the Sharing of Scienti c Data</article-title>
          .
          <source>In: Proceedings of the First Workshop on Enabling Open Semantic Science (SemSci)</source>
          . pp.
          <volume>55</volume>
          {
          <issue>62</issue>
          (
          <year>2017</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-1931/#paper-
          <fpage>08</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kingston</surname>
          </string-name>
          , J.:
          <article-title>Using arti cial intelligence to support compliance with the general data protection regulation</article-title>
          .
          <source>Arti cial Intelligence and Law</source>
          <volume>25</volume>
          (
          <issue>4</issue>
          ),
          <volume>429</volume>
          {443 (Dec
          <year>2017</year>
          ). https://doi.org/10.1007/s10506-017-9206-9, https://link.springer.com/ article/10.1007/s10506-017-9206-9
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Kirrane</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fernandez</surname>
            ,
            <given-names>J.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dullaert</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Milosevic</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Polleres</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bonatti</surname>
            ,
            <given-names>P.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wenning</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Drozd</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Raschke</surname>
            ,
            <given-names>P.:</given-names>
          </string-name>
          <article-title>A scalable consent, transparency and compliance architecture</article-title>
          .
          <source>In: The Semantic Web: ESWC 2018 Satellite Events - ESWC 2018 Satellite Events</source>
          , Heraklion, Crete, Greece, June 3-7,
          <year>2018</year>
          , Revised Selected Papers. pp.
          <volume>131</volume>
          {
          <issue>136</issue>
          (
          <year>2018</year>
          ). https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -98192-5 25, https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -98192-5_
          <fpage>25</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Kirrane</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Villata</surname>
          </string-name>
          , S.,
          <string-name>
            <surname>d'Aquin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Privacy, security and policies: A review of problems and solutions with semantic web technologies</article-title>
          .
          <source>Semantic Web</source>
          <volume>9</volume>
          (
          <issue>2</issue>
          ),
          <volume>153</volume>
          {161 (Jan
          <year>2018</year>
          ). https://doi.org/10.3233/SW-180289, https://content. iospress.com/articles/semantic-web/
          <year>sw289</year>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Mayer</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Casanovas</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stumptner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Semantic Work ows in Law Enforcement Investigations and Legal Requirements</article-title>
          .
          <source>In: Proceedings of the 1st Workshop on Technologies for Regulatory Compliance co-located with the 30th International Conference on Legal Knowledge and Information Systems (JURIX</source>
          <year>2017</year>
          )
          <article-title>(</article-title>
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Montiel-Ponsoda</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodr</surname>
            guez-Doncel,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gracia</surname>
          </string-name>
          , J.:
          <article-title>Building the Legal Knowledge Graph for Smart Compliance Services in Multilingual Europe</article-title>
          .
          <source>In: Proceedings of the 1st Workshop on Technologies for Regulatory Compliance co-located with the 30th International Conference on Legal Knowledge and Information Systems (JURIX</source>
          <year>2017</year>
          )
          <article-title>(</article-title>
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Pandit</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fatema</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>O'Sullivan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>GDPRtEXT - GDPR as a Linked Data Resource</article-title>
          .
          <source>In: 15th European Semantic Web Conference</source>
          (in-press. Heraklion, Crete, Greece (
          <year>2018</year>
          ), http://purl.org/ADAPT/pub/E18ESWC_GDPRtEXT
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Pandit</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Modelling Provenance for GDPR Compliance using Linked Open Data Vocabularies</article-title>
          .
          <source>In: Proceedings of the 5th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2017) (PrivOn)</source>
          (
          <year>2017</year>
          ), http://ceur-ws.
          <source>org/</source>
          Vol-1951/#paper-
          <fpage>06</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Pandit</surname>
            , H.J.,
            <given-names>O</given-names>
          </string-name>
          <string-name>
            <surname>'Sullivan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>GDPR Data Interoperability Model</article-title>
          . In: 23 rd
          <string-name>
            <given-names>EURAS</given-names>
            <surname>Annual Standardisation</surname>
          </string-name>
          <article-title>Conference (in-press)</article-title>
          . Dublin, Ireland (
          <year>2018</year>
          ), http://purl.org/ADAPT/pub/E18EURAS
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Reuben</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Martucci</surname>
            ,
            <given-names>L.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fischer-</surname>
            Hubner,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Packer</surname>
            ,
            <given-names>H.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hedbom</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moreau</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Privacy Impact Assessment Template for Provenance</article-title>
          .
          <source>In: Availability, Reliability and Security (ARES)</source>
          ,
          <year>2016</year>
          11th International Conference on. pp.
          <volume>653</volume>
          {
          <fpage>660</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Seppala</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ceci</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Huang</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>O</given-names>
            <surname>'Brien</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            ,
            <surname>Butler</surname>
          </string-name>
          , T.:
          <article-title>SmaRT Visualisation of Legal Rules for Compliance</article-title>
          .
          <source>In: Proceedings of the 1st Workshop on Technologies for Regulatory Compliance co-located with the 30th International Conference on Legal Knowledge and Information Systems (JURIX</source>
          <year>2017</year>
          )
          <article-title>(</article-title>
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>