<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A semantic tool for the protection of personal information act</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Centre of Arti cial Intelligence Research</institution>
          ,
          <addr-line>CAIR</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Computer Science, University of the Western Cape</institution>
          ,
          <addr-line>Private Bag X17, Cape Town, Western Cape, 7535</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>The increase of connectivity due to technology advances is shifting the attention of legislators in various jurisdictions to the protection of personal information and data. The focus of this paper is the protection of privacy information, speci cally the POPIA within South Africa. This paper presents the development of an ontology to establish a small knowledge base for the regulations in the POPIA and how it a ects organizations and individuals.</p>
      </abstract>
      <kwd-group>
        <kwd>Legal ontology</kwd>
        <kwd>data protection</kwd>
        <kwd>information privacy</kwd>
        <kwd>Pro- tection of Personal Information Act</kwd>
        <kwd>General Data Protection Regula- tion</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Organizations that are operating in South Africa are being confronted by the
authorization of the Protection of Personal Information Act 4 of 2013 (POPIA)
[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The POPIA seeks to protect the right of privacy that applies to individuals
and juristic entities (referred to as data subjects) by enforcing regulations [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
It is with this in mind that a knowledge base for legislation of the POPIA will
be valuable for assisting with the education of both the data subjects and
organizations on the POPIA. The paper is arranged as follows. Section 2 describes
related work Section 3 the requirements and methodology. Section 4 outlines the
design, implementation followed by a summary and future work.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Background and related work</title>
      <p>Semantic technologies refer to di erent technologies aimed at the derivation of
the meaning of information. An ontology provides a shared domain vocabulary
and a set of assumptions on the meanings of concepts described in the vocabulary.</p>
      <p>
        An ontology for the GDPR was developed for the data protection
requirements [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. It shows the data protection prerequisites with regards to the GDPR
change and introduces a methodology for incorporating it into a work process
to express these necessities inside a business procedure through the ontology.
      </p>
      <p>Y. Jafta and L. Leenen</p>
      <p>
        The GDPRov project [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] is an ontology concerned with the management of
compliance through recognizing provenance information identi ed with assent
and individual personal information required for consistency documentation. \It
is an OWL 2 linked open data ontology" [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] that represents the provenance of
assent and data lifecycle work processes for the GDPR.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Requirements and methodology</title>
      <p>
        The requirements for the ontology are de ned by a set of competency questions
the ontology should answer. These questions will serve as the litmus test in the
evaluation phase of the development process and will help de ne the scope of
the ontology [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The OWL-based ontology editor, Protege, was used.
      </p>
      <p>
        Our ontology engineering methodology is a combination of
METHONTOLOGY [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] and the Ontology Development 101 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] method. METHONTOLOGY
provides high{level activities for the development life cycle and the ontology
development 101 method provides granular steps for the design and
implementation phases.
4
      </p>
    </sec>
    <sec id="sec-4">
      <title>Design and implementation</title>
      <p>The design consists of listing all the key terms (chosen based on the competency
questions) considered important for the knowledge base, de ning an initial class
hierarchy, and de ning properties for classes and their features. Terms include
data subject, person, processing, personal information, has rights.</p>
      <p>The classes are created from a subset of the concepts listed in the terms
above. Person, Accountability, DataSubject, and ReponsibleParty forms part of
the initial set of classes. The properties are the concepts that will describe the
relations between classes, as well as any additional data they might have. This
includes, but not limited to, a data subject has rights, the right to access to
information is a data subject right.</p>
      <p>An initial evaluation was performed on the ontology by performing some basic
queries using the DL Query plugin in the Protege editor. The reasoner, Hermit
version 1.4.3.456, was used for consistency veri cation. The queries included
querying the rights of data subjects, describing personal information and special
personal information. The evaluation is still in progress.
5</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion and future work</title>
      <p>This paper outlines the development of an ontology to provide a knowledge base
on various concepts within the Act that will promote transparency and education
that can aid with the inception of this Act. The development of the ontology is
now in the evaluation. A set of classes and properties was created to demonstrate
a working ontology. The evaluation of the ontology will be performed to assert the
satisfaction of requirements followed by maintenance. The latest version of the
ontology can be found at https://cs.uwc.ac.za/honours/2019/yjafta/ontology.owl.</p>
      <p>A semantic tool for the protection of personal information act</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Bartolini</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muthuri</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santos</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Using ontologies to model data protection requirements in work ows</article-title>
          . In: Otake,
          <string-name>
            <given-names>M.</given-names>
            ,
            <surname>Kurahashi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            ,
            <surname>Ota</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Satoh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            ,
            <surname>Bekki</surname>
          </string-name>
          ,
          <string-name>
            <surname>D</surname>
          </string-name>
          . (eds.) New Frontiers in
          <source>Arti cial Intelligence</source>
          . pp.
          <volume>233</volume>
          {
          <fpage>248</fpage>
          . Springer International Publishing (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>F.</given-names>
            <surname>Noy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            ,
            <surname>Mcguinness</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          :
          <article-title>Ontology development 101: A guide to creating your rst ontology</article-title>
          .
          <source>Knowledge Systems Laboratory</source>
          <volume>32</volume>
          (01
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Fernandez-Lopez</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gomez-Perez</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Juristo</surname>
          </string-name>
          , N.:
          <article-title>Methontology: From ontological art towards ontological engineering</article-title>
          .
          <source>In: Proceedings of the Ontological Engineering AAAI-97 Spring Symposium Series. American Asociation for Arti cial Intelligence (March</source>
          <year>1997</year>
          ), http://oa.upm.es/5484/, ontology Engineering Group ? OEG
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Pandit</surname>
            ,
            <given-names>H.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lewis</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Modelling provenance for gdpr compliance using linked open data vocabularies</article-title>
          . In: PrivOn@ISWC (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. South African Government Gazette:
          <article-title>Protection of personal information act (</article-title>
          <year>2013</year>
          ), http://www.justice.gov.za/legislation/acts/2013-
          <fpage>004</fpage>
          .pdf
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>