<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Managing Consent in Workflows under GDPR</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Saliha Irem Besik</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Johann-Christoph Freytag</string-name>
          <email>freytagg@informatik.hu-berlin.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Humboldt-Universita ̈t zu Berlin, Department of Computer Science</institution>
          ,
          <addr-line>Unter den Linden 6, 10099 Berlin</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>18</fpage>
      <lpage>25</lpage>
      <abstract>
        <p>The European Union General Data Protection Regulation (GDPR) defines the principles to be met by organizations when processing personal data in order to guarantee data privacy. According to GDPR, consent is required for establishing a legal basis for processing personal data, if there are no other legal grounds for the processing. Besides any identifiable “natural” person, also known as data subject, has the right to withdraw the given consent to process his or her personal data at any time. It is the organization's responsibility to ensure consent and its revocation to demonstrate its compliance with GDPR. With respect to GDPR compliance, organizations can benefit from workflows as they might be used to ensure that consent is obtained before processing personal data. This paper addresses how to enable organizations to manage consent and revocation through their workflows.</p>
      </abstract>
      <kwd-group>
        <kwd>Data Privacy</kwd>
        <kwd>General Data Protection Regulation (GDPR)</kwd>
        <kwd>Consent</kwd>
        <kwd>BPMN</kwd>
        <kwd>Business Process Compliance</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>The European Union General Data Protection Regulation (GDPR) limits the
processing personal data unless it is explicitly allowed by law, or the data subject
has consented to the processing [GDPR, Article 6]. In addition to this, the
data subject shall have the right to withdraw his or her consent at any time
[GDPR, Article 7(3)]. Organizations dealing with personal data of European
Union citizens must be able to provide a proof of validity of obtained consent
and revocation.</p>
      <p>The principle of Privacy by Design (PbD) advocates that privacy should
be considered as a first class citizen in the technology design and should be
proactively embedded. In order to support PbD, organizations can take advantage
of workflows by checking compliance of their workflow models with GDPR during
design time. One of the significant benefits of using workflows is that it enables
to capture how data is transmitted for what purpose at the conceptual level. We
use Business Process Model and Notation (BPMN) to model workflows as it is a
de-facto standard for business process modeling.</p>
      <p>In this paper, we analyze the consent and its revocation under GDPR. Based
on this analysis, we propose design patterns to integrate consent and revocation
features in BPMN-based workflows.</p>
      <p>The structure of the rest of the paper is as follows: Section 2 briefly presents
our understanding of the consent and revocation under GDPR. Section 3 discusses
the concept of workflows in our research. Section 4 gives an overview of our
proposed approach. Section 5 gives a running example in the clinical domain to
show the applicability of our approach. Section 6 reviews related works. Finally,
Section 7 concludes this paper and discusses our future work and perspectives.
2</p>
      <p>Consent and Revocation under GDPR
Consent can be defined as “any freely given, specific, informed and unambiguous
[...] clear affirmative action” by which a data subject agrees to the processing of
his or her personal data [GDPR, Article 4]. Some data operations are lawful only
if the data subject has given consent to this processing [GDPR, Article 6, §1(a)].</p>
      <p>
        Organizations need to determine whether their data operations require consent
to be lawful. We use the term Consent Policy to define the statements to declare
whether a data operation requires a consent. In our article [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], we gave a formal
definition for Consent Policy in Definition 1.
      </p>
      <p>Definition 1 (Consent Policy) A Consent Policy CP contains policies which
are represented as 2-tuples cp = (purpose, requiresConsent), where:
– purpose is the reason for which data is collected, used, or disclosed;
– requiresConsent ∈ {true, false} specifies whether data processing requires
consent or not.</p>
      <p>For instance, newborn hearing screening requires an explicit consent to be
legitimate. However, an emergency case does not require consent as it is a subject
of “vital interest” which means being necessary to protect someone’s life. Thus,
CP contains policies (newborn-hearing-screening, true) and (vital-interest, false)
accordingly.</p>
      <p>For consent to be informed and valid, the
data subject must be aware at least of the
purposes of the processing and the identity of the
data controller who determines the purposes Consent Form
and means of the processing [GDPR, Recital Data Subject
42]. As an example, assume Hospital X wants Data Controller
to use personal data of its patients for new- Purpose
born hearing screening. Hospital X can use the
following statement to inform its patients to
obtain consent “We, as Hospital X, use your Fig. 1. Consent Form.
personal data for the purpose of newborn
hearing screening.”</p>
      <p>We modeled Consent Form (illustrated in Figure 1) that retains the minimum
required information to be valid. Consent Form can be elaborated with additional
information such as the duration of the consent to give data subjects more control.</p>
      <p>A data subject has the right to withdraw his or her consent at any time
[GDPR, Article 7, §3]. Organizations are obliged to take appropriate actions to
handle revocation. They have to stop any ongoing process instances which are
affected by revocation. They should also delete the personal data, if the personal
data is not used by any other purpose and becomes unnecessary after revocation.
3</p>
      <p>
        Workflows: Platform to support GDPR Compliance
Data privacy, in general, focuses on how personal data should be handled. In
order to ensure data privacy in BPMN-based workflows, we worked on different
ways of data handling supported in BPMN [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Data is represented in BPMN
via data object, data store, or message elements1 (shown in the left-hand side
of Figure 2). In order to check the privacy compliance of a workflow, for each
of its data operations it is essential to know explicitly which personal data is
accessed for which purpose. We expect organizations to provide this information
via semantic text annotations. Right-hand side of Figure 2 illustrates how we
semantically annotate the data operations, where purpose refers to the purpose
of accessing data and attribute-name refers to a set of attribute names of data
which are accessed. For example, &lt; marketing, {name, age} &gt; annotation means
name and age data attributes are accessed for the purpose of marketing.
      </p>
      <sec id="sec-1-1">
        <title>Data Handling in BPMN</title>
      </sec>
      <sec id="sec-1-2">
        <title>Semantic Annotation Usage for Data Operation</title>
        <sec id="sec-1-2-1">
          <title>Data</title>
        </sec>
        <sec id="sec-1-2-2">
          <title>Store</title>
        </sec>
        <sec id="sec-1-2-3">
          <title>Data</title>
        </sec>
        <sec id="sec-1-2-4">
          <title>Object</title>
        </sec>
        <sec id="sec-1-2-5">
          <title>Message</title>
        </sec>
        <sec id="sec-1-2-6">
          <title>Task</title>
          <p>purpose, {attribute-name}
1https://www.omg.org/spec/BPMN/2.0/
lists different means to handle data in BPMN which are via data object, data
store, or message elements. We check these BPMN elements in a given workflow.
We assume that data operations are all semantically annotated and semantic
annotations include the purpose of the data operations.</p>
          <p>After finding each data operation in a given workflow, we determine whether
these data operations require consent according to a given Consent Policy
(Definition 1). If there is a data operation requiring explicit consent and if there
is no consent obtained before that data operation, there is a potential privacy
violation. Our idea is adding a checking consent step beforehand to remove this
potential violation. For this purpose, we designed a consent pattern which is
shown in Figure 3. Data Controller asks the Data Subject for consent and the
Data Operation is executed when consent is granted. Otherwise, the process
terminates. Consent Form is modeled as it is shown in Figure 1, it contains the
identity of Data Controller and the purpose of the Data Operation.</p>
        </sec>
        <sec id="sec-1-2-7">
          <title>Consent Form</title>
          <p>ask consent
purpose, {data}</p>
          <p>We address the question “when to obtain consent?” Our idea is to add consent
pattern as late as possible which means adding it just before the concerned data
operation. In this way, we intend to prevent the potential situations where consent
is obtained yet never used. We argue that consent should be obtained only when
it is needed. We raise also the question “what if there are multiple purposes
within a given workflow?” When there are multiple purposes, consent should
be given for all of them [GDPR, Recital 42]. Our strategy to handle multiple
purposes is first checking whether the data operations with different purposes
always follow each other. When they always follow each other, we create one
aggregated Consent Form including all their purposes. If data operations do not
always occur together, we create separate consent patterns for each of these data
operations. The reason behind is again related to prevent the potential situations
where consent is obtained yet never used. Creating separate consent patterns
might increase the complexity of the workflows in terms of readability. However,
a consent pattern can also be designed as a collapsed BPMN sub-process which
provides a more compact view. Thus, we might increase the readability of the
workflow.</p>
          <p>t
taa jceb
D Su
r
e
l
taa ltro
D on</p>
          <p>C
request consent revocation</p>
          <p>Data Operations Sub-Process
We consider Newborn Hearing Screening (NHS) procedure in Germany as a
running scenario in order to illustrate our methodology. It is an optional procedure
which requires the explicit consent of at least one of the parents or guardians
of the newborn babies. After carrying out NHS, according to the result of the
screening pediatrician either applies treatment or conducts further research.
Processing personal data for the purpose of research also requires consent to be
lawful. Figure 5 shows a BPMN diagram for our scenario. Take note that this
BPMN diagram is not GDPR-aware which means there is neither consent nor
revocation control.</p>
          <p>ian newborn
ic arrives
r
t
a
i
d
e
P
carry out</p>
          <p>NHS
NHS
result
bad result?</p>
          <p>no
NHS, {NHS-result}
research, {NHS-result}
yes
require research?
no</p>
          <p>apply
treatment
yes
conduct
research</p>
          <p>t
n
e
r
a
P
newborn
n arrives
a
iiit
c
r
a
d
e
P</p>
          <p>Fig. 6. Newborn Hearing Screening Diagram with Consent and Revocation.</p>
          <p>In our scenario, there are two data operations with two different purposes
which are NHS and research. We add separate consent patterns for each of these
data operations because when the processing has multiple purposes, consent
should be given for all of them. In our scenario, pediatrician do not always
conduct research. Therefore, we do not ask consent for research and NHS at
the same time. In order to manage revocation, we create the Data Operations
Sub-Process including both data operations and we add handle revocation pattern
for this sub-process. Handle revocation task is triggered by a revocation request
by a parent.
6</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>Related Work</title>
      <p>
        Granting and revoking consent effectively has been the focus of several research
efforts over the last years. In the pre-GDPR era, one of the pioneers in this
field is Ensuring Consent and Revocation (EnCoRe) research project. Within
this project, one of the goals was to provide dynamic and granular options for
consent and revocation in system design [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ][
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. They also provided conceptual
modeling for privacy policies with consent and revocation requirements [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
Their understanding of consent differs from ours as they do not reflect on the
requirements and obligations based on GDPR. Also, they have no work regarding
the use of workflows to handle consent and revocation. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] proposed the idea of
the alignment of workflows with consent management. Their aim was, however,
generating the letter of consent documents based on existing workflows. In the
literature, there are also studies where BPMN is extended towards security
and privacy aspects [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ][
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. However, these works do cover neither consent nor
revocation. [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] presented a set of design patterns as business process models
which enables organizations to tackle GDPR constraints. Their work can be
considered as a guide to achieve GDPR compliance for an organization. Our work
considerably differs from their work because we aim to transform the existing
non-privacy-aware business process models into privacy-aware ones.
7
      </p>
    </sec>
    <sec id="sec-3">
      <title>Conclusion and Outlook</title>
      <p>We are convinced that it is fundamental to incorporate consent and revocation
controls within the workflows of organizations that handle personal data to
ensure their compliance with GDPR during the design time. In this paper, we
presented our approach to adapt the BPMN-based workflows with the consent
and revocation concepts under GDPR. As future work, we would like to work on
how to automatically generate the consent forms by using the existing workflows
and automatically transform the existing workflows into the ones which handle
the consent and revocation efficiently. We are also interested in analyzing the
optimality of our approach.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Saliha</given-names>
            <surname>Irem</surname>
          </string-name>
          Besik and
          <string-name>
            <surname>Johann-Christoph Freytag</surname>
          </string-name>
          .
          <article-title>A formal approach to build privacy-awareness into clinical workflows</article-title>
          .
          <source>SICS Software-Intensive Cyber-Physical Systems</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Saliha</given-names>
            <surname>Irem</surname>
          </string-name>
          Besik and
          <string-name>
            <surname>Johann-Christoph Freytag</surname>
          </string-name>
          .
          <article-title>Ontology-based privacy compliance checking for clinical workflows</article-title>
          .
          <source>In Proceedings of the Conference on ”Lernen</source>
          , Wissen, Daten, Analysen”, Berlin, Germany,
          <source>September 30 - October 2</source>
          ,
          <year>2019</year>
          , pages
          <fpage>218</fpage>
          -
          <lpage>229</lpage>
          ,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Marco</given-names>
            <surname>Casassa</surname>
          </string-name>
          <string-name>
            <surname>Mont</surname>
          </string-name>
          , Siani Pearson, Gina Kounga,
          <string-name>
            <given-names>Yun</given-names>
            <surname>Shen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and Pete</given-names>
            <surname>Bramhall</surname>
          </string-name>
          .
          <article-title>On the management of consent and revocation in enterprises: setting the context</article-title>
          .
          <source>HP Laboratories</source>
          ,
          <source>Technical Report HPL-2009-49</source>
          ,
          <issue>11</issue>
          ,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Ioannis</given-names>
            <surname>Agrafiotis</surname>
          </string-name>
          , Sadie Creese,
          <string-name>
            <given-names>Michael</given-names>
            <surname>Goldsmith</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Nick</given-names>
            <surname>Papanikolaou</surname>
          </string-name>
          .
          <article-title>Reaching for informed revocation: Shutting off the tap on personal data</article-title>
          .
          <source>In IFIP PrimeLife International Summer School on Privacy and Identity Management for Life</source>
          , pages
          <fpage>246</fpage>
          -
          <lpage>258</lpage>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Marco</given-names>
            <surname>Casassa</surname>
          </string-name>
          <string-name>
            <surname>Mont</surname>
          </string-name>
          , Siani Pearson, Sadie Creese,
          <string-name>
            <given-names>Michael</given-names>
            <surname>Goldsmith</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Nick</given-names>
            <surname>Papanikolaou</surname>
          </string-name>
          .
          <article-title>A conceptual model for privacy policies with consent and revocation requirements</article-title>
          .
          <source>In IFIP PrimeLife International Summer School on Privacy and Identity Management for Life</source>
          , pages
          <fpage>258</fpage>
          -
          <lpage>270</lpage>
          . Springer,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Nils</given-names>
            <surname>Gruschka</surname>
          </string-name>
          and
          <string-name>
            <given-names>Meiko</given-names>
            <surname>Jensen</surname>
          </string-name>
          .
          <article-title>Aligning user consent management and service process modeling</article-title>
          .
          <source>In GI-Jahrestagung</source>
          , pages
          <fpage>527</fpage>
          -
          <lpage>538</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Wadha</given-names>
            <surname>Labda</surname>
          </string-name>
          , Nikolay Mehandjiev, and
          <string-name>
            <given-names>Pedro</given-names>
            <surname>Sampaio</surname>
          </string-name>
          .
          <article-title>Modeling of privacy-aware business processes in BPMN to protect personal data</article-title>
          .
          <source>In Proc. of the 29th Annual ACM Symposium on Applied Computing</source>
          , pages
          <fpage>1399</fpage>
          -
          <lpage>1405</lpage>
          . ACM,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Alfonso</given-names>
            <surname>Rodr</surname>
          </string-name>
          <article-title>´ıguez, Eduardo Fern´andez-</article-title>
          <string-name>
            <surname>Medina</surname>
            , and
            <given-names>Mario</given-names>
          </string-name>
          <string-name>
            <surname>Piattini</surname>
          </string-name>
          .
          <article-title>A BPMN extension for the modeling of security requirements in business processes</article-title>
          .
          <source>IEICE transactions on information and systems</source>
          ,
          <volume>90</volume>
          (
          <issue>4</issue>
          ):
          <fpage>745</fpage>
          -
          <lpage>752</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <given-names>Simone</given-names>
            <surname>Agostinelli</surname>
          </string-name>
          , Fabrizio Maria Maggi, Andrea Marrella, and
          <string-name>
            <given-names>Francesco</given-names>
            <surname>Sapio</surname>
          </string-name>
          .
          <article-title>Achieving gdpr compliance of bpmn process models</article-title>
          .
          <source>In International Conference on Advanced Information Systems Engineering</source>
          , pages
          <fpage>10</fpage>
          -
          <lpage>22</lpage>
          . Springer,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>