<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>December</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>OntoROPA Project</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>M. Mercedes Martínez-González</string-name>
          <email>mercedes@infor.uva.es</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pompeu Casanovas</string-name>
          <email>pompeu.casanovas@uab.cat</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>María-Luisa Alvite-Díez</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Núria Casellas</string-name>
          <email>ncasellas@nuriacasellas.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Amador Aparicio</string-name>
          <email>amador@infor.uva.es</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>David Sanz</string-name>
          <email>david.sanz@uva.es</email>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Artificial Intelligence Research Institute, Spanish National Research Council (IIIA-CSIC), IIIA-IDT Associated Unit</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Law and Technology - IDT, Universitat Autònoma de Barcelona</institution>
          ,
          <addr-line>Bellaterra-Cerdanyola</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Privacy, Compliance, General Data Protection Regulation (GDPR)</institution>
          ,
          <addr-line>Ontologies, Blockchain, Security</addr-line>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Universidad de León, Departamento de Biblioteconomía y Documentación, Campus de Vegazana</institution>
          ,
          <addr-line>León</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Universidad de Valladolid, Departamento de Informática</institution>
          ,
          <addr-line>Campus Miguel Delibes, Valladolid</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <volume>19</volume>
      <issue>2022</issue>
      <fpage>87</fpage>
      <lpage>103</lpage>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Trust</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>LGOBE
http://www.infor.uva.es/~mercedes (M. M. Martínez-González)
CEUR</p>
      <p>While these formats are both human- and machine-readable, they are not suitable for semantic
interoperability, automatic knowledge extraction, or automatic verification. Therefore, current
ROPAs are not linked to related or similar documents, their content is not validated, and semantic
interoperability is not enabled. On the contrary, citizens should be provided with tools able to
extract the knowledge they keep, and show this knowledge to users in understandable manners,
which is indeed a GDPR request. ROPAs should not be independent and isolated pieces of
information. They should be reliable sources of relevant information, linked, and available for
intelligent knowledge extraction. Technology can help to make it possible.</p>
      <p>OntoROPA aims at the creation of a ROPA knowledge graph that will include not only the
legal requirements, but also the practical knowledge from the community of privacy and data
protection experts, including lawyers, legal advisors and scholars, data protection oficers, and
rulers who are proficient in the creation and manipulation of ROPAs.</p>
      <p>The notion of practical knowledge is crucial because this entails an implicit professional
knowledge that must be elicited and made explicit in the knowledge acquisition process. This
kind of knowledge is also modelled, as it encompasses the professional selection and
understanding of legal normative texts and provisions. This is not to be found in legal documents containing
positive law because it belongs to their legal experience. This includes the interpretation of
hard law, soft law, policies, and ethics.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Related work</title>
      <sec id="sec-3-1">
        <title>2.1. Regulatory and legal compliance</title>
        <p>
          In a broad definition, compliance is the conformance of human or artificial behaviour with
a set of rules, norms, principles, or values. In the data economy, compliance has also been
bootstrapped, because if humans must be compliant, so must be autonomous and intelligent
systems (AI/S), socio-technical systems (STS), and socio-cognitive technical systems (SCTS).
Regulatory and legal compliance should be carefully distinguished. Regulatory compliance
refers to the concept, languages and methodologies developed within the business, commercial
and corporate fields to design, control and monitor in advance business processes and activities.
Legal compliance refers to the formal developments that can be deemed ‘legal’ according to
the norms, principles, and jurisdictions of regional, national, international, and transnational
legal systems. They certainly converge, but the meanings of the two notions should be kept
separate, as some requirements must be added for legal compliance be accorded from oficial
bodies. This is linked to the Compliance by Design (CbD) schemes that have been developed
in the corporate business field since the beginning of the century to cope with the constraints
set by the Sarbanes-Oxley Act (2002), a US Federal law that laid down new requirements
for public company boards and accounting firms. There is some confusion in this regard.
In computer science, literature regulatory compliance also denotes “the act and process on
ensuring adherence to laws” that involves “discovering, extracting and representing diferent
requirements from laws and regulations that afect a business process” [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Legal compliance
represents an extension of these epistemic approaches outside of the business and corporate
areas to encompass all fields of regulation under the laws—private, commercial, corporate,
industrial, administrative, criminal, public etc. I.e. basically embracing all substantive and
formal rights that are implemented through the rule of law. As said, this is adding complexity
to the whole compliance process. Thus, we have suggested elsewhere [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] to diferentiate: (i)
(Automated) regulatory compliance and (semi-automated) legal compliance, (ii) Compliance by
Design (CbD) and Compliance through Design (CtD). The latter are focused on legal knowledge,
defining some more requirements based on the properties of normative legal systems (hierarchy,
consistency, efectivity, etc.) to encompass the social and institutional dimensions of regulations
within the Internet of Things—from documentary legal interpretation to the coordination of
all stakeholders and the relation between citizens and the law. According to our results, years
2009 (in the middle of the last financial crisis, Fig. 2) and 2020-21 (because of the enforced
implementation of GDPR) are the tipping points of the increase and growing interest of industry
and researchers to find CbD and CtD solutions [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Hashmi, Governatori, Lam, and Wynn [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]
have identified the next challenges. Without being exhaustive: (i) the expressivity of formal
languages to represent normative contents; (ii) the extraction of formal rules expressed in
natural language, (iii) coping with multi-jurisdictional requirements, (iv) how to deal with
control flow-structure, (v) integrating rules with processes, (vi) handling violations, (vii) dealing
with model evolution, (viii) handling the performance and complexity of the models, (ix) and their
usability, understandability, and explainability. The last feature, ‘explainability’—or explicability,
assembling explanatory means and accountability [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] is important here, because it deals with
ethical principles, and ethical principles deal with Artificial Intelligence, and it will be even
more connected in the future, according to the first draft of the next EU Artificial Intelligence
Act1.
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>2.2. Expert Knowledge as Methodology for ontology creation</title>
        <p>
          Although most ontology methodologies have been highly influenced by the existing standards
and methodologies regarding software and systems design, few of the revised methodologies
have been deeply influenced by the standards and methods set towards a human-centred
perspective to systems (ontology) design, domain expert-centred design. Most ontology methodologies
may involve domain experts and users at some stages of the development process (mainly
knowledge acquisition and evaluation), although none of the above-mentioned methodologies
describes a complete expert-centred perspective towards ontology engineering. In general,
no reference is made towards ensuring that the knowledge modelled in the ontology is, in
fact, shared amongst the experts or professionals of the domain. Human-centred software
design and user validation are highly standardised processes which include participation in and
evaluation of the general development of software, systems and products, the analysis of their
usability, the documentation provided and the quality of their use. In this project, we take into
account the detailed modelling guidelines from [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] and Methontology [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] but include
expertcentred and empirically oriented methods towards professional legal knowledge acquisition,
1Recital n. 7 of the Draft reads: ”In October 2020, the European Parliament adopted a number of resolutions related
to artificial intelligence, including on ethics, liability, copyright, artificial intelligence in criminal matters, and
artificial intelligence in education, culture and the audio-visual sector. The European Parliament resolution on a
framework of ethical aspects of artificial intelligence, robotics and related technologies specifically recommends to
the Commission to propose a legislative action to harness the opportunities and benefits of artificial intelligence,
but also to ensure protection of ethical principles.” The European Parliament and the Council of the European
Union. Regulation on a European Approach For Artificial Intelligence.
and usability (shareability) evaluation towards the construction of the ROPA Ontology. The
methodological steps will follow the general cyclic iterative and incremental approach:
specification of requirements, knowledge acquisition, conceptualization, formalization, evaluation
and refinement.
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>2.3. Review of GDPR Ontologies</title>
        <p>
          Since the enactment of data protection regulations in the European Union and elsewhere, from
the repealed Data Protection Directive (DPD, Directive 95/46/EC of the European Parliament and
of the Council on the Protection of Individuals with Regard to the Processing of Personal Data
and on the Free Movement of Such Data2) to the current General Data Protection Regulation
(GDPR, Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April
2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data
and on the Free Movement of Such Data, and Repealing Directive 95/46/EC3), many have
pursued the encoding of their semantics for the development of smart data privacy compliant
applications. We mainly mention a selection of GDPR-related ontologies that are relevant to our
project that are available for review and reuse. We also focus on their use of expert knowledge
during their development. For extensive accounts of data protection related ontologies see
[
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] and [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. While there are many semantic models that focus on GDPR concepts, there are
currently no ontologies that model GDPR expert professional knowledge with a focus on
the ROPA maintenance and management required by data controllers and supervisors of the
records. Existing ontologies are, namely: (i) SPECIAL usage policy language (OWL2); (ii)
Data Privacy Vocabulary (RDF/OWL); (iii) Policy Log Vocabulary (RDF/OWL); (iv) DVP-GDPR
(RDF/OWL); (v) GConsent (OWL2); (vi) GDPRov (OWL2); (vii) GPRtEX (RDF/OWL(SKOS);
(viii) Data Protection Ontology (OWL); (ix) PrOnto (Privacy Ontology) (OWL); (x) Compliance
Ontology/Information Model Ontology/Policy Model Ontology (OWL); (xi) Fiesta-Priv ontology
(OWL); and, (xii) BiOT (OWL).
        </p>
      </sec>
      <sec id="sec-3-4">
        <title>2.4. Legal compliance</title>
        <p>
          In the last five years, Regtech solutions have been fuelled by the favourable conditions of the
legal market. RegTech is an acronym for ”Regulatory Technologies”. LawTech—regulatory
technologies for law—refers to RegTech, FinTech, InsuTech and SupTech. But RegTech is a
broader concept, used either in the fields of business, law, management and technology. A simple
definition would identify that “RegTech is about the digital tools that are necessary to master
regulatory complexity” [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. We can distinguish four phases of RegTech development—manual,
workflow automation, continuous monitoring, and predictive analytics—mapping services and
companies accordingly. We do believe that the technologies of the IoT relate to an upcoming
ifth stage, in which sensors will be incorporated to generate a flood of real-time information
to be stored, organised and exploited [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. The emergence of LawTech web services aims to
bring technological solutions and law to business, industry, and people, enabling them to better
organise and automate both the management of their legal data and legal operations.
2https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:31995L0046
3https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L:2016:119:TOC
        </p>
        <p>
          LawTech has created an expanding legal market, in which companies ofer a variety of legal
services mainly based on AI and machine learning solutions—not just the more traditional
e-discovery but supervision, monitoring and automatic compliance of regulatory systems,
including smart contracts, cryptocurrencies and online dispute resolution. This is a
noncomplete list of automation fields: (i) expert knowledge and compliance; (ii) legal research
(interpretation and resolution of cases), (iii) prediction sentences and cases (legal analytics), (iv)
electronic discovery (e-discovery), and (v) intelligent contracts (smart contracts). However, it still
is a volatile market. Just before the Covid-19 pandemic, LawTech venture capital investments
increased dramatically at the rate of 2.4 new start-ups per day [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. The legal database hosted
by CodeX, the Stanford Center for Legal Informatics keeps track of them.
        </p>
        <p>
          The automation of legal documents is the most well-trodden path. Legal compliance is the
least—as it certainly is a more complex relational field because the behaviour of all stakeholders
must be taken into account (not just meaningful texts to be interpreted). There are systems in
legal informatics that have been designed for drafting, storing, organising, consolidating, or
retrieving provisions in plain natural language to eventually support legal decision-making
[
          <xref ref-type="bibr" rid="ref13">13</xref>
          ]. However, turning norms from natural to formal languages combining NLP techniques and
defeasible logic is a dificult task [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]. This has not yet been completely solved. The current
research is focusing on how to semi-automate the extraction of norms and their elements to
populate legal ontologies, combining state-of-the-art general-purpose NLP modules with
preand post-processing using rules based on domain knowledge to solve the so-called “resource
bottleneck problem”. Thus, trying to semi-automate the extraction of definitions, norms, and
their elements to reduce the need of human intervention [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ]. This is a conceptual challenge,
lately also called Rules as Code in e-government administrations [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. The OntoROPA solution for privacy compliance</title>
      <sec id="sec-4-1">
        <title>3.1. Approach</title>
        <p>OntoROPA follows the general trend of the legal compliance market presented in section 2.4,
but instead of interpreting directly the content of article 30 and article 33 of GDPR (mainly
about the duties of controllers), an indirect way of approaching the subject was chosen:
1. Compliance cannot just be a result to be targeted but a process to be engaged with,
embedded into a blockchain solution;
2. Compliance through Design (CtD) means that legal interpretation occurs along the whole
process, following several steps crossing hard law, policies, soft law, and ethics;
3. Thus, the starting point cannot be a top down nor a bottom-up approach, but a middle-out
one, stemming from intermediate legal notions –intellectual property, legal time, security,
legal validity, etc.– reaching out to all stakeholders involved in the transactions;
4. In this regard, we are opening a legal procedural way of producing veracity, certainty
and especially trust, as consumers, producers and markets will have a mechanism to turn
out their Records of Processing Activities (ROPAs) into a legal, acceptable and actionable
document;
5. What this latter formulation entails is a certification process that can be accepted by
agencies and courts as legal evidence, turning the needle in all directions of the legal
compass;
6. In this sense, we do not need to wait for a specific case-based interpretation of what
‘joint controller’ means (there are no available cases yet): stemming from the notions and
clusters contained into the documents produced by Data Protection Agencies should be
enough to get a good description of oficial implementation patterns;
7. Therefore, as said, the knowledge acquisition process (KAP) should start from the
documents and the actual behaviour already in place, and not from any abstract interpretation
of how the process should be;
8. The final result of the project lifecycle is a certified ROPA that can be ofered as a legal
web service on the iExec platform.</p>
        <p>OntoRopa is benefiting from this expanding market of legal web services. The solution for
modelling ROPAs fits into the legal compliance modelling landscape, but we think it is simpler,
and easier to be understood, accepted, and adopted not just by LawTech companies, lawfirms
and corporations, but by oficial drafters, rulers, controllers, and supervisors. There is a need to
comply with GDPR requirements. Hence, OntoRopa can be expanded through a variety of legal
ecosystems, depending on the private or public field of deployment. Table 1 summarises its
goals, which are aligned with the detected issues, and innovation.</p>
      </sec>
      <sec id="sec-4-2">
        <title>3.2. Community</title>
        <p>The target community of users starts with ROPA providers (ROPA controllers). The OntoROPA
ecosystem will support more communities of ROPA users. For example, data protection
supervisors can assess ROPAs. Figure 1 summarizes the flow of ROPAs within these communities in
OntoROPA. However, citizens are not able to assess ROPAs, but to read and query the
information that ROPAs can provide to them about the way their personal data are treated and protected.
A general solution, able to support diferent communities, requires a long-term project. The
ifnal solution entails the creation of a Law Tech legal web service to provide automated ROPAs
to law firms, companies and administrations. This also entails the definition of a business model
that fits into the niche of Data Protection and Privacy Services, as advanced by the European
Digital Markets strategy.</p>
      </sec>
      <sec id="sec-4-3">
        <title>3.3. Components and ontology</title>
        <p>There are two main components in the OntoROPA project: (i) an OWL ontology that collects
the expert knowledge from the target domain (ROPA community) and is the tool directing the
inference processes that support validation and trustworthiness; (ii) and the software artifacts
that process ROPAs.</p>
        <p>OntoROPA proposes the development of a domain ontology formally expressed in OWL
that will be ofered as open data, reliable, reusable, and extensible. This professional ontology
will support the creation and validation of ROPAs. Validation will be twofold: RDF validation
for correctness and OWL validation for completeness. As already stated, the ROPA Ontology
does not only include legal but also professional knowledge extracted from the community of
privacy and data protection experts—mainly including lawyers, legal advisors and scholars, data
protection oficers, and rulers who are proficient in the creation and manipulation of ROPAs.</p>
        <p>As a proof of concept, Figure 2 draws the ROPA RDF description which can be validated for
correctness, and a preliminary ontology sample that demonstrates the reasoning capabilities for
completeness of legal-compliance standard validation. The ontology creation process is based
on metadata and competency questions.</p>
      </sec>
      <sec id="sec-4-4">
        <title>3.4. Architecture diagram</title>
        <p>OntoROPA uses a modular approach, where each module serves a specific functionality. This
modular approach will facilitate OntoROPA resilience to changes in collaborators. For example,
we can either take in charge the Identity module with the development of our own oracle, able
to validate X5094 digital certificates in LDAP services or to use services provided by external
providers and blockchain platforms.</p>
        <p>A very important component of OntoROPA are data: ROPAs, ontologies, and data that helps
to achieve the desired facilities, such as certificates and credentials used for identity verification.
Figure 3 includes the data layer and software modules of OntoROPA. These data are critical for
OntoROPA modules: they are inputs and outputs. More important, they determine the design
of each module. This is a data-driven design. They can be described as follows:
1. Identity:: Legal compliance requires being able to link responsibilities and authorship
to legal entities, real world entities. X.509 certificates will be used. Verification of these
certificates requires to query LDAP directories.
2. Linked RDF ROPAs: The OntoROPA project aims to represent ROPA as RDF graphs,
linked with the OntoROPA ontology, but also to other ROPAs. RDF, linked data, and related
4X.509 certificates are digital certificates that use the widely accepted international X.509 public key infrastructure
(PKI) standard to verify that a public key belongs to the hostname/domain, organization, or individual contained
within the certificate.</p>
        <p>Semantic Web standards provide the tools to represent, share and manage semantics in
technical environments. Storage will rely on the facilities provided by a solution able to
store and manage RDF graphs on blockchain. If not possible, an external RDF store, e.g.</p>
        <p>AllegroGraph, may be needed.
3. Validation: ROPAs should comply with article 30 of the GDPR2 and with the non-written
rules of use that the community of experts, ROPA controllers, follow when they create
them. This knowledge is collected in the OntoROPA ontology. The validation will be
done against the ontology, using the inference capabilities associated to OWL rules and
inference. We would like this validation to be a secure process, not subject to injections.
WebProtégé can be used to reach this objective. The proof of validation will be taken in
charge of-chain by OntoROPA, with its own signature and certificates.
4. Certification : ROPAs’ origins and provenance should be certified. As for the results of
validation, it depends on the viability of secure executions. If the process can be secured
in a blockchain TEE, the blockchain enclave signature should reinforce OntoROPA’s
signature.
5. Proactiveness: The date in which a ROPA is available matters from a legal perspective.</p>
        <p>The immutability properties of blockchain platforms will support this. The transaction
associated to the publication will provide proof of proactiveness.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. A use case scenario</title>
      <sec id="sec-5-1">
        <title>4.1. New ROPA flowchart</title>
        <p>We introduce scenarios as the process of generating a ROPA in the context of the OntoROPA
project. For instance, a person responsible of its creation and maintenance in an organization —
the data privacy oficer in a given university— needs to create and publish a ROPA to describe
personal data treatments in her university. These are the requirements: (i) using standard
vocabularies, (ii) making sure that her ROPA includes the right information as required by
article 30 of GDPR, and (iii) once this is achieved, publishing it and making it available to other
ROPA providers, data protection supervisors, and the public in general (this is mandatory for
Public Administrations). Moreover, she wants to be able to give evidence on the publication
date if the data protection supervisory authority (in Spain, the AEPD; in France, the CNIL, etc.)
launches an inspection after critical situations such as data breaches 5. The data privacy oficer
may use the application providing the way of creating a ROPA.</p>
        <p>There are two main possibilities: (i) Import ROPA: A ROPA is already available as a pdf or
excel sheet. This ROPA is imported; (ii) New ROPA: A ROPA is created from the beginning.</p>
        <p>We will elaborate on the second one: A ROPA provider wants to create a new RDF ROPA to
describe the activities dealing with personal data. Figure 4 shows an overview of the process
lfow:
1. The first step is to create the RDF file describing the ROPA.
2. The second step is to validate the ROPA and check that it contains the right information
as requested by the GDPR.
3. Once it is ready for publication, its quality is certified.
4. The certified ROPA is published.</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. Functional requirements</title>
        <p>OntoROPA functional requirements are summarised in Table 2. The main functionalities are
creating, editing, and deleting a ROPA. But there are also some additional functionalities derived
from the goals of providing legal validity to ROPAs: validation, signing, certification. Users
who are authorized to create, edit, and publish ROPAs should be able to identify themselves.
5The GDPR sets the obligation of keeping available ROPAs for inspections if required by the data protection supervisor
authority. Moreover, it introduces the concept of proactiveness, which means that (i) privacy by default and by
design have been applied from the very beginning, (ii) that the security measures have been implemented, and
(iii) the information about personal data activities is available. ROPAs are the records collecting this information.
Therefore, ROPAs must be available while personal data treatment develops. Some data protection experts are
concerned about the possibility that ROPAs are generated after the supervisor’s request.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Legal values</title>
      <sec id="sec-6-1">
        <title>5.1. Return on Investment in Legal Compliance</title>
        <p>Legal Compliance is essential in organizations to ensure compliance with their Codes of Conduct,
as consumers demand products and services provided with ”ethical and sustainable” behaviours.
They often access social networks to publicly denounce those companies that do not meet
their commitments, resulting in serious reputational damage and significant sales drops.
Noncompliance with these obligations is punished with a range of sanctions ranging from heavy
ifnes to professional disqualification or cessation of activity, as well as irreparable reputational
damage.</p>
        <p>There are three indicators that can help quantify a return on investment in legal compliance: (i)
increased competence and eficiency within the organization; (ii) savings by reducing legal risks
and prevention of sanctions; (iii) generation of better business opportunities. With automated
and standardized toolkits, it becomes easier to meet the requirements of ISO 270016 and ENS
(Esquema Nacional de Seguridad)7. ROPA controllers can benefit from having a standard tool
to simplify the task of creating their own ROPAs, and the possibility to adapt/extend it to their
own use cases.</p>
      </sec>
      <sec id="sec-6-2">
        <title>5.2. Legal validity</title>
        <p>Legal validity (i.e. ‘legality’) is not equivalent to computational or logical validity. ROPA
validation refers to the accuracy, traceability and technical reproductivity of the process that
has generated it. It can be reached through the ontology.</p>
        <p>However, this is not turning ROPAS into valid processes with legal outcomes and efects.
Automated legal validity should be carried out aligning: (i) the selection of relevant legal sources
in a transparent, shareable, and acceptable way, according to the main legal doctrine, (ii) the
normative interpretation process that is accepted by oficial bodies, such as Data Protection
agencies, (iii) as a last resort, the normative interpretation process that is accepted by regional,
national, and European judiciaries. There are a variety of normative and regulatory sources
that should be considered.</p>
        <p>To ease the process of handling them we have defined them into four legal diferent clusters: (i)
Hard law (laid down by Parliaments and the Judiciary (this includes European Regulations, such
as the GDPR, and the Directives that have been transposed into the national legal systems by the
State members); (ii) soft law (such as international agreements and covenants, mandatory after
mutual or collective agreements); (iii) policies (issued by European and national governments
to developing, enforcing, and implementing Acts, Regulations, and case-based law sentences),
(iv) ethical principles and values, as they have been discussed, proposed and accepted in specific
sectors (such as the recent EU guidelines for Artificial Intelligence).</p>
        <p>Besides legislation, it is worth noting that the legal value–i.e. legal validity–is created
through a process that fosters legal security and social trust among all stakeholders in the
market (including companies, corporations, administrations and citizens). Then, ISO standards
and technical protocols (such as the W3C standards and recommendations) matter. As stated
by EU recent strategies, better regulation principles involving Impact Assessments and citizens’
consultations, and the introduction of digital currencies as a basis for the EU digital market
fosters the general use of specific policies and best practices that benefit from the experiences
already gathered.</p>
        <p>
          OntoROPA embraces the middle-out approach to AI governance set by the AI4People Report
to the EU Parliament (November 2019)8. It can be defined as the middle-ground between
top-down and bottom-up regulatory approaches, fostering co-regulation, co-responsibility and
dialogue between rulers and the subjects of regulation [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]. Certified and validated ROPAs
are followed by a proof of contribution and a smart contract linking users, controllers, and
supervisors, in between blockchain and the community of users.
        </p>
        <p>
          It is worth mentioning that law or its digital version, legal governance systems [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], do not
constitute in OntoROPA a third layer on top of the data layer and the software layer defined
above (section 2). There is no legal layer consisting mainly in documents that can be deemed
‘legal’. What it does exist instead is a dynamic set of normative systems, guidelines, values,
policies, standards, and best practices that integrate a complex cognitive system embedded into
human behaviour and (now) information systems.
8https://www.eismd.eu/wp-content/uploads/2019/11/AI4Peoples-Report-on-Good-AI-Governance_compressed.pdf
        </p>
        <p>This dynamic set constitutes a dimension of human and artificial systems and interfaces. It
pervades the software and the data layer from inside out. This is why a middle out approach
can be the most appropriate to generate the legal ecosystem that is needed to validate ROPAS
and ROPAS’ computational management in both senses—technological and legal. There are two
layers—software and data layer—and three dimensions—technological, social, and legal. The
links between them occur stemming from the secured process to produce a certified and legally
valid ROPA.</p>
        <p>The OntoROPA legal ecosystem is generated by the set of technical requirements and social
and legal conditions that are taken into account by controllers, supervisors, professional agents
in the marketplace (legal web services, law firms and companies). Thus, the certification and
validation processes involve the participation of all stakeholders. Again, technical requirements
do not reflect per se the social and legal conditions. They are reached through (i) the mutual
understanding of regulations, i.e. the shared agreement on the rights and duties set by the
regulatory system (legislation, policies, best practices, and ethics), (ii) the mutual understanding
of the position of all agents participating in the process, (iii) the mutual understanding of all
necessary actions to be taken to make the final product ‘legal’. This is where the legal validity
of certification comes from. Certification and validation processes do not stand by their own:
They are necessary components of the legal ecosystem generated through the coordination of
all required elements, as shown in Figure 6.</p>
        <p>
          The use of blockchain technologies has generated some controversies about its compatibility
with GDPR requirements. Permissionless blockchains are distributed, decentralised
peer-topeer networks in which everyone can participate interacting with unknown counterparties,
trusted or not [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. The clear allocation of responsibilities that is required by GDPR are not
present in this situation, as assessed by Michèle Fink’s study for the European Parliament
on blockchain and data protection [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]. The study recommends closing agreements between
regulators and the private sector, and the elaboration of codes of conduct and certification
mechanisms for blockchain technologies that should be “compliant by design”. These risks have
been singled out for ROPAs’ implementation mechanisms [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ]. In addition, as stated by the
French Commission Nationale de l’Informatique et des Libertés (CNIL), there are legal risks
that arise from this situation, i.e. uncertainty, blurred identification of liable stakeholders, and
lack of a clear allocation of duties in case of multiple controllers. We do not have the solution
yet for all the issues, but focusing on transactions and having in mind the certification process
helps to sort them out.
        </p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>6. Conclusions and Future Work</title>
      <p>The OntoROPA project is law and data driven. ROPAs are deemed to be a critical piece of legal
compliance from a social perspective, for they are the only available source of information
accessible to non-technical people (including citizens, judges, rulers, law experts, data protection
users, and supervisors). Thus, this fact makes them a critical piece for GDPR compliance for all
stakeholders—providers, controllers, supervisors, and companies. This is a market niche. As a
result, we figured out a legal governance system that facilitates a soft orchestration of hard law,
soft law, ethics, and policies.</p>
      <p>This also is work in progress. Some steps have been advanced in the implementation process,
e.g. the transformation of ROPAs to designed semantic schemas has been tested, the first version
of the ontology has been already built, and some tests with tools that can be used to provide
trust have been carried out. There is still room for improvement. The design of blockchain
tools, and the implementation of AI algorithms that will validate ROPAs against the ontology
will be developed in the next future.</p>
    </sec>
    <sec id="sec-8">
      <title>7. Acknowledgments</title>
      <p>This project has received funding from the European Union’s Horizon 2020 research and
innovation programme under grant agreement No 957338, NGI OntoChain - Trusted, traceable
and transparent ontological knowledge on blockchain.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>O.</given-names>
            <surname>Akhigbe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Amyot</surname>
          </string-name>
          , G. Richards,
          <article-title>Information technology artifacts in the regulatory compliance of business processes: A meta-analysis</article-title>
          , in: M.
          <string-name>
            <surname>Benyoucef</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Weiss</surname>
            , H. Mili (Eds.), E-Technologies - 6th International Conference,
            <given-names>MCETECH</given-names>
          </string-name>
          <year>2015</year>
          ,
          <article-title>Montréal</article-title>
          ,
          <string-name>
            <surname>QC</surname>
          </string-name>
          , Canada, May
          <volume>12</volume>
          -15,
          <year>2015</year>
          , Proceedings, volume
          <volume>209</volume>
          <source>of Lecture Notes in Business Information Processing</source>
          , Springer,
          <year>2015</year>
          , pp.
          <fpage>89</fpage>
          -
          <lpage>104</lpage>
          . URL: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -17957-
          <issue>5</issue>
          _6. doi:
          <volume>10</volume>
          .1007/978- 3-
          <fpage>319</fpage>
          - 17957- 5\_6.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Casanovas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>González-Conejero</surname>
          </string-name>
          , L. de Koker,
          <article-title>Legal Compliance by Design (LCbD) and through Design (LCtD): Preliminary Survey</article-title>
          , in: V.
          <string-name>
            <surname>Rodríguez-Doncel</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Casanovas</surname>
          </string-name>
          , J. González-Conejero (Eds.),
          <source>Proceedings of the 1st Workshop on Technologies for Regulatory Compliance co-located with the 30th International Conference on Legal Knowledge and Information Systems (JURIX</source>
          <year>2017</year>
          ), Luxembourg, December
          <volume>13</volume>
          ,
          <year>2017</year>
          , volume
          <volume>2049</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>49</lpage>
          . URL: https: //ceur-ws.
          <source>org/</source>
          Vol-2049/05paper.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>O.</given-names>
            <surname>Akhigbe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Amyot</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Richards</surname>
          </string-name>
          ,
          <article-title>A systematic literature mapping of goal and non-goal modelling methods for legal and regulatory compliance</article-title>
          ,
          <source>Requir. Eng</source>
          .
          <volume>24</volume>
          (
          <year>2019</year>
          )
          <fpage>459</fpage>
          -
          <lpage>481</lpage>
          . URL: https://doi.org/10.1007/s00766-018-0294-1. doi:
          <volume>10</volume>
          .1007/s00766-018-0294-1.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Hashmi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Governatori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Lam</surname>
          </string-name>
          , M. T. Wynn,
          <article-title>Are we done with business process compliance: state of the art and challenges ahead</article-title>
          ,
          <source>Knowledge and Information Systems</source>
          <volume>57</volume>
          (
          <year>2018</year>
          )
          <fpage>79</fpage>
          -
          <lpage>133</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10115-017-1142-1.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>L.</given-names>
            <surname>Floridi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Cowls</surname>
          </string-name>
          ,
          <article-title>A Unified Framework of Five Principles for AI in Society</article-title>
          ,
          <source>Harvard Data Science Review</source>
          <volume>1</volume>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1162/99608f92.8cd550d1.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>N. F.</given-names>
            <surname>Noy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. D.</given-names>
            <surname>Hafner</surname>
          </string-name>
          ,
          <article-title>Ontological Foundations for Experimental Science Knowledge Bases, Appl</article-title>
          . Artif. Intell.
          <volume>14</volume>
          (
          <year>2000</year>
          )
          <fpage>565</fpage>
          -
          <lpage>618</lpage>
          . URL: https://doi.org/10.1080/ 08839510050076972. doi:
          <volume>10</volume>
          .1080/08839510050076972.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fernández-López</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gómez-Pérez</surname>
          </string-name>
          ,
          <string-name>
            <surname>N.</surname>
          </string-name>
          <article-title>Juristo, METHONTOLOGY: From Ontological Art Towards Ontological Engineering</article-title>
          , in
          <source>: AAAI Conference on Artificial Intelligence</source>
          ,
          <year>1997</year>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>40</lpage>
          . URL: https://oa.upm.es/5484/.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Ryan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Pandit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Brennan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Common</given-names>
            <surname>Semantic</surname>
          </string-name>
          <article-title>Model of the GDPR Register of Processing Activities</article-title>
          ,
          <source>CoRR abs/2102</source>
          .00980 (
          <year>2021</year>
          ). URL: https://arxiv.org/abs/2102.00980. arXiv:
          <volume>2102</volume>
          .
          <fpage>00980</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>B.</given-names>
            <surname>Esteves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rodríguez-Doncel</surname>
          </string-name>
          ,
          <article-title>Analysis of ontologies and policy languages to represent information flows in GDPR, Semantic Web 1 (</article-title>
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .3233/SW-223009.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Nedelchev</surname>
          </string-name>
          ,
          <article-title>Origin and Definition of RegTech, Economics</article-title>
          and Management (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .37708/em.swu.
          <source>v17i1.1.</source>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>A. D. Kristanto</surname>
            ,
            <given-names>A. A.</given-names>
          </string-name>
          <string-name>
            <surname>Arman</surname>
          </string-name>
          ,
          <string-name>
            <surname>Towards A Smart Regulatory</surname>
            <given-names>Compliance</given-names>
          </string-name>
          ,
          <source>The Capabilities of RegTech and SupTech</source>
          ,
          <source>2022 International Conference on Information Technology Systems and Innovation (ICITSI)</source>
          (
          <year>2022</year>
          )
          <fpage>300</fpage>
          -
          <lpage>309</lpage>
          . doi:
          <volume>10</volume>
          .1109/ICITSI56531.
          <year>2022</year>
          .
          <volume>9970801</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>P.</given-names>
            <surname>Casanovas</surname>
          </string-name>
          , Inteligencia Artificial y Derecho:
          <article-title>La doble implosión de las profesiones y servicios jurídicos en la era digital</article-title>
          , Centro de Investigaciones Sociológicas (CIS), Madrid,
          <year>2022</year>
          , pp.
          <fpage>83</fpage>
          -
          <lpage>114</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>G.</given-names>
            <surname>Boella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. C.</given-names>
            <surname>Tosatto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ghanavati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hulstijn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Humphreys</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Muthuri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rifaut</surname>
          </string-name>
          ,
          <string-name>
            <surname>L. van der Torre</surname>
          </string-name>
          ,
          <article-title>Integrating Legal-URN and Eunomos: Towards a Comprehensive Compliance Management Solution</article-title>
          , in: International Workshop on AI Approaches to the
          <source>Complexity of Legal Systems, AICOL 2013, Lecture Notes in Computer Science</source>
          , volume
          <volume>8929</volume>
          , Springer, Berlin,
          <year>2013</year>
          , pp.
          <fpage>130</fpage>
          -
          <lpage>144</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>662</fpage>
          -45960-7_
          <fpage>10</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A. Z.</given-names>
            <surname>Wyner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Governatori</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          <article-title>Study on Translating Regulatory Rules from Natural Language to Defeasible Logics</article-title>
          , in: P.
          <string-name>
            <surname>Fodor</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Roman</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Anicic</surname>
            ,
            <given-names>A. Z.</given-names>
          </string-name>
          <string-name>
            <surname>Wyner</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Palmirani</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Sottara</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Lévy</surname>
          </string-name>
          (Eds.),
          <source>Joint Proceedings of the 7th International Rule Challenge</source>
          ,
          <article-title>the Special Track on Human Language Technology and the 3rd RuleML Doctoral Consortium</article-title>
          , Seattle, USA, July
          <volume>11</volume>
          -
          <issue>13</issue>
          ,
          <year>2013</year>
          , volume
          <volume>1004</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2013</year>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1004</volume>
          /paper16.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Humphreys</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Boella</surname>
          </string-name>
          , L. van der Torre, L. Robaldo,
          <string-name>
            <given-names>L. D.</given-names>
            <surname>Caro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ghanavati</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Muthuri</surname>
          </string-name>
          ,
          <article-title>Populating legal ontologies using semantic role labeling</article-title>
          ,
          <source>Artif. Intell. Law</source>
          <volume>29</volume>
          (
          <year>2021</year>
          )
          <fpage>171</fpage>
          -
          <lpage>211</lpage>
          . URL: https://doi.org/10.1007/s10506-020-09271-3. doi:
          <volume>10</volume>
          .1007/s10506-020-09271-3.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Waddington</surname>
          </string-name>
          , Rules as Code,
          <article-title>Law in Context. A Socio-</article-title>
          legal
          <string-name>
            <surname>Journal</surname>
          </string-name>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          . 26826/law-in-context.
          <year>v37i1</year>
          .
          <fpage>134</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>U.</given-names>
            <surname>Pagallo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Casanovas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Madelin</surname>
          </string-name>
          ,
          <article-title>The middle-out approach: assessing models of legal governance in data protection, artificial intelligence, and the Web of Data, The Theory and Practice of Legislation 7 (</article-title>
          <year>2019</year>
          )
          <fpage>1</fpage>
          -
          <lpage>25</lpage>
          . doi:
          <volume>10</volume>
          .1080/20508840.
          <year>2019</year>
          .
          <volume>1664543</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>P.</given-names>
            <surname>Casanovas</surname>
          </string-name>
          , L. de Koker, M. Hashmi, Law,
          <string-name>
            <surname>Socio-Legal</surname>
            <given-names>Governance</given-names>
          </string-name>
          ,
          <source>the Internet of Things, and Industry 4</source>
          .0:
          <string-name>
            <given-names>A</given-names>
            <surname>Middle-Out/</surname>
          </string-name>
          Inside-Out
          <string-name>
            <surname>Approach</surname>
            ,
            <given-names>J</given-names>
          </string-name>
          (
          <year>2022</year>
          ). doi:doi.org/10. 3390/j5010005.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>M. M. Martínez-González</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Casanovas</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-L. Alvite-Díez</surname>
            ,
            <given-names>I. Gutierrez</given-names>
          </string-name>
          , N. Casellas, OntoROPA D1:
          <article-title>State of the Art and Ambition</article-title>
          ,
          <source>Technical Report</source>
          , European Commission,
          <source>OntoChain (Grant 957338)</source>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .5281/zenodo.4930187.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>E.</given-names>
            <surname>Cirone</surname>
          </string-name>
          ,
          <article-title>Blockchain and the General Data Protection Regulation: an irreconcilable regulatory approach?</article-title>
          ,
          <source>Queen Mary Law Journal</source>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .26494/qmlj3939.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>M. M. Martínez-González</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Casanovas</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-L. Alvite-Díez</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Casellas</surname>
            ,
            <given-names>I. Gutierrez</given-names>
          </string-name>
          , OntoROPA D2:
          <article-title>Proposed Design Specification and Approach</article-title>
          ,
          <source>Technical Report</source>
          , European Commission,
          <source>OntoChain (Grant 957338)</source>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .5281/zenodo.4930887.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>