Managing legal compliance through security requirements across service provider chains: A case study on the German Federal Data Protection Act
نویسندگان
چکیده
Future service customer-provider as well as inter-provider relationships will see the increased application of dynamic service composition providing a broad diversity of functions. However, currently existing deficiencies of processes and tools force service providers and service consumers to trade off profitability against security compliance. This is predominately due to the ignorance or manual resolution of policy and configuration dependencies, caused by distinct terminologies and languages used at both the service provider and service customer. We report on the research design for the Collaborative Security Requirement Management System (CoSeRMaS), a col-laborative and semi-automated tool to manage, define and validate inter organizational requirements. We demonstrate the capabilities of CoSeRMaS to establish and validate the legal compliance that is demanded by the German Bundes Datenschutzgesetz (BDSG) when two or more customers and providers exchange data as part of their service composition.
منابع مشابه
Mapping Legal Requirements to SLAs: An Ontology Based Approach for Cloud-based Service Consumption
This work presents a new approach to ensure compliance to legal regulation in Cloud Computing, especially in Software-as-a-Service. Since high demanding business sectors, such as the health care sector, require high legal certainty, when contracting services offered by external providers. We provide a lightweight ontological representation of the German Federal Data Protection Act (BDSG) and a ...
متن کاملExperiences Running a Web Anonymising Service
The research project “AN.ON – Anonymity online” focuses on developing and providing a web anonymising service. This service provides anonymity and unobservability against external observers, the user‘s ISP and the operators of the service themselves. AN.ON is being promoted by the German Federal Ministry of Economic Affairs for three years (2001-2003). Main criteria for the design of the web an...
متن کاملA Model for Privacy-enhanced Federated Identity Management
Identity federations operating in a business or consumer context need to prevent the collection of user data across trust service providers for legal and business case reasons. Legal reasons are given by data protection legislation such as [1]. Other reasons include business owners becoming increasingly aware of confidentiality risks that go beyond traditional information security, e.g., the nu...
متن کاملHuman Dignity as Leading Principle in Public Health Ethics: A Multi-Case Analysis of 21st Century German Health Policy Decisions
Background There is ample evidence that since the turn of the millennium German health policy made a considerable step towards prevention and health promotion, putting the strategies of ‘personal empowerment’ and ‘settings based approach’ high on the federal government’s agenda. This phenomenon has challenged the role of ethics in health policy. Concurrently, increasing relevance of the Concept...
متن کاملEvaluation of a Security Service Level Agreement
Data breaches are the most serious security breaks among all types of cybersecurity threats. While Cloud hosting services provide assurances against data loss, understanding the security service level agreements (SSLAs) and privacy policies offered by the service providers empowers consumers to assess risks and costs associated with migrating their information technology (IT) operations to the ...
متن کامل