A distributed requirements management framework for legal compliance and accountability
نویسندگان
چکیده
Increasingly, new regulations are governing organizations and their information systems. Individuals responsible for ensuring legal compliance and accountability currently lack sufficient guidance and support to manage their legal obligations within relevant information systems. While software controls provide assurances that business processes adhere to specific requirements, such as those derived from government regulations, there is little support to manage these requirements and their relationships to various policies and regulations. We propose a requirements management framework that enables executives, business managers, software developers and auditors to distribute legal obligations across business units and/or personnel with different roles and technical capabilities. This framework improves accountability by integrating traceability throughout the policy and requirements lifecycle. We illustrate the framework within the context of a concrete healthcare scenario in which obligations incurred from the Health Insurance Portability and Accountability Act (HIPAA) are delegated and refined into software requirements. Additionally, we show how auditing mechanisms can be integrated into the framework and how auditors can certify that specific chains of delegation and refinement decisions comply with government regulations.
منابع مشابه
Validating Existing Requirements for Compliance with Law Using a Production Rule Model
To ensure legal compliance, requirements engineers need tools to validate existing requirements for compliance with relevant law. This paper proposes an approach to aid in validating software requirements for legal compliance. The approach employs a production rule model for the United States Health Insurance Portability and Accountability Act (HIPAA) that can be queried by requirements enginee...
متن کاملTowards a Framework for Semantic Business Process Compliance Management
Processes count to the most important assets of companies. Ensuring the compliance of processes to legal regulations, governance guidelines, and strategic business requirements is a sine qua non condition to controlling business behavior. Implementing business process compliance requires means for modeling and enforcing compliance measures. In this work, we motivate the need for automation in c...
متن کاملTriage for Legal Requirements
The high cost of non-compliance with laws and regulations that govern software systems makes legal requirements prioritization crucial. In addition, software design, expense, and time constraints all influence how requirements are prioritized. Prioritizing requirements derived from laws and regulations can be untenable using traditional pairwise requirements prioritization techniques because th...
متن کاملThe impact of non-compliance with the legal requirements for disclosure of information on securities transaction
Due to the specific characteristics of securities, in securities contracts it is difficult for the investors to have the information which is necessary for entering into the contract. Accordingly, in accordance with the Securities Market Act and the relevant regulations, the issuers of securities, in the primary and secondary markets, are required to disclose material information about securiti...
متن کاملA HIPAA strategy for dental schools.
Certain health care organizations, including dental schools, should be readying themselves to comply with the numerous requirements described within the administrative simplification section of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The intent of administrative simplification is to streamline the management of health care transactions while protecting the priva...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Computers & Security
دوره 28 شماره
صفحات -
تاریخ انتشار 2009