A distributed requirements management framework for legal compliance and accountability

نویسندگان

  • Travis D. Breaux
  • Annie I. Antón
  • Eugene H. Spafford
چکیده

Increasingly, new regulations are governing organizations and their information systems. Individuals responsible for ensuring legal compliance and accountability currently lack sufficient guidance and support to manage their legal obligations within relevant information systems. While software controls provide assurances that business processes adhere to specific requirements, such as those derived from government regulations, there is little support to manage these requirements and their relationships to various policies and regulations. We propose a requirements management framework that enables executives, business managers, software developers and auditors to distribute legal obligations across business units and/or personnel with different roles and technical capabilities. This framework improves accountability by integrating traceability throughout the policy and requirements lifecycle. We illustrate the framework within the context of a concrete healthcare scenario in which obligations incurred from the Health Insurance Portability and Accountability Act (HIPAA) are delegated and refined into software requirements. Additionally, we show how auditing mechanisms can be integrated into the framework and how auditors can certify that specific chains of delegation and refinement decisions comply with government regulations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Validating Existing Requirements for Compliance with Law Using a Production Rule Model

To ensure legal compliance, requirements engineers need tools to validate existing requirements for compliance with relevant law. This paper proposes an approach to aid in validating software requirements for legal compliance. The approach employs a production rule model for the United States Health Insurance Portability and Accountability Act (HIPAA) that can be queried by requirements enginee...

متن کامل

Towards a Framework for Semantic Business Process Compliance Management

Processes count to the most important assets of companies. Ensuring the compliance of processes to legal regulations, governance guidelines, and strategic business requirements is a sine qua non condition to controlling business behavior. Implementing business process compliance requires means for modeling and enforcing compliance measures. In this work, we motivate the need for automation in c...

متن کامل

Triage for Legal Requirements

The high cost of non-compliance with laws and regulations that govern software systems makes legal requirements prioritization crucial. In addition, software design, expense, and time constraints all influence how requirements are prioritized. Prioritizing requirements derived from laws and regulations can be untenable using traditional pairwise requirements prioritization techniques because th...

متن کامل

The impact of non-compliance with the legal requirements for disclosure of information on securities transaction

Due to the specific characteristics of securities, in securities contracts it is difficult for the investors to have the information which is necessary for entering into the contract. Accordingly, in accordance with the Securities Market Act and the relevant regulations, the issuers of securities, in the primary and secondary markets, are required to disclose material information about securiti...

متن کامل

A HIPAA strategy for dental schools.

Certain health care organizations, including dental schools, should be readying themselves to comply with the numerous requirements described within the administrative simplification section of the Health Insurance Portability and Accountability Act of 1996 (HIPAA). The intent of administrative simplification is to streamline the management of health care transactions while protecting the priva...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computers & Security

دوره 28  شماره 

صفحات  -

تاریخ انتشار 2009