The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division.

Slides:



Advertisements
Similar presentations
Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie.
Advertisements

Who We Are IPS CONSULTANTS AND ASSOCIATES. started as a group of professionals in legal, administrative and fiscal areas with more than 15 years of experience.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
Code of Ethics for Professional Accountants
HIPAA – Privacy Rule and Research USCRF Research Educational Series March 19, 2003.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Privacy Laws & Higher Education. Agenda 1.Five Privacy Laws a.FERPA b.HIPAA c.GLB d.FACTA Disposal Rule e.CAN-SPAM 2.Overview of the Laws a.What does.
1 Practical Ethics: Following the MTA’s Code of Ethics in the Real World A Webinar Presentation March 13, 2007 – Charles Comer, CMT.
Privacy and the Right to Know Grayson Barber, Esq. Grayson Barber, LLC.
Discussion on SA-500 – AUDIT EVIDENCE
Chapter 20 Additional Assurance Services: Other Information
Assurance, Attestation, and Internal Auditing Services
©2008 Prentice Hall Business Publishing, Auditing 12/e, Arens/Beasley/Elder The Demand for Audit and Other Assurance Services Chapter 1.
Privacy and Contextual Integrity: Framework and Applications Adam Barth, Anupam Datta, John C. Mitchell (Stanford), and Helen Nissenbaum (NYU) TRUST Winter.
Developing a Records & Information Retention & Disposition Program:
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
©2006 Prentice Hall Business Publishing, Auditing 11/e, Arens/Beasley/Elder Other Assurance Services Chapter 25.
©2003 Prentice Hall Business Publishing, Auditing and Assurance Services 9/e, Arens/Elder/Beasley Other Assurance Services Chapter 24.
ACFID CODE OF CONDUCT Changes to the Code Effective Jan 2015.
Office of Inspector General (OIG) Internal Audit
FAMILY EDUCATIONAL RIGHTS AND PRIVACY ACT Electronic Signatures This work is the intellectual property of the author. Permission is granted for this material.
Office of Safe and Drug-Free Schools Advisory Committee Meeting February 21, 2007.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
Internal Auditing and Outsourcing
Banks and the Privacy of Medical Information 8 th National HIPAA Summit March 8, 2004 Joy Pritts, JD Health Policy Institute Georgetown University
HIPAA Trading Partners, Legal Relationships October 2, 2001 presented by Peter B. Goldstein, Esq. Cap Gemini Ernst & Young, US LLC.
Joan L. Lucas – General Counsel
Payment Systems Debit Cards. Basic Concepts Cross between checking system and credit card system –No extension of credit; money must be in account at.
Institutional Research Compliance Juliann Tenney, JD Research Compliance and Privacy Officer Director, Institutional Research Compliance Program.
M. ANGELA JIMENEZ 1 UNIT 5. REGULATION OF EXTERNAL AUDIT IFAC AND E.C.
Chapter 07 Internal Control McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Privacy and Security Laws for Health Care Organizations Presented by Robert J. Scott Scott & Scott, LLP
Internal Control in a Financial Statement Audit
Agency Risk Management & Internal Control Standards (ARMICS)
HIPAA & Public Schools New Federalism in a New Century The Challenges of Administering HIPAA in Public Schools ASTHO/NGA Center Joint Audioconference September.
Michael R. Costa, Esq., M.P.H. Greenberg Traurig, LLP One International Place, 3 rd Floor Boston, MA (fax)
School of Computing FACULTY OF ENGINEERING Developing a methodology for building small scale domain ontologies: HISO case study Ilaria Corda PhD student.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Sharing Information With Affiliates and Third Parties F. Jay Meyer Vice President & Senior Counsel TD Bank, N.A. Portland, Maine.
Managerial Accounting and the Business Environment Class One.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved. Ch 8 Privacy Law and HIPAA.
1 Internal Audit. 2 Definition Is an independent activity established by management to examine and evaluate the organization’s risk management processes.
Financial Exploitation Legal. § 108A ‑ 102. Duty to report; content of report; immunity. Legal Section (a) Any person having reasonable cause to believe.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
A Professional Corporation Stinson, Mag & Fizzell (402) Business Associates 101 Jennifer Wolfe Jerram, B.S.N., J.D.
Discussion of Ethics & Campaign Finance Reform Packet Presented by Thomas B. Drage, Jr., County Attorney, and Dana Crosby, Assistant County Attorney June.
PSC INTOSAI Professional Standards Committee The auditing function of Supreme Audit Institutions A systematic mapping of the auditing assignments of selected.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin 6-1 Chapter Six Internal Control in a Financial Statement Audit.
Compliance Audit Subcommittee Reporting Work Plan Copenhagen, Denmark 6th of May 2010.
Copyright © 2015 by Saunders, an imprint of Elsevier Inc. All rights reserved. Chapter 3 Privacy, Confidentiality, and Security.
Sharing Information (FERPA) FY07 REMS Initial Grantee Meeting December 5, 2007, San Diego, CA U.S. Department of Education, Office of Safe and Drug-Free.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Internal Audit Section. Authorized in Section , Florida Statutes Section , Florida Statutes (F.S.), authorizes the Inspector General to review.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Chapter 6 Internal Control in a Financial Statement Audit McGraw-Hill/IrwinCopyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
IT Audit Processes and Audit
The Demand for Audit and Other Assurance Services
Service Organization Control (SOC)
Chapter 20 Additional Assurance Services: Other Information
APP entities (organisations)
The Demand for Audit and Other Assurance Services
Reporting by Auditors under the Companies Act, 2013
Current Privacy Issues That May Affect Your Credit Union
Other Assurance Services
Chapter 20 Additional Assurance Services: Other Information
Analysis of Privacy and Data Protection Laws and Directives
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
A Presentation to: Wisconsin Government Finance Officers Association
Presentation transcript:

The Use of Legal Ontologies in the Development of a System for Continuous Assurance of Privacy Policy Compliance * Bonnie W. Morris, Ph.D. CPA Division of Accounting Srinivas Kankanahalli, Ph.D. Lane Department of Computer Science & Electrical Engineering West Virginia University *Funded in part by Lockheed Martin’s Radiant Trust Center of Excellence Program

Outline of Presentation  Motivation  Research Plan and Background  Our Work in Progress  Future Research Directions

Motivation for the Research  The Public is Concerned About Privacy and Infringement of Civil Liberties  Managing Privacy Policy Compliance is a Difficult Problem  There is a Demand for Assurance of Compliance with Privacy Laws and Policies

Public Concern  A 2002 survey by the Center for Survey Research & Analysis at the U Conn for the First Amendment Center and American Journalism Review found: 81% reported that the right to privacy was "essential.” (Up from 78% in 1997.)  In 2001, 72% of voters in North Dakota voted to re- instate “opt-in” privacy protections for financial information  In a 2000 survey, the Pew Internet & American Life Project found that: 86% support opt-in privacy policies before companies use personal information. Source:

Managing Privacy Compliance is Difficult!  U.S. laws are a “patchwork” –US PATRIOT Act –Gramm-Leach-Bliley Act –HIPAA –ECA –Video Privacy Act!  Many organizations also are subject to international privacy laws, such as the EU’s Data Protection Act.

Demand for Assurance  Senator Lieberman, chair of the Senate Governmental Affairs Committee, requested a GAO audit of four government agencies’ compliance with privacy laws and directives.

Demand for Assurance, continued  A survey by Harris Interactive, February 19, 2002 found that –most consumers do not trust business to handle their personal information properly –84% responded that independent verification of company privacy policies should be a requirement. Source:

Continuous or On-Demand Assurance? It probably doesn’t matter. The same infrastructure is required for both.

Research Plan and Background

Organizational, architectural, and system design changes are needed to support continuous assurance  A method of marking up or tagging data elements that are subject to privacy policies  Mapping of natural language text-based statutes and policies into rules implemented in a computer system  Maybe a “black box” to document access and sharing of personal information and to record audit tests.

Mapping Policy to Rules It is common practice when developing KBS to first build an intermediate or conceptual model before building a symbolic level model. –Aids in verification and validation –Supports future maintenance –Aids in the reuse. Source: Visser, et al. 1997

Legal Ontology-Definitions  An ontology is an explicit conceptualization of a domain (Gruber, 1992)  A legal ontology is a conceptualization of laws or statutes, in general.  A statute-specific ontology is the instantiation of a legal ontology for a specific statute.

Research Approach  Identify the target statute  Pick an ontology  Separate control knowledge from domain knowledge  Pass through the appropriate sections of the statute to identify the vocabulary, taxonomy, and typology needed to instantiate the ontology--this is an iterative process

Our Work in Progress: Develop a Statute Specific Ontology for the Gramm-Leach-Bliley Act Using the Van Kralingen Legal Ontology (1995)

Van Kralingen Ontology (1995) A frame-based ontology  Norms  Acts  Concepts

Norms are the rules or standards with which an entity must comply. Generally, a norm is expressed by a statement that something “ought to,” “ought not to,” “may,” or may not be done.

Norm frame  Identifier  Norm type  Source  Range of applicability  Conditions of applicability  Persons subject to the norm  Modality (ought, ought not, may, may not…)  Act identifier

Acts are events or processes that cause changes in the state of the world. An event causes an immediate change. A process has duration, over which change occurs.

Act Frame  Identifier  Type  Source of the description  Agents involved in the act  Means (objects used)  Manner in which the act was performed  Timing  Location  Circumstances  Cause (reason to perform act)  Aim  Intent  Final state that derives from the act

Concepts are used to determine the meaning of a notion. Concepts may be definitions or “deeming provisions.” (A deeming provision is a legal fiction, that is, a statement that under certain circumstances something that is not true will be deemed to be true. )

Concepts  Concept name  Concept type  Priority or weight assigned to it  Source of the concept description  Range of applicability  Conditions of applicability  List of instances of the concept

Identifying Statute Specific Vocabulary (Bench-Capon and Coenen, 1992)  Words denoting –actions –agents –objects  Words indicating –time –place –source –legal modality  Words assigning properties to other entities  Words expressing relations  Words marking textual constructions  Words marking arithmetic operations

A Partial Example of the Instantiation of the Ontology

Gramm-Leach-Bliley Act 15 USC, Subchapter I, Sec Disclosure of Nonpublic Personal Information source: “(d) Limitations on the sharing of account number information for marketing purposes A financial institution shall not disclose, other than to a consumer reporting agency, an account number or similar form of access number or access code for a credit card account, deposit account, or transaction account of a consumer to any nonaffiliated third party for use in telemarketing, direct mail marketing, or other marketing through electronic mail to the consumer.”

Concepts (definitions)  Financial institution (Agent)  Third party (Agent) (Affiliated, Nonaffiliated,Consumer reporting agency,…)  Financial account (Object) (credit card, deposit account, transaction account)  Account Identifier (Object) (account number, access code, access number,…)  Marketing (Cause) (telemarketing, direct mail marketing, marketing,…)

Act  Act Identifier: Share account number information for marketing purposes  Agents: Financial institutions subject to GLBA  Act: Agent discloses account identifier to third party  Cause: Marketing

Norm  Subject: Financial Institutions subject to GLBA  Conditions: Third party is non-affiliated and not a consumer credit agency  Legal Modality: Shall not  Act: Share account number information for marketing purposes

Control Knowledge  The need to select an action to resolve a conflict is called the control problem (Hayes-Roth, 1988)  Strategies for selecting the action to resolve a conflict is called solving the control problem  Knowledge used to solve the control problem is called control knowledge

GLBA Control Problem The GLBA control problem arises because there are rules and exceptions to them. Solved by the legal principle: Lex Specialis Derogat Legi Generali (the conclusion of the exception should be preferred over the conclusion of the general rule)

Future Research  Comparison of statute specific ontologies for other privacy statutes and policies  Implementation issues--including resolution of control problems  Tagging of data elements  Explore the “black box” concept  Temporal reasoning  Exploring the efficacy of using ontologies to help draft policy statements