PMRM-v1.0-cs02 - Privacy by Design - Template
PMRM-v1.0-cs02 - Privacy by Design - Template
1
11 Note: We understand the important distinction between ‘Personal Information’ (PI) and ‘Personally-Identifiable
12 Information’ (PII) and that in specific contexts a clear distinction must be made explicitly between the two, which
13 should be reflected as necessary by users of the PMRM. However, for the purposes of this document, the term ‘PI’
14 will be used as an umbrella term to simplify the specification. Section 9.2 Glossary addresses the distinctions
15 between PI and PII.
16
17 PMRM-v1.0-cs02 17 May 2016
18 Standards Track Work Product Copyright © OASIS Open 2016. All Rights Reserved. Page 6 of 37
213
214 Note: It is strongly recommended that Section 9 Operational Definitions for Privacy Principles and
215 Glossary is read before proceeding. The Operational Privacy Principles and the Glossary are key to a
216 solid understanding of Sections 2 through 8.
249 It is also important to note that in this environment agreements may not be enforceable in certain
250 jurisdictions. And a dispute over jurisdiction may have significant bearing over what rights and duties the
251 participants have regarding use and protection of PI. Even the definition of PI will vary. The PMRM may
252 be useful in addressing these issues. Because data can in many cases easily migrate across
253 jurisdictional boundaries, rights cannot necessarily be protected without explicit specification of what
254 boundaries apply. Proper use of the PMRM will however expose the realities of such environments
255 together with any rules, policies and solutions in place to address them.
352
353 Figure 1 – The PMRM Model - Achieving Comprehensive Operational Privacy
354
355 The PMRM, as a methodology covers a series of tasks, outlined in the following sections of the
356 document, concerned with:
357 defining and describing the scope of the Use Cases, either broad or narrow;
358 identifying particular business Domains and understanding the roles played by all participants and
359 systems within the Domains in relation to privacy policies;
360 identifying the data flows and Touch Points for all personal information within a Domain or Domains;
361 specifying various Privacy Controls;
362 identifying the Domains through which PI flows and which require the implementation of Privacy
363 Controls;
364 mapping Domains to the Services and Functions and then to technical and procedural Mechanisms;
365 performing risk and compliance assessments;
366 documenting the PMA for future iterations of this application of the PMRM, for reuse in other
367 applications of the PMRM, and, potentially, to inform a Privacy Architecture.
368 The specification defines a set of Services and Functions deemed necessary to implement the
369 management and compliance of detailed privacy policies and Privacy Controls within a particular Use
370 Case. The Services are sets of Functions, which form an organizing foundation to facilitate the
371 application of the model and to support the identification of the specific Mechanisms, which will implement
372 them. They may optionally be incorporated in a broader Privacy Architecture.
373 The set of operational Services (Agreement, Usage, Validation, Certification, Enforcement, Security,
374 Interaction, and Access) is described in Section 4 below and in the Glossary in section 9.2.
375 The core of this specification is expressed in three major sections: Section 2, “Develop Use Case
376 Description and High-Level Privacy Analysis,” Section 3, “Develop Detailed Privacy Analysis,” and
377 Section 4, “Identify Services and Functions Necessary to Support Privacy Controls.” The detailed analysis
378 is informed by the general findings associated with the high level analysis. However, it is much more
379 granular and requires documentation and development of a Use Case which clearly expresses the
380 complete application and/or business environment within which personal information is collected, stored,
381 used, shared, transmitted, transferred across-borders, retained or disposed.
398
399 Figure 2 - The PMRM Methodology
31 2
The boxed examples are not to be considered as part of the normative text of this document.
32 PMRM-v1.0-cs02 17 May 2016
33 Standards Track Work Product Copyright © OASIS Open 2016. All Rights Reserved. Page 13 of 37
477 Task #2: Use Case Inventory
478 Objective Provide an inventory of the business environment, capabilities, applications and policy
479 environment under review at the level of granularity appropriate for the analysis covered
480 by the PMRM and define a High Level Use Case, which will guide subsequent analysis.
481 In order to facilitate the analysis described in the Detailed Privacy Use Case Analysis in
482 Section 3, the components of this Use Case inventory should align as closely as possible
483 with the components that will be analyzed in the corresponding Detailed Privacy Use
484 Case Analysis in Section 4.
485 Note The inventory can include organizational structures, applications and Business
486 Processes; products; policy environment; legal and regulatory jurisdictions; Systems
487 supporting the capabilities and applications; PI; time; and other factors impacting the
488 collection, storage, usage, sharing, transmitting, transferred across-borders, retained or
489 disposed of PI. The inventory should also include the types of data subjects covered by
490 the Use Case together with specific privacy options (such as policy preferences, privacy
491 settings, etc. if these are formally expressed) for each type of data subject.
548 3.1 Identify Participants and Systems, Domains and Domain Owners,
549 Roles and Responsibilities, Touch Points and Data Flows ( Tasks # 5-
550 10)
752 4.1 Services and Functions Needed to Implement the Privacy Controls
753 A set of operational Services and associated Functionality comprise the organizing structure that will be
754 used to establish the linkage between the required Privacy Controls and the operational Mechanisms
755 (both manual and automated) that are necessary to implement those requirements.
756 PMRM identifies eight Privacy Services, necessary to support any set of privacy policies and Controls, at
757 a functional level. The eight Services can be logically grouped into three categories:
758
759 Core Policy: Agreement, Usage
760 Privacy Assurance: Validation, Certification, Enforcement, Security
761 Presentation and Lifecycle: Interaction, Access
762 These groupings, illustrated in Table 1 below, are meant to clarify the “architectural” relationship of the
763 Services in an operational design. However, the functions provided by all Services are available for
764 mutual interaction without restriction.
765
766
Core Policy Privacy Assurance Presentation
Services Services & Lifecycle Services
767
Agreement Validation Certification Interaction
768
Usage Enforcement Security Access
769 Table 1
770 A privacy engineer, system architect or technical manager must be able to define these privacy Services
771 and Functions, and deliver them via procedural and technical Mechanisms. In fact, an important benefit
772 of using the PMRM is to stimulate design and analysis of the specific Mechanisms - both manual and
773 automated - that are needed to implement any set of privacy policies and Controls and their associated
774 Services and Functions. In that sense, the PMRM can be a valuable tool for fostering privacy innovation.
AGREEMENT Defines and documents permissions and rules for the handling of PI based on Manage and negotiate
applicable policies, data subject preferences, and other relevant factors; provides permissions and rules
relevant Actors with a mechanism to negotiate, change or establish new permissions
and rules; expresses the agreements such that they can be used by other Services
USAGE Ensures that the use of PI complies with the terms of permissions, policies, laws, and Control PI use
regulations, including PI subjected to information minimization, linking, integration,
inference, transfer, derivation, aggregation, anonymization and disposal over the
lifecycle of the PI
VALIDATION Evaluates and ensures the information quality of PI in terms of accuracy, Ensure PI quality
completeness, relevance, timeliness, provenance, appropriateness for use and other
relevant qualitative factors
CERTIFICATION Ensures that the credentials of any Actor, Domain, System, or system component are Ensure appropriate
compatible with their assigned roles in processing PI and verifies their capability to privacy management
support required Privacy Controls in compliance with defined policies and assigned credentials
roles.
ENFORCEMENT Initiates monitoring capabilities to ensure the effective operation of all Services. Monitor proper
Initiates response actions, policy execution, and recourse when audit controls and operation, respond to
monitoring indicate operational faults and failures. Records and reports evidence of exception conditions
compliance to Stakeholders and/or regulators. Provides evidence necessary for and report on demand
Accountability. evidence of compliance
where required for
accountability
3
50 See for example the [SOA-RM] and the [SOA-RAF]
51 PMRM-v1.0-cs02 17 May 2016
52 Standards Track Work Product Copyright © OASIS Open 2016. All Rights Reserved. Page 22 of 37
SECURITY Provides the procedural and technical mechanisms necessary to ensure the Safeguard privacy
confidentiality, integrity, and availability of PI; makes possible the trustworthy information and
processing, communication, storage and disposition of PI; safeguards privacy operations
operations
INTERACTION Provides generalized interfaces necessary for presentation, communication, and Information presentation
interaction of PI and relevant information associated with PI, encompassing and communication
functionality such as user interfaces, system-to-system information exchanges, and
agents
ACCESS Enables Data Subjects, as required and/or allowed by permission, policy, or View and propose
regulation, to review their PI that is held within a Domain and propose changes, changes to PI
corrections or deletion for their PI
803 Table 2
899 Task #17: Identify the Services and Functions necessary to support
900 operation of identified Privacy Controls
901 Perform this task for each data flow exchange of PI between Systems and Domains.
902 This detailed mapping of Privacy Controls with Services can then be synthesized into consolidated sets of
903 Service and Functions per Domain, System or business environment as appropriate for the Use Case.
904 On further iteration and refinement, the identified Services and Functions can be further delineated by the
905 appropriate Mechanisms.
906 Task 17 Examples
907 1- “Log EV location” based upon
908 a) Internally Generated PI (Current EV location logged by EV On-Board system)
909 b) Outgoing PI (Current EV location transmitted to Utility Load Scheduler System)
910
911 Convert to operational Services as follows:
912 Usage EV On-Board System checks that the reporting of a particular charging location has
913 been opted-in by EV owner per existing Agreement
938 Task #18: Identify the Mechanisms that Implement the Identified Services
939 and Functions
940 Examples
941 “Log EV Location”
942 Mechanism: Software Vendor’s DBMS is used as the logging mechanism, and includes active
943 data encryption and key management for security.