skip to main content
10.1145/3442188.3445925acmconferencesArticle/Chapter ViewAbstractPublication PagesfacctConference Proceedingsconference-collections
research-article
Open access

TILT: A GDPR-Aligned Transparency Information Language and Toolkit for Practical Privacy Engineering

Published: 01 March 2021 Publication History

Abstract

In this paper, we present TILT, a transparency information language and toolkit explicitly designed to represent and process transparency information in line with the requirements of the GDPR and allowing for a more automated and adaptive use of such information than established, legalese data protection policies do.
We provide a detailed analysis of transparency obligations from the GDPR to identify the expressiveness required for a formal transparency language intended to meet respective legal requirements. In addition, we identify a set of further, non-functional requirements that need to be met to foster practical adoption in real-world (web) information systems engineering. On this basis, we specify our formal language and present a respective, fully implemented toolkit around it. We then evaluate the practical applicability of our language and toolkit and demonstrate the additional prospects it unlocks through two different use cases: a) the inter-organizational analysis of personal data-related practices allowing, for instance, to uncover data sharing networks based on explicitly announced transparency information and b) the presentation of formally represented transparency information to users through novel, more comprehensible, and potentially adaptive user interfaces, heightening data subjects' actual informedness about data-related practices and, thus, their sovereignty.
Altogether, our transparency information language and toolkit allow - differently from previous work - to express transparency information in line with actual legal requirements and practices of modern (web) information systems engineering and thereby pave the way for a multitude of novel possibilities to heighten transparency and user sovereignty in practice.

References

[1]
Julio Angulo, Simone Fischer-Hübner, Tobias Pulls, and Erik Wästlund. 2015. Usable Transparency with the Data Track: A Tool for Visualizing Data Disclosures. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems. ACM, New York, NY, USA, 1803--1808. https://doi.org/10.1145/2702613.2732701
[2]
Article 29 Data Protection Working Party. 2017. Guidelines on Transparency under Regulation 2016/679. Technical Report. Directive 95/46/EC of the European Parliament.
[3]
Umang Bhatt, Alice Xiang, Shubham Sharma, Adrian Weller, Ankur Taly, Yunhan Jia, Joydeep Ghosh, Ruchir Puri, José M. F. Moura, and Peter Eckersley. 2020. Explainable Machine Learning in Deployment. In Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency (FAT* '20). Association for Computing Machinery, New York, NY, USA, 648--657. https://doi.org/10.1145/3351095.3375624
[4]
Christoph Bier, Kay Kühne, and Jürgen Beyerer. 2016. PrivacyInsight: The Next Generation Privacy Dashboard. In Privacy Technologies and Policy, Stefan Schiffner, Jetzabel Serna, Demosthenes Ikonomou, and Kai Rannenberg (Eds.). Springer International Publishing, Cham, 135--152.
[5]
Cheng Chang, Huaxin Li, Yichi Zhang, Suguo Du, Hui Cao, and Haojin Zhu. 2019. Automated and Personalized Privacy Policy Extraction Under GDPR Consideration. In Wireless Algorithms, Systems, and Applications, Edoardo S. Biagioni, Yao Zheng, and Siyao Cheng (Eds.). Springer International Publishing, Cham, 43--54.
[6]
Elisa Costante, Jerry den Hartog, and Milan Petković. 2013. What Websites Know About You. In Data Privacy Management and Autonomous Spontaneous Security, Roberto Di Pietro, Javier Herranz, Ernesto Damiani, and Radu State (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 146--159.
[7]
Lorrie Faith Cranor. 2003. P3P: Making privacy policies more useful. IEEE Security & Privacy 1 (2003), 50--55. Issue 6. https://doi.org/10.1109/MSECP.2003.1253568
[8]
European Parliament & Council. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95/46/EC (General Data Protection Regulation).
[9]
Keishiro Fukushima, Toru Nakamura, Daisuke Ikeda, and Shinsaku Kiyomoto. 2018. Challenges in Classifying Privacy Policies by Machine Learning with Word-Based Features. In Proceedings of the 2nd International Conference on Cryptography, Security and Privacy (ICCSP 2018). Association for Computing Machinery, New York, NY, USA, 62--66. https://doi.org/10.1145/3199478.3199486
[10]
Armin Gerl and Bianca Meier. 2019. The Layered Privacy Language Art. 12-14 GDPR Extension-Privacy Enhancing User Interfaces. Datenschutz und Datensicherheit-DuD 43, 12 (2019), 747--752.
[11]
Hamza Harkous, Kassem Fawaz, Rémi Lebret, Florian Schaub, Kang G. Shin, and Karl Aberer. 2018. Polisis: Automated Analysis and Presentation of Privacy Policies Using Deep Learning. In 27th USENIX Security Symposium (USENIX Security 18). USENIX Association, Baltimore, MD, 531--548.
[12]
Hamza Harkous, Kassem Fawaz, Kang G. Shin, and Karl Aberer. 2016. PriBots: Conversational Privacy with Chatbots. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 6.
[13]
Hans Hedbom. 2009. A Survey on Transparency Tools for Enhancing Privacy. In The Future of Identity in the Information Society, Vashek Matyáš, Simonen Fischer-Hübner, Daniel Cvrček, and Petr Švenda (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 67--82.
[14]
Leif-Erik Holtz, Katharina Nocun, and Marit Hansen. 2011. Towards Displaying Privacy Information with Icons. In Privacy and Identity Management for Life, Simone Fischer-Hübner, Penny Duquenoy, Marit Hansen, Ronald Leenes, and Ge Zhang (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 338--348.
[15]
Leif-Erik Holtz, Harald Zwingelberg, and Marit Hansen. 2011. Privacy Policy Icons. Springer Berlin Heidelberg, Berlin, Heidelberg. 279--285 pages. https://doi.org/10.1007/978-3-642-20317-6_15
[16]
Interactive Advertising Bureau (IAB). 2020. TCF - Transparency & Consent Framework. https://iabeurope.eu/transparency-consent-framework/
[17]
ISO IEC 14977 996 E 1996. EBNF Syntax Specification. Standard. International Organization for Standardization, Geneva, CH.
[18]
Milena Janic, Jan Pieter Wijbenga, and Thijs Veugen. 2013. Transparency enhancing tools (TETs): An overview. In Proceedings of the Workshop on Socio-Technical Aspects in Security and Trust, STAST. IEEE, New Orleans, LA, USA, 18--25. https://doi.org/10.1109/STAST.2013.11
[19]
JSON.org. 2020. ECMA-404 The JSON Data Interchange Standard. https://www.json.org/json-en.html
[20]
Ioannis Kakavas. 2016. Creepy. A geolocation OSINT tool. https://www.geocreepy.com/
[21]
Margot Kaminski. 2020. Law and Technology. A recent renaissance in privacy law. Commun. ACM 63, 9 (2020), 24--27. https://doi.org/10.1145/3411049
[22]
Farzaneh Karegar, Tobias Pulls, and Simone Fischer-Hübner. 2016. Visualizing Exports of Personal Data by Exercising the Right of Data Portability in the Data Track - Are People Ready for This? Springer International Publishing, Cham, 164--181. https://doi.org/10.1007/978-3-319-55783-0_12
[23]
Sabrina Kirrane, Javier D. Fernández, Piero Bonatti, Iliana Mineva Petrova, Luigi Sauro, and Eva Schlehahn. 2019. The SPECIAL Usage Policy Language. https://ai.wu.ac.at/policies/policylanguage/
[24]
David Knoke and Song Yang. 2019. Social network analysis. Vol. 154. Sage Publications.
[25]
Thomas Linden, Rishabh Khandelwal, Hamza Harkous, and Kassem Fawaz. 2018. The Privacy Policy Landscape After the GDPR. http://arxiv.org/abs/1809.08396
[26]
Aleecia M McDonald and Lorrie Faith Cranor. 2008. The Cost of Reading Privacy Policies. Journal of Law and Policy for the Information Society 4 (2008), 543--568.
[27]
Marjan Mernik, Jan Heering, and Anthony M. Sloane. 2005. When and How to Develop Domain-Specific Languages. ACM Comput. Surv. 37, 4 (Dec. 2005), 316--344. https://doi.org/10.1145/1118890.1118892
[28]
MongoDB, Inc. 2020. MongoDB Documentation. Data Models. Schema Validation. https://docs.mongodb.com/manual/core/schema-validation/
[29]
Jonathan A. Obar and Anne Oeldorf-Hirsch. 2018. The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society 23, 1 (2018), 128--147. https://doi.org/10.1080/1369118X.2018.1486870
[30]
Richard F. Paige, Jonathan S. Ostroff, and Phillip J Brooke. 2000. Principles for modeling language design. Information and Software Technology 42, 10 (2000), 665--675.
[31]
Frank Pallas, Max-R. Ulbricht, Stefan Tai, Thomas Peikert, Marcel Reppenhagen, Daniel Wenzel, Paul Wille, and Karl Wolf. 2020. Towards Application-Layer Purpose-Based Access Control. In Proceedings of the 35th Annual ACM Symposium on Applied Computing (SAC '20). Association for Computing Machinery, New York, NY, USA, 1288--1296. https://doi.org/10.1145/3341105.3375764
[32]
Felipe Pezoa, Juan L. Reutter, Fernando Suarez, Martin Ugarte, and Domagoj Vrgoc. 2016. Foundations of JSON Schema. In Proceedings of the 25th International Conference on World Wide Web (WWW '16). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 263--273. https://doi.org/10.1145/2872427.2883029
[33]
Princiya. 2019. Mozilla Firefox Lightbeam. https://addons.mozilla.org/firefox/addon/lightbeam-3-0/
[34]
Philip Raschke, Axel Küpper, Olha Drozd, and Sabrina Kirrane. 2018. Designing a GDPR-Compliant and Usable Privacy Dashboard. In Privacy and Identity Management. The Smart Revolution, Marit Hansen, Eleni Kosta, Igor Nai-Fovino, and Simone Fischer-Hübner (Eds.). Springer International Publishing, Cham, 221--236. https://doi.org/10.1007/978-3-319-92925-5_14
[35]
Joel R. Reidenberg, Travis Breaux, Lorrie Faith Cranor, Brian French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia McDonald, Thomas B. Norton, and Rohan Ramanath. 2015. Disagreeable Privacy Policies: Mismatches between Meaning and Users' Understanding. Berkeley Technology Law Journal 30 (2015), 39.
[36]
Arianna Rossi and Monica Palmirani. 2020. Can Visual Design Provide Legal Transparency? The Challenges for Successful Implementation of Icons for Data Protection. Design Issues 36, 3 (2020), 82--96.
[37]
Norman Sadeh, Ro Acquisti, Travis D. Breaux, Lorrie Faith Cranor, Aleecia M. Mcdonalda, Joel R. Reidenbergb, Noah A. Smith, Fei Liu, N. Cameron Russellb, Florian Schaub, and Shomir Wilson. 2013. The Usable Privacy Policy Project: Combining Crowdsourcing, Machine Learning and Natural Language Processing to Semi-Automatically Answer Those Privacy Questions Users Care About. http://ra.adm.cs.cmu.edu/anon/usr0/ftp/home/anon/isr2013/CMU-ISR-13-119.pdf
[38]
The State of California. 2018. California Consumer Privacy Act of 2018. http://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5
[39]
Sabine Trepte, Doris Teutsch, Philipp K. Masur, Carolin Eicher, Mona Fischer, Alisa Hennhöfer, and Fabienne Lind. 2015. Do People Know About Privacy and Data Protection Strategies? Towards the "Online Privacy Literacy Scale" (OPLIS). Springer Netherlands, Dordrecht, 333--365. https://doi.org/10.1007/978-94-017-9385-8
[40]
Max.-R. Ulbricht and Frank Pallas. 2018. YaPPL - A Lightweight Privacy Preference Language for Legally Sufficient and Automated Consent Provision in IoT Scenarios. In Proceedings of Data Privacy Management 2018 (LNCS), Giovanni Livraga and Ruben Rios (Eds.), Vol. 11025. Springer International Publishing, 329--344.
[41]
Łukasz Warchał. 2012. Using Neo4j graph database in social network analysis. Studia Informatica 33, 2A (2012), 271--279.
[42]
Jonathan Wetherbee, Massimo Nardone, Chirag Rathod, and Raghu Kodali. 2018. EJB, Web Services, and Microservices. Apress, Berkeley, CA, 265--317. https://doi.org/10.1007/978-1-4842-3573-7_6
[43]
Zhi Xu and Sencun Zhu. 2015. SemaDroid: A Privacy-Aware Sensor Management Framework for Smartphones. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (CODASPY '15). Association for Computing Machinery, New York, NY, USA, 61--72. https://doi.org/10.1145/2699026.2699114
[44]
Christian Zimmermann. 2015. A Categorization of Transparency-Enhancing Technologies. arXiv. https://arxiv.org/abs/1507.04914

Cited By

View all
  • (2024)SoK: Technical Implementation and Human Impact of Internet Privacy Regulations2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00206(673-696)Online publication date: 19-May-2024
  • (2024)Extending Business Process Management for Regulatory TransparencyBusiness Process Management Forum10.1007/978-3-031-70418-5_20(337-353)Online publication date: 30-Aug-2024
  • (2024)How to Drill into Silos: Creating a Free-to-Use Dataset of Data Subject Access PackagesPrivacy Technologies and Policy10.1007/978-3-031-68024-3_7(132-155)Online publication date: 4-Sep-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
FAccT '21: Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency
March 2021
899 pages
ISBN:9781450383097
DOI:10.1145/3442188
This work is licensed under a Creative Commons Attribution-NoDerivatives International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 March 2021

Check for updates

Author Tags

  1. Data transparency
  2. GDPR
  3. data protection
  4. legal tech
  5. privacy
  6. privacy by design
  7. privacy engineering
  8. privacy law
  9. web privacy

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Bundesministeriums der Justiz und für Verbraucherschutz

Conference

FAccT '21
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)344
  • Downloads (Last 6 weeks)33
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)SoK: Technical Implementation and Human Impact of Internet Privacy Regulations2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00206(673-696)Online publication date: 19-May-2024
  • (2024)Extending Business Process Management for Regulatory TransparencyBusiness Process Management Forum10.1007/978-3-031-70418-5_20(337-353)Online publication date: 30-Aug-2024
  • (2024)How to Drill into Silos: Creating a Free-to-Use Dataset of Data Subject Access PackagesPrivacy Technologies and Policy10.1007/978-3-031-68024-3_7(132-155)Online publication date: 4-Sep-2024
  • (2024)User Interaction Data in Apps: Comparing Policy Claims to ImplementationsPrivacy and Identity Management. Sharing in a Digital World10.1007/978-3-031-57978-3_5(64-80)Online publication date: 23-Apr-2024
  • (2024)Enabling Versatile Privacy Interfaces Using Machine-Readable Transparency InformationPrivacy Symposium 202310.1007/978-3-031-44939-0_7(119-137)Online publication date: 4-Jan-2024
  • (2023)Rethinking Transparency as a Communicative ConstellationProceedings of the 2023 ACM Conference on Fairness, Accountability, and Transparency10.1145/3593013.3594010(444-454)Online publication date: 12-Jun-2023
  • (2023)Privacy Engineering for Protection of Personal Identifiable Information2023 IEEE 9th International Conference on Computing, Engineering and Design (ICCED)10.1109/ICCED60214.2023.10425182(1-6)Online publication date: 7-Nov-2023
  • (2023)A ‘Human-in-the-Loop’ approach for Information Extraction from Privacy Policies under Data Scarcity2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW59978.2023.00014(76-83)Online publication date: Jul-2023
  • (2023)Hawk: DevOps-driven Transparency and Accountability in Cloud Native Systems2023 IEEE 16th International Conference on Cloud Computing (CLOUD)10.1109/CLOUD60044.2023.00027(167-174)Online publication date: Jul-2023
  • (2023)Feasibility of Structured, Machine-Readable Privacy Notices2023 10th International Conference on Behavioural and Social Computing (BESC)10.1109/BESC59560.2023.10386763(1-8)Online publication date: 30-Oct-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media