%0 Conference Proceedings %T GDPR Modelling for Log-Based Compliance Checking %+ Laboratoire de Droit des Affaires et Nouvelles Technologies (DANTE) %+ Laboratoire Sûreté des Logiciels (LSL) %A Montety, Colombe, De %A Antignac, Thibaud %A Slim, Christophe %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 13th IFIP International Conference on Trust Management (IFIPTM) %C Copenhagen, Denmark %Y Weizhi Meng %Y Piotr Cofta %Y Christian Damsgaard Jensen %Y Tyrone Grandison %I Springer International Publishing %3 Trust Management XIII %V AICT-563 %P 1-18 %8 2019-07-17 %D 2019 %R 10.1007/978-3-030-33716-2_1 %K Privacy %K Logic %K Model %K Accountability %K Compliance %Z Computer Science [cs]Conference papers %X Since the entry into force of the General Data Protection Regulation (GDPR), public and private organizations face unprecedented challenges to ensure compliance with new data protection rules. To help its implementation, academics and technologists proposed innovative solutions leading to what is known today as privacy engineering. Among the main goals of these solutions are to enable compliant data processing by controllers and to increase trust in compliance by data subjects. While data protection by design (Article 25 of GDPR) constitutes a keystone of the regulation, many legacy systems are not designed and implemented with this concept in mind, but still process large quantities of personal data. Consequently, there is a need for “after design” ways to check compliance and remediate to data protection issues. In this paper, we propose to monitor and check the compliance of legacy systems through their logs. In order to make it possible, we modelled a core subset of the GDPR in the Prolog language. The approach we followed produced an operational model of the GDPR which eases the interactions with standard operational models of Information Technology (IT) systems. Different dimensions required to properly address data protection obligations have been covered, and in particular time-related properties such as retention time. The logic-based GDPR model has also been kept as close as possible to the legal wording to allow a Data Protection Officer to explore the model in case of need. Finally, even if we don’t have a completed tool yet, we created a proof-of-concept framework to use the GDPR model to detect data protection compliance violations by monitoring the IT system logs. %G English %Z TC 11 %Z WG 11.11 %2 https://inria.hal.science/hal-03182599/document %2 https://inria.hal.science/hal-03182599/file/491176_1_En_1_Chapter.pdf %L hal-03182599 %U https://inria.hal.science/hal-03182599 %~ CEA %~ IFIP %~ IFIP-AICT %~ UVSQ %~ DRT %~ IFIP-TC %~ CEA-UPSAY %~ IFIP-TC11 %~ DANTE %~ IFIP-TM %~ IFIP-WG11-11 %~ UNIV-PARIS-SACLAY %~ CEA-UPSAY-SACLAY %~ UVSQ-SACLAY %~ LIST %~ UVSQ-UPSACLAY %~ GS-ENGINEERING %~ IFIP-AICT-563 %~ GS-DROIT %~ GS-COMPUTER-SCIENCE %~ GS-SPORT-HUMAN-MOVEMENT