Examples for Data Privacy Vocabulary

for Data Privacy Vocabulary (DPV)

Final Community Group Report

This version:
https://www.w3.org/community/reports/dpvcg/CG-FINAL-examples-20240701/
Latest published version:
https://w3id.org/dpv/examples
Latest editor's draft:
https://dev.dpvcg.org/examples
Editor:
Harshvardhan J. Pandit (ADAPT Centre, Dublin City University)
Feedback:
GitHub w3c/dpv (pull requests, new issue, open issues)
Key Publications
Data Privacy Vocabulary (DPV) -- Version 2 (2024)

Abstract

This document lists the examples for concepts in DPV and aligned vocabularies. The examples are available in DPVCG GitHub repo under ./examples path.

Status of This Document

This specification was published by the Data Privacy Vocabularies and Controls Community Group. It is not a W3C Standard nor is it on the W3C Standards Track. Please note that under the W3C Community Final Specification Agreement (FSA) other conditions apply. Learn more about W3C Community and Business Groups.

Contributing: The DPVCG welcomes participation to improve the DPV and associated resources, including expansion or refinement of concepts, requesting information and applications, and addressing open issues. See contributing guide for further information.

GitHub Issues are preferred for discussion of this specification.

Data Privacy Vocabulary (DPV) Specification: is the base/core specification for the 'Data Privacy Vocabulary', which is extended for Personal Data [PD], Locations [LOC], Risk Management [RISK], Technology [TECH], and [AI]. Specific [LEGAL] extensions are also provided which model jurisdiction specific regulations and concepts - see the complete list of extensions. To support understanding and applications of [DPV], various guides and resources [GUIDES] are provided, including a [PRIMER]. A Search Index of all concepts from DPV and extensions is available.

[DPV] and related resources are published on GitHub. For a general overview of the Data Protection Vocabularies and Controls Community Group [DPVCG], its history, deliverables, and activities - refer to DPVCG Website. For meetings, see the DPVCG calendar.

The peer-reviewed article “Creating A Vocabulary for Data Privacy” presents a historical overview of the DPVCG, and describes the methodology and structure of the DPV along with describing its creation. An open-access version can be accessed here, here, and here. The article Data Privacy Vocabulary (DPV) - Version 2, accepted for presentation at the 23rd International Semantic Web Conference (ISWC 2024), describes the changes made in DPV v2.

The namespaces used in this document are as follows:

: <<https://w3id.org/dpv/examples/vocab#>
dpv:<https://w3id.org/dpv#>
dct:<http://purl.org/dc/terms/>
rdfs:<http://www.w3.org/2000/01/rdf-schema#>
skos:<http://www.w3.org/2004/02/skos/core#>
owl:<http://www.w3.org/2002/07/owl#>
vann:<http://purl.org/vocab/vann/>
xsd:<http://www.w3.org/2001/XMLSchema#>
sh:<http://www.w3.org/ns/shacl#>

2. Vocabulary

2.1 Conformance

As well as sections marked as non-normative, all authoring guidelines, diagrams, examples, and notes in this specification are non-normative. Everything else in this specification is normative.

The key words MAY and MUST in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

2.2 Example

IRIhttps://w3id.org/dpv/use-cases/vocab#
skos:definitionAn Example provides a description where information within the scope of DPVCG is expected to be relevant or applied, and acts as the basis for identifying requirements (including but not limited to creation of concepts). Use cases can contain descriptions of systems, their operations, actors and entities involved, restrictions or constraints, or any other pertinent detail. They can be a simple textual paragraph or elaborative structured documents (in which case we prefer to reference them here as an URL).
  1. An Example MUST have a title (provided using dct:title)
  2. An Example MUST have a description (provided using dct:description)
  3. An Example MUST have an identifier with prefix 'U' (provided using dct:identifier)
  4. An Example MAY have one or more contributors (specified using dct:contributor)
  5. An Example MAY have a date (e.g. creation or modification) (specified using dct:date)
  6. An Example MAY specify the source of its information (using dct:source)
  7. An Example MAY specify its primary subject or concept (using dct:subject)
  8. An Example MAY specify relevant requirements derived from it (using dct:references)

3. Examples

3.1 E0001: Implications of using SKOS vs OWL

3.2 E0002: Extending concepts to represent use-case specific information

3.3 E0003: Extending multiple concepts

3.4 E0004: Interoperability of extended concepts across use-cases

3.5 E0005: Process used to combine core concepts and represent an use-case

3.6 E0006: Nesting Processes

3.7 E0007: Extending Purposes and adding human-readable descriptions

3.8 E0008: Using NACE codes to restrict Purposes

3.9 E0009: Derivation and inference of personal data

3.10 E0010: Indicating personal data is sensitive or special category

3.11 E0011: Indicating Storage Conditions

3.12 E0012: Indicating Data Sources

3.13 E0013: Spam filter as Automated Decision Making with Human Involvement

3.19 E0019: Indicating Entity Information, including DPO and Representatives

3.20 E0020: Using technical measure: Protecting data using encryption and access control

3.21 E0021: Using organisational measure: Indicating staff training for use of Credentials

3.22 E0022: Privacy Notice used in an activity

3.24 E0024: Controller-Processor agreement denoting processing to be carried out

3.25 E0025: Data transfer safeguards

3.26 E0026: Example of Contextual Necessity

3.27 E0027: Indicating risks, consequences, and impacts

3.28 E0028: Rule specifying permission

3.29 E0029: Rule specifying prohibition

3.30 E0030: Rule combining DPV with ODRL

3.32 E0032: Indicating Controller identity and details of representative

3.33 E0033: Indicating Processor as the implementing entity in a process

3.34 E0034: Specifying recipients of data

3.35 E0035: Specifying data exporters and importers

3.36 E0036: Indicate relevant authority for processing

3.37 E0037: Indicating type of organisation and involvement of specific orgnisational units

3.38 E0038: Indicating subsidiaries of an organisation

3.39 E0039: Indicating involvement of data subjects

3.40 E0040: Extending a purpose and using human-readable descriptions

3.41 E0041: Indicating purposes associated with a Service

3.43 E0043: Indicating sector or domain and associating it with a purpose

3.44 E0044: Specifying personal data

3.45 E0045: Indicating data belongs to sensitive or special category

3.46 E0046: Indicating data being collected and derived

3.47 E0047: Indicating processing conditions for duration and location

3.48 E0048: Indicating storage conditions for duration, location, deletion, and restoration

3.49 E0049: Indicating data volume, geo-location coverage, data subject scale, and a processing scale

3.50 E0050: Specifying duration

3.51 E0051: Specifying frequency

3.52 E0052: Specifying necessity and importance in context

3.53 E0053: Specifying applicability of information

3.54 E0054: Specifying status associated with activities

3.55 E0055: Specifying compliance status and lawfulness

3.56 E0056: Specifying the audit status associated with a DPIA

3.57 E0057: Expressing GDPR Right to Data Portability could not be fulfilled due to Identity Verification failure

3.58 E0058: Expressing a right exercise request is delayed due to high volume of requests

3.59 E0059: Exercising the right to rectification with contesting accuracy of information as justification

3.60 E0060: Specifying the location of a process

3.61 E0061: Associating justifications with right exercise non-fulfilment

3.62 E0062: Using justifications across categories

3.63 E0063: Expressing data breach notifications to data subjects are not required using a justification

3.64 E0064: Indicating use of a technical measure and its implementation

3.65 E0065: Specifying legitimate interest of a controller

3.66 E0066: Specifying permissions and prohibitions

3.67 E0067: Indicating applicable rights

3.68 E0068: Using DPV and RISK extension to represent risks

3.69 E0069: Using DPV and RISK extension to represent incidents

3.70 E0070: Indicating personal data involved in an incident

3.71 E0071: Using risk controls to express how tech/org measures address the risk

Funding Acknowledgements

Funding Sponsors

The DPVCG was established as part of the SPECIAL H2020 Project, which received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731601 from 2017 to 2019.

Harshvardhan J. Pandit was funded to work on DPV from 2020 to 2022 by the Irish Research Council's Government of Ireland Postdoctoral Fellowship Grant#GOIPD/2020/790.

The ADAPT SFI Centre for Digital Media Technology is funded by Science Foundation Ireland through the SFI Research Centres Programme and is co-funded under the European Regional Development Fund (ERDF) through Grant#13/RC/2106 (2018 to 2020) and Grant#13/RC/2106_P2 (2021 onwards).

Funding Acknowledgements for Contributors

The contributions of Beatriz Esteves have received funding through the PROTECT ITN Project from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 813497.

The contributions of Harshvardhan J. Pandit have been made with the financial support of Science Foundation Ireland under Grant Agreement No. 13/RC/2106_P2 at the ADAPT SFI Research Centre.

A. References

A.1 Normative references

[AI]
AI Technology concepts for DPV. URL: https://w3id.org/dpv/ai
[DPV]
Data Privacy Vocabulary (DPV) Specification. URL: https://w3id.org/dpv
[DPVCG]
W3C Data Privacy Vocabularies and Controls Community Group (DPVCG). URL: https://www.w3.org/community/dpvcg/
[GUIDES]
Guides for DPV. URL: https://w3id.org/dpv/guides
Legal Jurisdiction-relevant concepts for DPV. URL: https://w3id.org/dpv/legal
[LOC]
Location and Geo-Political Membership concepts for DPV. URL: https://w3id.org/dpv/loc
[PD]
Personal Data categories for DPV. URL: https://w3id.org/dpv/pd
[PRIMER]
Primer for Data Privacy Vocabulary. URL: https://w3id.org/dpv/primer
[RFC2119]
Key words for use in RFCs to Indicate Requirement Levels. S. Bradner. IETF. March 1997. Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc2119
[RFC8174]
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words. B. Leiba. IETF. May 2017. Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc8174
[RISK]
Risk Assessment and Management concepts for DPV. URL: https://w3id.org/dpv/risk
[TECH]
Technology concepts for DPV. URL: https://w3id.org/dpv/tech

A.2 Informative references

Consent Records and Receipts as per ISO/IEC TS 27560:2023 using DPV. URL: https://w3id.org/dpv/guides/consent-27560
[TIME]
Time Ontology in OWL. URL: https://www.w3.org/TR/owl-time/