UC-C-PIC-AT: Data Processing Auditor Use Cases (AUDIT)
Following are four use-case descriptions required for Data Processing Auditor functionalities
Table of Contents
UC-C-PIC-AT-001: Consent - Postpartum and infant care (Audit Consent)
UC-C-PIC-AT-002: Consent - Postpartum and infant care (Monitor Policy Update)
UC-C-PIC-AT-003: Consent - Postpartum and infant care (READ Consent Status)
UC-C-PIC-AT-004: Consent - Postpartum and infant care (VERIFY Consent Integrity)
UC-C-PIC-AT-001: Consent - Postpartum and infant care (Audit Consent)
ID | UC-C-PIC-AT-001 |
---|---|
Name | Consent - Postpartum and infant care (Audit - AUDIT CONSENT) |
Description | The use case implements the tasks required to track the opt-in/out consent by an Individual and formalised in a Consent Agreement. This results in a new entry in a registry that will record the Individual, his/her decision and the specific Consent Agreement as well as other necessary meta-data to subsequently manage the consent (e.g. dates, Consent Agreement version, …). |
Trigger (the event that triggers the use case) | The AUDIT CONSENT use case is triggered each time a Consent Record is modified.
|
Preconditions (list of conditions that MUST be met in order for the use case to be successful) | The use case assumes that the Data Policy Auditor is authorised to perform the audit. Therefore the Data Policy Auditor has all the necessary, but limited, access rights to access the information. This can be done either with a specific component of the Application that allows these access to a person outside the organisation/department owning the application or by an authorised employee of the organisation operating under the instruction of the Data Policy Auditor (whose legitimity is specified in the Audit Framework).
|
Data inputs |
|
Actors (a person, a company or organisation, a computer program, or a computer system - hardware, software, or both) |
Optionally: a data intermediary or a data operator. |
Normal Course (what happens if the event is triggered and the preconditions have been met)
(See Sequence diagrams below) |
|
Alternative Course (links to other use cases in case there are different ways how to solve the same use case) |
|
Data output |
|
Post-Conditions (the success criteria) |
|
Exceptions (error situations) | An escalation process is to be put in place if, for any reason, the Data Policy Auditor can not perform his work.. |
Related BBs (working groups related to that particular use case) |
|
UC-C-PIC-AT-002: Consent - Postpartum and infant care (Monitor Policy Update)
ID | UC-C-PIC-AT-002 |
---|---|
Name | Consent - Postpartum and infant care (Audit - MONITOR POLICY UPDATE) |
Description | The use case implements the tasks required to be performed when a Data Policy change occurs. This MAY require an update of the Consent Agreement and/or information to the Individual (jurisdiction dependent) |
Trigger (the event that triggers the use case) | The MONITOR POLICY UPDATE use case is triggered each time the Data Policy receives a modification. The Data Policy Auditor needs to identify consent records that require a modification of the consent agreement. |
Preconditions (list of conditions that MUST be met for the use case to be successful) | The use case assumes that the Data Policy Auditor is authorised to perform the audit. Therefore the Data Policy Auditor has all the necessary, but limited, access rights to access the information. This can be done either with a specific component of the Application that allows these access to a person outside the organisation/department owning the application or by an authorised employee of the organisation operating under the instruction of the Data Policy Auditor (whose legitimity is specified in the Audit Framework). The Organisation provides the Application Administrator with the new policy and the system updates to be done. This includes potential actions on existing consent records or communication to consentees. This use case assumes that the policy change has been processed by the organisation maintaining the system..
Same preconditions as UC-C-PIC-AT-001 AUDIT CONSENT
|
Data inputs |
And same data inputs as UC-C-PIC-AT-001 AUDIT CONSENT
|
Actors (a person, a company or organisation, a computer program, or a computer system - hardware, software, or both) |
|
Normal Course (what happens if the event is triggered and the preconditions have been met) |
|
Alternative Course (links to other use cases in case there are different ways how to solve the same use case) | --- |
Data output | Audit files (incl. Supporting information) |
Post-Conditions (the success criteria) | Audit information available for further audit of the information system. |
Exceptions (error situations) | An escalation process is to be put in place if, for any reason, the Data Policy Auditor can not perform his work.. |
Related BBs (working groups related to that particular use case) | Same as UC-C-PIC-AT-001 Audit Consent |
UC-C-PIC-AT-003: Consent - Postpartum and infant care (READ Consent Status)
ID | UC-C-PIC-AT-003 |
---|---|
Name | Consent - Postpartum and infant care (Audit - READ Consent status) |
Description | READ CONSENT STATUS - Viewing (reading, exporting) the Consent Agreements and relevant information from the Consent Records in a verifiable form |
Trigger (the event that triggers the use case) | For a given population of Individuals, an authorised Data Policy Auditor wants to read their Consent Record. |
Preconditions (list of conditions that MUST be met for the use case to be successful) | Application is configured. At least one Consent Record attached to a Consent Agreement for an Individual is present (ie. Consent BB is active). The use case assumes that the Data Policy Auditor is authorised to perform the audit. Therefore the Data Policy Auditor has all the necessary, but limited, access rights to access the information. This can be done either with a specific component of the Application that allows these access to a person outside the organisation/department owning the application or by an authorised employee of the organisation operating under the instruction of the Data Policy Auditor (whose legitimity is specified in the Audit Framework). |
Data inputs | The population of individuals for which the authorised Data Policy Auditor wants to read the status. |
Actors (a person, a company or organisation, a computer program, or a computer system - hardware, software, or both) |
|
Normal Course (what happens if the event is triggered and the preconditions have been met) |
|
Alternative Course (links to other use cases in case there are different ways how to solve the same use case) | There is no Alternative Course of action. Should, for any reason, the Normal Course of action not be terminated successfully. The Data Policy Auditor MUST raise an audit finding. The Audit Framework is responsible to handle audit finding (not the application) |
Data output | Audit files (incl. Supporting information) that can be imported in the Data Policy Auditor’s system |
Post-Conditions (the success criteria) | Audit information available to the Data Policy Auditor for further audit of the Application. |
Exceptions (error situations) | An escalation process is to be put in place if, for any reason, the Data Policy Auditor can not perform his work.. |
Related BBs (working groups related to that particular use case) | Same as UC-C-PIC-AT-001 Audit Consent. |
UC-C-PIC-AT-004: Consent - Postpartum and infant care (VERIFY Consent Integrity)
ID | UC-C-PIC-AT-004 |
---|---|
Name | Consent - Postpartum and infant care (Audit - VERIFY Consent Integrity) |
Description | VERIFY CONSENT INTEGRITY - Ability to check the integrity of the signed agreements.
Important note: To verify the INTEGRITY, the Data Policy Auditor does not need to receive the INFORMATION in the Consent Record. For example, the names of the individual or any other personal or sensitive information do not need to be disclosed to the Data Policy Auditor for the purpose of Integrity verification. The cryptographic signature should be sufficient. Nevertheless, the auditor must receive sufficient supporting information to certify and record that this Consent Record for this agreement was signed and this time and not tempered with. The Auditor will record this information that may be used later in the audit process.nAccessing the content itself of is a different use case. This note helps to clarify a simple verification process that could be automated from a more indepth process where access to sensitive information
|
Trigger (the event that triggers the use case) | For a given Consent Record, an authorised Data Policy Auditor wants to verify the integrity of the consent.. |
Preconditions (list of conditions that MUST be met for the use case to be successful) | Application is configured. The Consent Record under investigation is already in the Application. The Consent BB is active. The use case assumes that the Data Policy Auditor is authorised to perform the audit. Therefore the Data Policy Auditor has all the necessary, but limited, access rights to access the information. This can be done either with a specific component of the Application that allows these access to a person outside the organisation/department owning the application or by an authorised employee of the organisation operating under the instruction of the Data Policy Auditor (whose legitimity is specified in the Audit Framework). |
Data inputs | The Consent Record for which the authorised Data Policy Auditor wants to verify the integrity.. |
Actors (a person, a company or organisation, a computer program, or a computer system - hardware, software, or both) |
|
Normal Course (what happens if the event is triggered and the preconditions have been met) |
|
Alternative Course (links to other use cases in case there are different ways how to solve the same use case) | There is no Alternative Course of action. Should, for any reason, the Normal Course of action not be terminated successfully. The Data Policy Auditor MUST raise an audit finding. The Audit Framework is responsible to handle audit finding (not the application) |
Data output | Audit files (incl. Supporting information) that can be imported in the Data Policy Auditor’s system |
Post-Conditions (the success criteria) | Audit information available to the Data Policy Auditor for further audit of the Application. |
Exceptions (error situations) | An escalation process is to be put in place if, for any reason, the Data Policy Auditor can not perform his work.. |
Related BBs (working groups related to that particular use case) | Same as UC-C-PIC-AT-001 Audit Consent. |
Last updated