CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec...

47
CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012

Transcript of CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec...

Page 1: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

CONFORMANCE TO LEGAL REQUIREMENTS

FOR E-SERVICES AND E-SYSTEMS

Luigi LogrippoUniversité du Québec en OutaouaisUniversity of Ottawa

1

Invited Talk, KCESS2012

Page 2: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Towards a process for producing software from legal

requirements

Page 3: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

One of the last frontiers …

Last for two reasons: In the end, IT systems must satisfy the law This is a difficult goal

Because of the need to bridge the long distance between legal language and IT language and implementations

3

A bridge? A bridge?

The law

Software

Page 4: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Why IT isn’t very good at building bridges

4

Humankind has been building bridges for millions of years

But IT is fairly new at this …

Vestiges of a bridge to Sri Lanka (30Km)Reputed to be 1,700,000 yrs old …

Page 5: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Framework

Legal requirements for e-services and e-systems exist in many areas: Tax laws E-governance E-commerce Accounting Privacy protection E-voting …

Enterprises have their own software in these areas: Does it comply with the law? How can new software be built to comply with

the law?

5

Page 6: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

The islands and the bridges6

Legal requirements for

enterprise software

Enterprise requirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

Page 7: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

7

Legal requirements for

enterprise software

Enterprise requirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

Page 8: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

8

Legalrequirements for

enterprise software

Enterpriserequirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

Page 9: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Legal processes9

Formulating laws and policies Normative text

Establishing legal compliance of enterprise policy to the law: These processes are entirely in the legal domain, for

lawyers

Enterprise Law

EnterprisePolicy

legal complianceLegal area

Legalrequirements for

enterprise software

Enterpriserequirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

Page 10: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

How many research areas remain for us?

10

At least five

Legalrequirements for

enterprise software

Enterpriserequirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

Page 11: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Manual activities

At the interface of the legal world and the IT world

Extract from law Determine what part of the law is relevant for IT

implementation Express that part of the law in IT terminology

Extract from enterprise policy Determine what part of the enterprise policy is

relevant for IT implementation Express that part of the policy in IT terminology

11

Legalrequirements for

enterprise software

Enterpriserequirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

Page 12: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

How are the manual activities done?12

Since they are interface activities, they will require mixed teams of law experts and IT experts

It’s usual for IT people to work in this manner, at the requirement extraction phase

Page 13: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Current practice13

Legal requirements are expanded into many detailed requirements

Legal offices are used to check that these detailed requirements represent a legally defendable implementation of the law

Long checklists result from this process, and the enterprises subject to the law will use the checklists rather than the original law

Checklists usually include all sorts of things, not only software requirements

Page 14: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Elements for requirement extraction

14

As always in computing, we have data structures and processes Examples of relevant data structures:

Enterprise organization diagrams Concept ontologies

Examples of processes: Business processes

These exist in law, as they exist in enterprise policies, They may be difficult to find They will be much more generic in law

Page 15: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Successful example: tax law

Predates computing … Governments have mapped tax law into:

Ontologies, essentially represented by tax forms

Processes, essentially represented by calculation rules

There remain many areas where human intervention is necessary Interpretation Fact-finding

This is what we can expect to happen in other legal areas

15

Page 16: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Successful example: Mesopothamian law (4000 yrs ago)

One of Hammurabi’s almost 300 rules in Event-Condition-Action style:

If anyone steals cattle or sheep, if it belongs to a god or to the court, the thief shall pay thirtyfold

Event: Anyone steals cattle or sheep or an ass Condition: If it belongs to a god or to the court Action: The thief shall pay thirtyfold The event itself consists of three elements:

Subject: Anyone Verb: Steals Object: Cattle or sheep

ECA rules are very well known in IT E.g. access control rules to data

16

Page 17: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

High-level rules or Requirements From the10 Commandments given to

Moses:You shall not steal

This can be seen as a requirement to be translated into many ECA rules, such as the previous one

Needed: an ontology to identify the types of theft that are relevant; each type can be addressed by one or more ECA-type rules

17

Page 18: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Creating legal ontologies18

Page 19: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Can we put order in something like this?

19

Royal Bank of Canada privacy policies: “We use your personal and financial information for the

purposes communicated to you in your agreement(s) with us, for example to: Verify your identity; Provide you with the financial products and services requested; Communicate to you any benefit, feature and other information about products and services you have with us; Respond to any special needs or inquiries you may have; Better understand your financial situation and determine your eligibility for products and services we offer; Manage our risks and operations; Meet regulatory and legal requirements; If we have your social insurance number or social security number, we may use it for tax related purposes if you hold a product generating income and share it with the appropriate government agencies. We may also share it with credit reporting agencies as an aid to identify you.”

Page 20: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Identifying the dependencies(Ghazinour and Barker, PAIS 2011)

20

Royal Bank of Canada privacy policies:“We use your personal and financial information for the purposes communicated to you in your agreement(s) with us, for example to: Verify your identity; Provide you with the financial products and services requested; Communicate to you any benefit, feature and other information about products and services you have with us; Respond to any special needs or inquiries you may have; Better understand your financial situation and determine your eligibility for products and services we offer; Manage our risks and operations; Meet regulatory and legal requirements; If we have your social insurance number or social security number, we may use it for tax related purposes if you hold a product generating income and share it with the appropriate government agencies. We may also share it with credit reporting agencies as an aid to identify you.”

Purpose ontology lattice for RBC privacy policies

Page 21: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Why a lattice(Ghazinour and Barker, PAIS 2011)

21

This lattice arranges the purposes in an implication order. E.g. if one allows RBC to use personal information for mail distribution then one has also allowed them to use it for communication, marketing, and identity verification (more specific purposes)

Page 22: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Organization structure and scenarios in the law

22

Sarbanes Oxley - Section.2 : Audit (3) AUDIT COMMITTEE. The term ‘‘audit committee’’ means a committee

established by and amongst the board of directors of an issuer for the purpose of overseeing the accounting and financial reporting processes of the issuer and audits of the financial statements of the issuer, ….Issuer: company subject to SOX

Page 23: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

IT interpretation23

Sarbanes Oxley - Section.2 : Audit (3) AUDIT COMMITTEE. The term ‘‘audit committee’’ means a committee established by

and amongst the board of directors of an issuer for the purpose of overseeing the accounting and financial reporting processes of the issuer and audits of the financial statements of the issuer, ….

Exercise: draw the class diagram

Page 24: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Processes 24

In law, they are usually defined only in terms of what they should achieve – Examples from SOX (a) pertain to the maintenance of records that in

reasonable detail accurately and fairly reflect the transactions and dispositions …

(b) provide reasonable assurance that transactions are recorded as necessary to permit preparation of financial statements …

(c) provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use or disposition …

Details are found in standards, professional and ‘best practices’ manuals Broken down in checklists

Page 25: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Generic extraction model for enterprise governance(Hassan and Logrippo, RELAW2009)

25

Concepts found in normative text are to be mapped into these classes

Note specific purpose!

Page 26: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Scanning normative text26

The extraction process can be to carefully scan the law, standards, ‘best practices’, enterprise regulations, looking for elements that can be implemented in software

Concepts found should be mapped on an extraction model that can be the basis for software implementation Conceptual graphs, lattices, UML

Page 27: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Joint work27

The resulting formalized representations are interpretations of the original text For IT specialists, the

acceptance criterion is: can this interpretation be

implemented in software? For Law specialists, the

criterion is: can this interpretation be

defended in court?

Page 28: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

We are interested in the intersection28

Identify and formalize the intersection Expand it as much as possible

Page 29: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Legal requirements for

enterprise software

Enterprise requirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

Compliance of enterprise requirements to legal requirements

29

Page 30: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Legalrequirements for

enterprise software

Enterpriserequirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

What was a legal compliance process in the legal area becomes a logical compliance check in the software area

This can be performed by using model checkers of various kinds

Compliance of enterprise requirements to legal requirements

30

Page 31: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Proposal: A Logic-Based Process(Hassan and Logrippo)

31

OK or counterexamples

Page 32: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Checking requirements on organization structure

32

Contains (Loans, PublishApplication)Contains (Loans, ReceiveFilledApp)Contains (Loans, Wapplication)Contains (Loans, JReceiveFilledApp)Contains (Loans, ConsentClient)Contains (Loans, LegalReasonException)Contains (Loans,ThankClient)Contains (Loans, DisposeData)Contains(OrderMgt, ReadApplication)Contains(OrderMgt, ValidateInfo)Contains(OrderMgt,SaveInfo)

The organization must include a process to dispose of data

Formally defined Enterprise structureLegal Requirement

An organization with two main departments,incl. several processes

Model checker: yes, it is included

Page 33: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Checking requirements on process structure

33

Next (ValidateInfo,SaveInfo)Next(ReadApplication, ValidateInfo)Next(Wapplication, JreceivedApp)Next(JReceivedApp,ConsentClient)Next(JReceivedApp,LegalReasonException) Next(ThankClient,DisposeData)Next(PublishApplication, ReceiveFilledApp)Next(ReceiveFilledApp,Wapplication)Next(ValidateInfo,WApplication)Next(WApplication,ReadApplication)

Formally defined structure

Legal requirement:

Information received must later be disposed

Model checker: following slide

Page 34: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Process non-compliance34

A path is found where information

rec’d is saved

Page 35: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Need of other approaches

Different approaches will reveal different issues Physicists use different methods to view

material structure different methods will show different things

E.g. the UCM-based approach proposed by Amyot et al. will lead to other discoveries

How can we put it all together Do we need to put it all together?

35

Page 36: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Legalrequirements for

enterprise software

Enterpriserequirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

Implement &verify36

Page 37: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Legalrequirements for

enterprise software

Enterpriserequirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

We are here in a familiar territory: We have compliant software requirements and we must

implement them and verify the implementation Use existing software methods But: are the enterprise requirements that were

obtained so far sufficient to derive an implementation? A lot of practical domain knowledge may still be necessary Probably it cannot be assumed that inexperienced software

developers can do this

Implement &verify37

Page 38: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Maturity of SE methods38

Unfortunately, the study of techniques to go from requirements to implementations is fairly recent and so not very mature IMOMO Requirements engineering

We have been doing this for only about half a century …

Page 39: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Generic SE development method

39

Requirements(in natural or

logic language)

Specification of behavior

Specification of implementation

Implementation

Major errors can be injected at every step especially between

requirements and behavior specs

Legal knowledge is probably still needed between steps

Page 40: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Legalrequirements for

enterprise software

Enterpriserequirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

Validate implementation40

Page 41: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Validate implementation41

Is the resulting enterprise software compliant with the law? This must be checked since errors can be injected in the

implementation process Existing software methods can be used to validate the

implementation wrt legal requirements, perhaps the most practical is testing

Final testing is part of every engineering process But, exactly what should be tested and how? The checklists mentioned are not constructed as software test suites

Legalrequirements for

enterprise software

Enterpriserequirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea

Page 42: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Certification42

The end result should be certified software Certified to be conformant to the law What should the certification process be?

Most probably, test suites derived from checklists

Many software vendors produce software that is claimed to be compliant But can hardly be certified

Page 43: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Privacy by Design43

PbD is embedded into the design and architecture of IT systems and business practices It is not bolted on as an add-on

Privacy becomes an essential component of the core functionality being delivered

Privacy is integral to the system, without diminishing functionality

(source: Information and Privacy Commissioner of Ontario, Canada)

How can we build PbD in the software process?

Page 44: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

How can we move forward?44

It would help if normative text to be implemented in software was written in a different style …

E.g. legal text leaves much unspecified The complex ontologies on which its interpretation

depends are rarely specified The increasing dependence on IT systems will

lead legislators to include more IT language and structure in their normative style Thus facilitating the extraction process

Compliance checklists will have to become more specific in terms of software requirements

Page 45: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

More mind-expanding ideas45

Formalizing Privacy agreements P3P and extensions

Developments in legal theory and practice Legal formalization necessary to expand e-

Business e-Contracts, internationally formalized e-Judgments

Privacy violations to be proved automatically by using automatically obtained factual evidence

Amends to be determined automatically, on the basis of objective law

Page 46: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Many open areas of research

46

Formal semantics of normative languages Methods to extract ontologies and processes from

normative text (see RELAW workshop series) Methods to validate the result of the extraction process

Such methods will be domain-specific Software Engineering issues, instantiated to the legal

domain Methods for validating compliance of an

implementation to legal requirements Leading to certification

The PbD software process

Page 47: CONFORMANCE TO LEGAL REQUIREMENTS FOR E-SERVICES AND E-SYSTEMS Luigi Logrippo Université du Québec en Outaouais University of Ottawa 1 Invited Talk, KCESS2012.

Conclusions47

I have attempted to identify the main issues related to the problem of software compliance to legal requirements

Classified the issues, by means of a proposed ‘reference model’

Some preliminary solutions and research ideas were also presented, as possible starting points

Legalrequirements for

enterprise software

Enterpriserequirements for

software

Enterprise Law

EnterprisePolicy

Enterprise software

extract extract

legal compliance

logical compliance

implement & verify

validate

Legal area

Softwarearea