The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process...

135
The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting Members and Partners The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013 Guido Governatori 1/64

Transcript of The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process...

Page 1: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

The Regorous Approach toBusiness Process Compliance

Guido Governatori

Last JD, 20 October 2013

NICTA Funding and Supporting Members and Partners

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 1/64

Page 2: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Outline

• Definition of (Business Process) Compliance

• Process specifications• Normative requirements

• Deontic Concepts• Logic of Violation• Defeasibility

• Compliance-by-design

• The Regorous approach

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 2/64

Page 3: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

What is Compliance?

Ensuring that business operations, processes, and practices are in ac-cordance with a given prescriptive (often legal) document

Regulatory• Basel II

• Sarbanes-Oxley

• OFAC (USA PatriotAct)

• OSFI “blocked entity”lists

• HIPAA

• Graham-Leach-Bliley

Standards• Best practice models

• SAP solution maps

• ISO 9000

• Medical guidelines

Contracts• Service Agreement

• Customer Contract

• Warranty

• Insurance Policy

• Business Partnership

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 3/64

Page 4: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

What is Compliance?

Ensuring that business operations, processes, and practices are in ac-cordance with a given prescriptive (often legal) document

Regulatory• Basel II

• Sarbanes-Oxley

• OFAC (USA PatriotAct)

• OSFI “blocked entity”lists

• HIPAA

• Graham-Leach-Bliley

Standards• Best practice models

• SAP solution maps

• ISO 9000

• Medical guidelines

Contracts• Service Agreement

• Customer Contract

• Warranty

• Insurance Policy

• Business Partnership

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 3/64

Page 5: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

How to ensure compliance?

Compliance is a relationship between two sets of specifications

Alignment of formal specifications for business processes and formal spe-cifications for prescriptive (legal) documents.

• Conceptually sound representation of processes• Conceptually sound representation of and reasoning with norms

• we can identify formal loopholes, deadlocks and inconsistencies innormative systems, and

• we can make hidden conditions explicit

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 4/64

Page 6: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

How to ensure compliance?

Compliance is a relationship between two sets of specifications

Alignment of formal specifications for business processes and formal spe-cifications for prescriptive (legal) documents.

• Conceptually sound representation of processes• Conceptually sound representation of and reasoning with norms

• we can identify formal loopholes, deadlocks and inconsistencies innormative systems, and

• we can make hidden conditions explicit

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 4/64

Page 7: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

How to ensure compliance?

Compliance is a relationship between two sets of specifications

Alignment of formal specifications for business processes and formal spe-cifications for prescriptive (legal) documents.

• Conceptually sound representation of processes• Conceptually sound representation of and reasoning with norms

• we can identify formal loopholes, deadlocks and inconsistencies innormative systems, and

• we can make hidden conditions explicit

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 4/64

Page 8: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

How to ensure compliance?

Compliance is a relationship between two sets of specifications

Alignment of formal specifications for business processes and formal spe-cifications for prescriptive (legal) documents.

• Conceptually sound representation of processes

• Conceptually sound representation of and reasoning with norms

• we can identify formal loopholes, deadlocks and inconsistencies innormative systems, and

• we can make hidden conditions explicit

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 4/64

Page 9: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

How to ensure compliance?

Compliance is a relationship between two sets of specifications

Alignment of formal specifications for business processes and formal spe-cifications for prescriptive (legal) documents.

• Conceptually sound representation of processes• Conceptually sound representation of and reasoning with norms

• we can identify formal loopholes, deadlocks and inconsistencies innormative systems, and

• we can make hidden conditions explicit

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 4/64

Page 10: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

How to ensure compliance?

Compliance is a relationship between two sets of specifications

Alignment of formal specifications for business processes and formal spe-cifications for prescriptive (legal) documents.

• Conceptually sound representation of processes• Conceptually sound representation of and reasoning with norms

• we can identify formal loopholes, deadlocks and inconsistencies innormative systems, and

• we can make hidden conditions explicit

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 4/64

Page 11: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

How to ensure compliance?

Compliance is a relationship between two sets of specifications

Alignment of formal specifications for business processes and formal spe-cifications for prescriptive (legal) documents.

• Conceptually sound representation of processes• Conceptually sound representation of and reasoning with norms

• we can identify formal loopholes, deadlocks and inconsistencies innormative systems, and

• we can make hidden conditions explicit

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 4/64

Page 12: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Part I

Business Process Models

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 5/64

Page 13: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Business Process Model

Self-contained, temporal and logical order in which a set of activities areexecuted to achieve a business goal. It describes:

• What needs be done and when (control flows)

• What we need to work on (data)

• Who is doing the work (human and system resources)

A language for BPM usually has two elements:

• Tasks are activities to be performed• Connectors consist of

• sequence (a task is performed after another task),• parallel—and-split and and-join—(tasks are to be executed in

parallel),• choice—(x)or-split and (x)or-join—(at least (most) one task in a set of

task must be executed).

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 6/64

Page 14: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Business Process Model

Self-contained, temporal and logical order in which a set of activities areexecuted to achieve a business goal. It describes:

• What needs be done and when (control flows)

• What we need to work on (data)

• Who is doing the work (human and system resources)

A language for BPM usually has two elements:

• Tasks are activities to be performed• Connectors consist of

• sequence (a task is performed after another task),• parallel—and-split and and-join—(tasks are to be executed in

parallel),• choice—(x)or-split and (x)or-join—(at least (most) one task in a set of

task must be executed).

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 6/64

Page 15: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Business Process Model

Self-contained, temporal and logical order in which a set of activities areexecuted to achieve a business goal. It describes:

• What needs be done and when (control flows)

• What we need to work on (data)

• Who is doing the work (human and system resources)

A language for BPM usually has two elements:

• Tasks are activities to be performed

• Connectors consist of

• sequence (a task is performed after another task),• parallel—and-split and and-join—(tasks are to be executed in

parallel),• choice—(x)or-split and (x)or-join—(at least (most) one task in a set of

task must be executed).

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 6/64

Page 16: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Business Process Model

Self-contained, temporal and logical order in which a set of activities areexecuted to achieve a business goal. It describes:

• What needs be done and when (control flows)

• What we need to work on (data)

• Who is doing the work (human and system resources)

A language for BPM usually has two elements:

• Tasks are activities to be performed• Connectors consist of

• sequence (a task is performed after another task),• parallel—and-split and and-join—(tasks are to be executed in

parallel),• choice—(x)or-split and (x)or-join—(at least (most) one task in a set of

task must be executed).

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 6/64

Page 17: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Business Process Model

Self-contained, temporal and logical order in which a set of activities areexecuted to achieve a business goal. It describes:

• What needs be done and when (control flows)

• What we need to work on (data)

• Who is doing the work (human and system resources)

A language for BPM usually has two elements:

• Tasks are activities to be performed• Connectors consist of

• sequence (a task is performed after another task),

• parallel—and-split and and-join—(tasks are to be executed inparallel),

• choice—(x)or-split and (x)or-join—(at least (most) one task in a set oftask must be executed).

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 6/64

Page 18: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Business Process Model

Self-contained, temporal and logical order in which a set of activities areexecuted to achieve a business goal. It describes:

• What needs be done and when (control flows)

• What we need to work on (data)

• Who is doing the work (human and system resources)

A language for BPM usually has two elements:

• Tasks are activities to be performed• Connectors consist of

• sequence (a task is performed after another task),

• parallel—and-split and and-join—(tasks are to be executed inparallel),

• choice—(x)or-split and (x)or-join—(at least (most) one task in a set oftask must be executed).

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 6/64

Page 19: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Business Process Model

Self-contained, temporal and logical order in which a set of activities areexecuted to achieve a business goal. It describes:

• What needs be done and when (control flows)

• What we need to work on (data)

• Who is doing the work (human and system resources)

A language for BPM usually has two elements:

• Tasks are activities to be performed• Connectors consist of

• sequence (a task is performed after another task),

• parallel—and-split and and-join—(tasks are to be executed inparallel),

• choice—(x)or-split and (x)or-join—(at least (most) one task in a set oftask must be executed).

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 6/64

Page 20: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Business Process Model Example

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 7/64

Page 21: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Execution Traces

A

B

D

C

E

F

G

H

t1 : A, B, C, D, E , F , Ht2 : A, D, B, C, E , G, Ht3 : A, D, B, C, E , F , H. . .

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 8/64

Page 22: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Trace:From sequence of tasks to sequence of states

Let Lit be a set of literals, T be the set of traces of a process and N bethe set of natural numbers

State : T × N 7→ 2Lit

The function State returns the set of literals describing “what’s going onin a trace t after the execution of the n-th task in the process”.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 9/64

Page 23: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

A B

C

D

Tasks

• A: “turn the light on”

• B: “check if glass is empty”

• C: “fill glass with water”

• D: “turn glass upside-down”

Propositions

• p: “the light is on”

• q: “the glass is full”

Trace 1: 〈A, B, D〉Trace 2: 〈A, B, C, D〉• State(i , 1) = { p }, i ∈ { 1, 2 }

• State(1, 2) = { p, q }

• State(2, 2) = { p,¬q }

• State(2, 3) = { p, q }

• State(1, 3) = { p,¬q }

• State(2, 4) = { p,¬q }

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 10/64

Page 24: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

A B

C

D

Tasks

• A: “turn the light on”

• B: “check if glass is empty”

• C: “fill glass with water”

• D: “turn glass upside-down”

Propositions

• p: “the light is on”

• q: “the glass is full”

Trace 1: 〈A, B, D〉Trace 2: 〈A, B, C, D〉• State(i , 1) = { p }, i ∈ { 1, 2 }

• State(1, 2) = { p, q }

• State(2, 2) = { p,¬q }

• State(2, 3) = { p, q }

• State(1, 3) = { p,¬q }

• State(2, 4) = { p,¬q }

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 10/64

Page 25: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

A B

C

D

Tasks

• A: “turn the light on”

• B: “check if glass is empty”

• C: “fill glass with water”

• D: “turn glass upside-down”

Propositions

• p: “the light is on”

• q: “the glass is full”

Trace 1: 〈A, B, D〉Trace 2: 〈A, B, C, D〉

• State(i , 1) = { p }, i ∈ { 1, 2 }

• State(1, 2) = { p, q }

• State(2, 2) = { p,¬q }

• State(2, 3) = { p, q }

• State(1, 3) = { p,¬q }

• State(2, 4) = { p,¬q }

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 10/64

Page 26: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

A B

C

D

Tasks

• A: “turn the light on”

• B: “check if glass is empty”

• C: “fill glass with water”

• D: “turn glass upside-down”

Propositions

• p: “the light is on”

• q: “the glass is full”

Trace 1: 〈A, B, D〉Trace 2: 〈A, B, C, D〉• State(i , 1) = { p }, i ∈ { 1, 2 }

• State(1, 2) = { p, q }

• State(2, 2) = { p,¬q }

• State(2, 3) = { p, q }

• State(1, 3) = { p,¬q }

• State(2, 4) = { p,¬q }

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 10/64

Page 27: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Part II

Modelling Norms

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 11/64

Page 28: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Key components of Normative Systems

A normative system is a set of clauses (norms).

Norms are modelled as if . . . then rules

A1, . . . , An ⇒ C

• Definitional clauses (constitutive rules: defining terms used in alegal context)

• Prescriptive clauses (norms defining “normative effects”)• obligations• permissions• prohibitions• violations

Norms are defeasible (handling exceptions)

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 12/64

Page 29: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Key components of Normative Systems

A normative system is a set of clauses (norms).Norms are modelled as if . . . then rules

A1, . . . , An ⇒ C

• Definitional clauses (constitutive rules: defining terms used in alegal context)

• Prescriptive clauses (norms defining “normative effects”)• obligations• permissions• prohibitions• violations

Norms are defeasible (handling exceptions)

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 12/64

Page 30: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Key components of Normative Systems

A normative system is a set of clauses (norms).Norms are modelled as if . . . then rules

A1, . . . , An ⇒ C

• Definitional clauses (constitutive rules: defining terms used in alegal context)

• Prescriptive clauses (norms defining “normative effects”)• obligations• permissions• prohibitions• violations

Norms are defeasible (handling exceptions)

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 12/64

Page 31: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Normative Effects

Obligation A situation, an act, or a course of action to which a beareris legally bound, and if it is not achieved or performedresults in a violation.

Prohibition A situation, an act, or a course of action which a bearershould avoid, and if it is achieved results in a violation.

Permission Something is permitted if the obligation or the prohibition tothe contrary does not hold.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 13/64

Page 32: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

Contract fragment

3.1 A “Premium Customer” is a customer who has spent more that$10000 in goods.

3.2 Services marked as “special order” are subject to a 5% surcharge.Premium customers are exempt from special order surcharge.

5.2 The (Supplier) shall on receipt of a purchase order for (Services)make them available within one day.

5.3 If for any reason the conditions stated in 4.1 or 4.2 are not met the(Purchaser) is entitled to charge the (Supplier) the rate of $100 foreach hour the (Service) is not delivered.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 14/64

Page 33: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Defeasibility:Reasonable results with minimum effort

Factual omniscience and (non-)monotonic reasoning

PhD → Uni

Weekend → ¬Uni

PublicHoliday → ¬Uni

Sick → ¬Uni

Weekend ∧ VICdeadline→ Uni

VICdeadline ∧ PartnerBirthday → ¬Uni

Phd ∧ (¬Weekend ∨ (Weekend ∧ VICdeadline ∧ ¬PartnerBirthday )) ∧ ¬Sick . . . → Uni

VIC= Very Important Conference

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 15/64

Page 34: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Defeasibility:Reasonable results with minimum effort

Factual omniscience and (non-)monotonic reasoning

PhD → Uni

Weekend → ¬Uni

PublicHoliday → ¬Uni

Sick → ¬Uni

Weekend ∧ VICdeadline→ Uni

VICdeadline ∧ PartnerBirthday → ¬Uni

Phd ∧ (¬Weekend ∨ (Weekend ∧ VICdeadline ∧ ¬PartnerBirthday )) ∧ ¬Sick . . . → Uni

VIC= Very Important Conference

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 15/64

Page 35: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Defeasibility:Reasonable results with minimum effort

Factual omniscience and (non-)monotonic reasoning

PhD → Uni

Weekend → ¬Uni

PublicHoliday → ¬Uni

Sick → ¬Uni

Weekend ∧ VICdeadline→ Uni

VICdeadline ∧ PartnerBirthday → ¬Uni

Phd ∧ (¬Weekend ∨ (Weekend ∧ VICdeadline ∧ ¬PartnerBirthday )) ∧ ¬Sick . . . → Uni

VIC= Very Important Conference

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 15/64

Page 36: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Defeasibility:Reasonable results with minimum effort

Factual omniscience and (non-)monotonic reasoning

PhD → Uni

Weekend → ¬Uni

PublicHoliday → ¬Uni

Sick → ¬Uni

Weekend ∧ VICdeadline→ Uni

VICdeadline ∧ PartnerBirthday → ¬Uni

Phd ∧ (¬Weekend ∨ (Weekend ∧ VICdeadline ∧ ¬PartnerBirthday )) ∧ ¬Sick . . . → Uni

VIC= Very Important Conference

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 15/64

Page 37: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Defeasibility:Reasonable results with minimum effort

Factual omniscience and (non-)monotonic reasoning

PhD → Uni

Weekend → ¬Uni

PublicHoliday → ¬Uni

Sick → ¬Uni

Weekend ∧ VICdeadline→ Uni

VICdeadline ∧ PartnerBirthday → ¬Uni

Phd ∧ (¬Weekend ∨ (Weekend ∧ VICdeadline ∧ ¬PartnerBirthday )) ∧ ¬Sick . . . → Uni

VIC= Very Important Conference

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 15/64

Page 38: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Defeasibility:Reasonable results with minimum effort

Factual omniscience and (non-)monotonic reasoning

PhD → Uni

Weekend → ¬Uni

PublicHoliday → ¬Uni

Sick → ¬Uni

Weekend ∧ VICdeadline→ Uni

VICdeadline ∧ PartnerBirthday → ¬Uni

Phd ∧ (¬Weekend ∨ (Weekend ∧ VICdeadline ∧ ¬PartnerBirthday )) ∧ ¬Sick . . . → Uni

VIC= Very Important Conference

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 15/64

Page 39: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Defeasibility:Reasonable results with minimum effort

Factual omniscience and (non-)monotonic reasoning

PhD → Uni

Weekend → ¬Uni

PublicHoliday → ¬Uni

Sick → ¬Uni

Weekend ∧ VICdeadline→ Uni

VICdeadline ∧ PartnerBirthday → ¬Uni

Phd ∧ (¬Weekend ∨ (Weekend ∧ VICdeadline ∧ ¬PartnerBirthday )) ∧ ¬Sick . . . → Uni

VIC= Very Important Conference

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 15/64

Page 40: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Defeasiblity: Example 1

TELECOMMUNICATIONS CONSUMER PROTECTIONS CODE(C628:2012)Section 2.1. DefinitionsComplaint means an expression of dissatisfaction made to a Supplier inrelation to its Telecommunications Products or the complaints handling processitself, where a response or Resolution is explicitly or implicitly expected by theConsumer.

An initial call to a provider to request a service or information or to requestsupport is not necessarily a Complaint. An initial call to report a fault or servicedifficulty is not a Complaint. However, if a Customer advises that they want thisinitial call treated as a Complaint, the Supplier will also treat this initial call as aComplaint.

If a Supplier is uncertain, a Supplier must ask a Customer if they wish to make aComplaint and must rely on the Customer’s response.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 16/64

Page 41: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Defeasiblity: Example 2

NATIONAL CONSUMER CREDIT PROTECTION ACT 2009 (Act No. 134of 2009) Section 29

(1) A person must not engage in a credit activity if the person does nothold a licence authorising the person to engage in the credit activity.

(3) For the purposes of subsections (1) and (2), it is a defence if:(a) the person engages in the credit activity on behalf of another person

(the principal); and(b) the person is:

(i) an employee or director of the principal or of a related body corporateof the principal; or

(ii) a credit representative of the principal; and . . .

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 17/64

Page 42: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Obligations: Deontic Logic

Extension of logic with the operators OBL and PER.

• SpecialOrderPrice(x) = Price(x) + 5%

• OBLSupplier MakeGoodsAvailble1Day

• PERPurchaser ChargeSupplier

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 18/64

Page 43: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Standard Deontic Logic

Extension of classical logic with the modal operators OBL and PER.

• OBLα ≡ ¬PER¬α, PERα ≡ ¬OBL¬α• OBL(α→ β)→ (OBLα→ OBLβ)

• OBLα→ PERα or (OBLα→ ¬OBL¬α)

Standard Deontic Logic is not able to deal with violations

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 19/64

Page 44: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Standard Deontic Logic

Extension of classical logic with the modal operators OBL and PER.

• OBLα ≡ ¬PER¬α, PERα ≡ ¬OBL¬α• OBL(α→ β)→ (OBLα→ OBLβ)

• OBLα→ PERα or (OBLα→ ¬OBL¬α)

Standard Deontic Logic is not able to deal with violations

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 19/64

Page 45: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Violation paradox

Rules for Last JD Lectures• Guido should not tell lies in his presentation

• If Guido tells a lie then he has to explain why

• It ought to be the case that if Guido does not tell a lie then he doesnot explain why

• Guido tells lies in his presentation

• OBL¬lie

• lie→ OBLexplain

• OBL(¬lie→ ¬explain)

• lie

OBLexplain and OBL¬explain

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 20/64

Page 46: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Violation paradox

Rules for Last JD Lectures• Guido should not tell lies in his presentation

• If Guido tells a lie then he has to explain why

• It ought to be the case that if Guido does not tell a lie then he doesnot explain why

• Guido tells lies in his presentation

• OBL¬lie

• lie→ OBLexplain

• OBL(¬lie→ ¬explain)

• lie

OBLexplain and OBL¬explain

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 20/64

Page 47: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Violation paradox

Rules for Last JD Lectures• Guido should not tell lies in his presentation

• If Guido tells a lie then he has to explain why

• It ought to be the case that if Guido does not tell a lie then he doesnot explain why

• Guido tells lies in his presentation

• OBL¬lie

• lie→ OBLexplain

• OBL(¬lie→ ¬explain)

• lie

OBLexplain and OBL¬explain

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 20/64

Page 48: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Kobayashi Maru

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 21/64

Page 49: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

What’s the problem?

a⇒ Ob¬b ⇒ Oc

¬c ⇒ Od

What about a, ¬b but d?

A logic of violations

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 22/64

Page 50: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

What’s the problem?

a⇒ Ob¬b ⇒ Oc

¬c ⇒ Od

What about a, ¬b but d?

A logic of violations

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 22/64

Page 51: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

What’s the problem?

a⇒ Ob¬b ⇒ Oc

¬c ⇒ Od

What about a, ¬b but d?

A logic of violations

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 22/64

Page 52: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

What’s the problem?

a⇒ Ob¬b ⇒ Oc

¬c ⇒ Od

What about a, ¬b but d?

A logic of violations

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 22/64

Page 53: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Logic of Violations

1 A (normative) prescriptive clause is represented by a ruleA1, . . . , An ` XB.

2 A violation does not exist without an obligation it violates.

3 A reparation of a violation does not exist without a violation it repairs.

4 A reparation can be an obligation itself, and thus it can be violated.

5 Permissions cannot be violated.

• Prescriptive clauses cannot be taken in isolation.

• It is possible to have chains of obligations/violations

• New prescriptive clauses can be derived from the given prescriptiveclauses

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 23/64

Page 54: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Logic of Violations

1 A (normative) prescriptive clause is represented by a ruleA1, . . . , An ` XB.

2 A violation does not exist without an obligation it violates.

3 A reparation of a violation does not exist without a violation it repairs.

4 A reparation can be an obligation itself, and thus it can be violated.

5 Permissions cannot be violated.

• Prescriptive clauses cannot be taken in isolation.

• It is possible to have chains of obligations/violations

• New prescriptive clauses can be derived from the given prescriptiveclauses

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 23/64

Page 55: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Logic of Violations

1 A (normative) prescriptive clause is represented by a ruleA1, . . . , An ` XB.

2 A violation does not exist without an obligation it violates.

3 A reparation of a violation does not exist without a violation it repairs.

4 A reparation can be an obligation itself, and thus it can be violated.

5 Permissions cannot be violated.

• Prescriptive clauses cannot be taken in isolation.

• It is possible to have chains of obligations/violations

• New prescriptive clauses can be derived from the given prescriptiveclauses

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 23/64

Page 56: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Logic of Violations

1 A (normative) prescriptive clause is represented by a ruleA1, . . . , An ` XB.

2 A violation does not exist without an obligation it violates.

3 A reparation of a violation does not exist without a violation it repairs.

4 A reparation can be an obligation itself, and thus it can be violated.

5 Permissions cannot be violated.

• Prescriptive clauses cannot be taken in isolation.

• It is possible to have chains of obligations/violations

• New prescriptive clauses can be derived from the given prescriptiveclauses

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 23/64

Page 57: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Logic of Violations

1 A (normative) prescriptive clause is represented by a ruleA1, . . . , An ` XB.

2 A violation does not exist without an obligation it violates.

3 A reparation of a violation does not exist without a violation it repairs.

4 A reparation can be an obligation itself, and thus it can be violated.

5 Permissions cannot be violated.

• Prescriptive clauses cannot be taken in isolation.

• It is possible to have chains of obligations/violations

• New prescriptive clauses can be derived from the given prescriptiveclauses

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 23/64

Page 58: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Logic of Violations

1 A (normative) prescriptive clause is represented by a ruleA1, . . . , An ` XB.

2 A violation does not exist without an obligation it violates.

3 A reparation of a violation does not exist without a violation it repairs.

4 A reparation can be an obligation itself, and thus it can be violated.

5 Permissions cannot be violated.

• Prescriptive clauses cannot be taken in isolation.

• It is possible to have chains of obligations/violations

• New prescriptive clauses can be derived from the given prescriptiveclauses

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 23/64

Page 59: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Logic of Violations

1 A (normative) prescriptive clause is represented by a ruleA1, . . . , An ` XB.

2 A violation does not exist without an obligation it violates.

3 A reparation of a violation does not exist without a violation it repairs.

4 A reparation can be an obligation itself, and thus it can be violated.

5 Permissions cannot be violated.

• Prescriptive clauses cannot be taken in isolation.

• It is possible to have chains of obligations/violations

• New prescriptive clauses can be derived from the given prescriptiveclauses

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 23/64

Page 60: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Logic of Violations

1 A (normative) prescriptive clause is represented by a ruleA1, . . . , An ` XB.

2 A violation does not exist without an obligation it violates.

3 A reparation of a violation does not exist without a violation it repairs.

4 A reparation can be an obligation itself, and thus it can be violated.

5 Permissions cannot be violated.

• Prescriptive clauses cannot be taken in isolation.

• It is possible to have chains of obligations/violations

• New prescriptive clauses can be derived from the given prescriptiveclauses

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 23/64

Page 61: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Norms

Norms are modelled as rules in FCL.

Language • literals p, q, . . . (atomic proposition and their negation)• deontic literals Op (Obligatory p), P (Permitted p), Fp

(Forbidden p, i.e., O¬p.)

Rules • Normal rulesA1, . . . , An ⇒ OB

A1 . . . , An trigger the obligation of B.• Rules for violations

A1, . . . , An ⇒ OB1 ⊗ OB2 ⊗ OB3 ⊗ · · · ⊗ OBn

A1 . . . , An trigger the obligation of B1 but if B1 isviolated then B2 is obligatory and so on.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 24/64

Page 62: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

A Legal Zoo

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 25/64

Page 63: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Obligations

Let Lit be a set of literals, T be the set of traces of a process and N bethe set of natural numbers

Force : T × N 7→ 2Lit

The function Force returns the set of literals describing what is obligatoryfor a particular task.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 26/64

Page 64: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Obligations

Let Lit be a set of literals, T be the set of traces of a process and N bethe set of natural numbers

Force : T × N 7→ 2Lit

The function Force returns the set of literals describing what is obligatoryfor a particular task.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 26/64

Page 65: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Persistent vs immediate obligations

• An immediate (or punctual or non-persistent) obligation must besatisfied in the task where it occurs.‘complaints in person or by phone must be acknowledgeimmediately’

• A persistent obligation is activated and it remain in force in thefuture after it has been activated.‘A service provider must not disclose personal information withoutthe written consent of the customer’

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 27/64

Page 66: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Punctual Obligations

Definition (Punctual Obligation)

An obligation o is a punctual obligation in t if and only if

∃n ∈ N : o /∈ Force(t , n – 1), o /∈ Force(t , n + 1), o ∈ Force(t , n).

A punctual obligation o is violated in t if and only if o /∈ State(t , n).

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 28/64

Page 67: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Graphical Illustration of a Punctual Obligation

1t

n – 1 n n + 1 zo ∈ Force(t , n)

o /∈ State(t , n)violation of o

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 29/64

Page 68: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Persistent Obligations: Achievement vsMaintenance

• For an achievement obligation, a certain condition must occur atleast once before the deadline‘Customers must pay before the delivery of the good, after receivingthe invoice’

• For maintenance obligations, a certain condition must obtainduring all instants before the deadline:‘After opening a bank account, customers must keep a positivebalance until bank charges are taken out’

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 30/64

Page 69: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Maintenance Obligations

Definition (Maintenance Obligation)

An obligation o is a maintenance obligation in t if and only if

∃n, m ∈ N : n < m,

o /∈ Force(t , n – 1),

o /∈ Force(t , m + 1),

∀k : n ≤ k ≤ m, o ∈ Force(t , k )

A maintenance obligation o is violated in t if and only if

∃k : n ≤ k ≤ m, o /∈ State(t , k ).

It is possible to relax/strengthen the condition by dropping the conditionson m.Maintenance obligations can be used to model prohibitions.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 31/64

Page 70: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Maintenance Obligations

Definition (Maintenance Obligation)

An obligation o is a maintenance obligation in t if and only if

∃n, m ∈ N : n < m,

o /∈ Force(t , n – 1),

o /∈ Force(t , m + 1),

∀k : n ≤ k ≤ m, o ∈ Force(t , k )

A maintenance obligation o is violated in t if and only if

∃k : n ≤ k ≤ m, o /∈ State(t , k ).

It is possible to relax/strengthen the condition by dropping the conditionson m.

Maintenance obligations can be used to model prohibitions.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 31/64

Page 71: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Maintenance Obligations

Definition (Maintenance Obligation)

An obligation o is a maintenance obligation in t if and only if

∃n, m ∈ N : n < m,

o /∈ Force(t , n – 1),

o /∈ Force(t , m + 1),

∀k : n ≤ k ≤ m, o ∈ Force(t , k )

A maintenance obligation o is violated in t if and only if

∃k : n ≤ k ≤ m, o /∈ State(t , k ).

It is possible to relax/strengthen the condition by dropping the conditionson m.Maintenance obligations can be used to model prohibitions.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 31/64

Page 72: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Graphical Illustration of a Maintenance Obligation

t1 n – 1

o /∈ Force

n k m m + 1

o /∈ Force

z

o ∈ Force

o /∈ State(t , k )violation of o

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 32/64

Page 73: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Achievement Obligations:Preemptive vs Non-preemptive

• preemptive obligations: the fulfillment of an obligation can happenbefore the obligation has been triggered.(1) A report under section 53 must be given:

(a) if the movement of the physical currency is to be effected by a personbringing the physical currency into Australia with the person—at thetime worked out under subsection (2); or

[. . .](d) in any other case—at any time before the movement of the physical

currency takes place.’

• non preemptive obligations: the fulfillment of an obligation canhappen only after the obligation has been triggered.‘Executors and administrators of a decedent’s estate will be requiredto give notice to each beneficiary named in the Will within 60 daysafter the date when an order admitting a will to probate has beensigned.’

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 33/64

Page 74: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Achievement Obligations

Definition (Achievement Obligation)

An obligation o is an achievement obligation in t if and only if

∃n, m ∈ N : n < m,

o /∈ Force(t , n – 1),

o /∈ Force(t , m + 1),

∀k : n ≤ k ≤ m, o ∈ Force(t , k )

An achievement obligation o is violated in t if and only if

• o is preemptive and ∀k : k ≤ m, o /∈ State(t , k );

• o is non-preemptive and ∀k : n ≤ k ≤ m, o /∈ State(t , k ).

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 34/64

Page 75: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Graphical Illustration of Achievement Obligations

Achievement preemptive

t1 n – 1

o /∈ Force

n m m + 1

o /∈ Force

z

o ∈ Force

o /∈ State violation of o

Achievement non-preemptive

t1 n – 1

o /∈ Force

n m m + 1

o /∈ Force

z

o ∈ Force

o /∈ State violation of o

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 35/64

Page 76: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Perdurant vs Non-Perdurant

• perdurant obligation: the violation of the obligation does notextinguish the obligation itself.‘A billing error must be fixed in the next billing cycle’

• non-perdurant obligation: the violation of the obligation terminatesthe obligation.‘The assignment must be submitted by the due date’

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 36/64

Page 77: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Perdurant Obligations

Definition (Perdurant Obligation)

An obligation o is a perdurant obligation in t if and only if

∃n, m ∈ N : n < m,

o /∈ Force(t , n – 1),

o /∈ Force(t , m + 1),

∀k : n ≤ k ≤ m, o ∈ Force(t , k )

A perdurant obligation o is violated in t if and only if

∃k : n < k < m, ∀j , j ≤ k , o /∈ State(t , j)

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 37/64

Page 78: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Graphical Illustration of Perdurant Obligations

t1 n – 1

o /∈ Force

n d m m + 1

o /∈ Force

z

o ∈ Force

violation of oo /∈ State(t , k )

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 38/64

Page 79: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Compensable vs Non-compensable

• compensable obligations: fulfilling the penalty related to theviolation of the obligation makes the process compliant.‘Each complaint must be either resolved or escalated and reportedto the Telecommunication Ombudsmen’

• non-compensable obligations: violating the obligation makes theprocess non-compliant.‘To pass the course a student has to pass the final exam’

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 39/64

Page 80: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Compensations or Acceptable Alternatives?

TCPC 2012, Section 8.1.1. . . implement, operate and comply with a Complaint handling processthat:(vii) requires all Complaints to be:

A. Resolved in an objective, efficient and fair manner; andB. escalated and managed under the Supplier’s internal escalation

process if requested by the Consumer or a former Customer.

YAWL Deed of Assignment, Clause 5.2.Each Contributor indemnifies and will defend the Foundation against anyclaim, liability, loss, damages, cost and expenses suffered or incurred bythe Foundation as a result of any breach of the warranties given by theContributor under clause 5.1.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 40/64

Page 81: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Compensations or Acceptable Alternatives?

TCPC 2012, Section 8.1.1. . . implement, operate and comply with a Complaint handling processthat:(vii) requires all Complaints to be:

A. Resolved in an objective, efficient and fair manner; andB. escalated and managed under the Supplier’s internal escalation

process if requested by the Consumer or a former Customer.

YAWL Deed of Assignment, Clause 5.2.Each Contributor indemnifies and will defend the Foundation against anyclaim, liability, loss, damages, cost and expenses suffered or incurred bythe Foundation as a result of any breach of the warranties given by theContributor under clause 5.1.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 40/64

Page 82: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Modelling Compensations

Definition (Compensation)

A compensation is a function Comp : Lit 7→ 2Lit .

Definition (Compensable Obligation)

An obligation o is compensable in t if and only if Comp(o) 6= ∅ and∀o′ ∈ Comp(o),∃n ∈ N : o′ ∈ Force(t , n).

Definition (Compensated Obligation)

An obligation o is compensated in t if and only if it is violated and forevery o′ ∈ Comp(o) either:

1 o′ is not violated in t , or

2 o′ is compensated in t .The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 41/64

Page 83: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Why Defeasible Logic

Rule-based non-monotonic formalism

• Flexible

• Efficient (linear complexity)

• Directly skeptic semantics

• Argumentation semantics

• Constrictive proof theory

• Encompasses other non-monotonic formalisms used in AI and Law

• Applied in several fields/optimised implementations

• Extensible

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 42/64

Page 84: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Why Defeasible Logic

Rule-based non-monotonic formalism

• Flexible

• Efficient (linear complexity)

• Directly skeptic semantics

• Argumentation semantics

• Constructive proof theory

• Encompasses other non-monotonic formalisms used in AI and Law

• Applied in several fields/optimised implementations

• Extensible

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 42/64

Page 85: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Basics of Defeasible Logic

• Derive (plausible) conclusions with the minimum amount ofinformation.• Definite conclusions• Defeasible conclusions

• Defeasible Theory• Facts• Strict rules (A→ B)• Defeasible rules (A⇒ B)• Defeaters (A ; B)• Superiority relation over rules

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 43/64

Page 86: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Proving Conclusions in Defeasible Logic

1 Give an argument for the conclusion you want to prove

2 Consider all possible counterarguments to it3 Rebut all counterarguments

• Defeat the argument by a stronger one• Undercut the argument by showing that some of the premises do not

hold

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 44/64

Page 87: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Proving Conclusions in Defeasible Logic

1 Give an argument for the conclusion you want to prove

2 Consider all possible counterarguments to it

3 Rebut all counterarguments

• Defeat the argument by a stronger one• Undercut the argument by showing that some of the premises do not

hold

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 44/64

Page 88: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Proving Conclusions in Defeasible Logic

1 Give an argument for the conclusion you want to prove

2 Consider all possible counterarguments to it3 Rebut all counterarguments

• Defeat the argument by a stronger one• Undercut the argument by showing that some of the premises do not

hold

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 44/64

Page 89: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Proving Conclusions in Defeasible Logic

1 Give an argument for the conclusion you want to prove

2 Consider all possible counterarguments to it3 Rebut all counterarguments

• Defeat the argument by a stronger one• Undercut the argument by showing that some of the premises do not

hold

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 44/64

Page 90: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

Facts: A1, A2, B1, B2

Rules: r1 : A1 ⇒ Cr2 : A2 ⇒ Cr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬C

Superiority relation:r1 > r3r2 > r4r5 > r1

Phase 1: Argument for CA1 (Fact), r1 : A1 ⇒ CPhase 2: Possible counterargumentsr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬CPhase 3: Rebut the counterargumentsr3 weaker than r1r4 weaker than r2r5 is not applicable

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 45/64

Page 91: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

Facts: A1, A2, B1, B2

Rules: r1 : A1 ⇒ Cr2 : A2 ⇒ Cr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬C

Superiority relation:r1 > r3r2 > r4r5 > r1

Phase 1: Argument for C

A1 (Fact), r1 : A1 ⇒ CPhase 2: Possible counterargumentsr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬CPhase 3: Rebut the counterargumentsr3 weaker than r1r4 weaker than r2r5 is not applicable

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 45/64

Page 92: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

Facts: A1, A2, B1, B2

Rules: r1 : A1 ⇒ Cr2 : A2 ⇒ Cr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬C

Superiority relation:r1 > r3r2 > r4r5 > r1

Phase 1: Argument for CA1 (Fact), r1 : A1 ⇒ C

Phase 2: Possible counterargumentsr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬CPhase 3: Rebut the counterargumentsr3 weaker than r1r4 weaker than r2r5 is not applicable

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 45/64

Page 93: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

Facts: A1, A2, B1, B2

Rules: r1 : A1 ⇒ Cr2 : A2 ⇒ Cr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬C

Superiority relation:r1 > r3r2 > r4r5 > r1

Phase 1: Argument for CA1 (Fact), r1 : A1 ⇒ CPhase 2: Possible counterarguments

r3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬CPhase 3: Rebut the counterargumentsr3 weaker than r1r4 weaker than r2r5 is not applicable

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 45/64

Page 94: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

Facts: A1, A2, B1, B2

Rules: r1 : A1 ⇒ Cr2 : A2 ⇒ Cr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬C

Superiority relation:r1 > r3r2 > r4r5 > r1

Phase 1: Argument for CA1 (Fact), r1 : A1 ⇒ CPhase 2: Possible counterargumentsr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬C

Phase 3: Rebut the counterargumentsr3 weaker than r1r4 weaker than r2r5 is not applicable

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 45/64

Page 95: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

Facts: A1, A2, B1, B2

Rules: r1 : A1 ⇒ Cr2 : A2 ⇒ Cr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬C

Superiority relation:r1 > r3r2 > r4r5 > r1

Phase 1: Argument for CA1 (Fact), r1 : A1 ⇒ CPhase 2: Possible counterargumentsr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬CPhase 3: Rebut the counterarguments

r3 weaker than r1r4 weaker than r2r5 is not applicable

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 45/64

Page 96: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Example

Facts: A1, A2, B1, B2

Rules: r1 : A1 ⇒ Cr2 : A2 ⇒ Cr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬C

Superiority relation:r1 > r3r2 > r4r5 > r1

Phase 1: Argument for CA1 (Fact), r1 : A1 ⇒ CPhase 2: Possible counterargumentsr3 : B1 ⇒ ¬Cr4 : B2 ⇒ ¬Cr5 : B3 ⇒ ¬CPhase 3: Rebut the counterargumentsr3 weaker than r1r4 weaker than r2r5 is not applicable

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 45/64

Page 97: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Extending the language of Defeasible Logic

• extend the language with the deontic operators OBL and PER.

• extend the language with the reparation operator. Permitted only inthe head/conclusion of rules.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 46/64

Page 98: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Extending the proof mechanism of DefeasibleLogic

• To prove OBLpn from a rule A⇒ OBLp1 ⊗ · · · ⊗OBLpn–1 ⊗OBLpn,we have to show that ¬p1, . . . ,¬pn–1 are provable.

• To disprove OBLpn from a ruleA⇒ OBLp1 ⊗ · · · ⊗ OBLpn–1 ⊗ OBLpn, that at least one amongp1, . . . , pn1 are rejected.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 47/64

Page 99: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Business Process Compliance Problem

Given a business process model

• identify what holds in the process• identify what norms are valid for the process

• determine what are the obligations, prohibitions, and permissions inforce

• determine when the obligations, prohibitions and permissions are inforce in the process (for each trace)

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 48/64

Page 100: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Business Process Compliance

Recommendations

Wh

at-if

an

alys

is

Sta

tus

repo

rt

Compliance checker

Obligations

Input

Annotated process model

.

.

.

Logical state representation

FormalisationLegaleseRule1

Rule2

Rule3

Rule4

Rule5

Rule6

Rule7

Rule8

Rule9

...

Compliance rule base & checker

Recommendation sub-system

I*(e1)

I*(e3)

I*(e4)

I*(e2)

T2

Post2

T1

Post1

T4

Post4

T3

Post3

T5

Post5

T6

Post6T7

Post7

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 49/64

Page 101: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance Recipe

1 Determine the effects of each task and propagate them tosuccessive tasks

• Use the effects to trigger obligations. Run FCL with the effects of atask as input.

• Check which obligations have been fulfilled, violated• Shake well and serve!

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 50/64

Page 102: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance Recipe

1 Determine the effects of each task and propagate them tosuccessive tasks• Use the effects to trigger obligations. Run FCL with the effects of a

task as input.

• Check which obligations have been fulfilled, violated• Shake well and serve!

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 50/64

Page 103: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance Recipe

1 Determine the effects of each task and propagate them tosuccessive tasks• Use the effects to trigger obligations. Run FCL with the effects of a

task as input.• Check which obligations have been fulfilled, violated

• Shake well and serve!

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 50/64

Page 104: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance Recipe

1 Determine the effects of each task and propagate them tosuccessive tasks• Use the effects to trigger obligations. Run FCL with the effects of a

task as input.• Check which obligations have been fulfilled, violated• Shake well and serve!

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 50/64

Page 105: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

The Journey to Compliance

1 Take or design a business process2 Annotate the process

• effects of the tasks (each task is annotated with the effects itproduces)

• rules encoding the norms relevant to the process

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 51/64

Page 106: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Adding Annotations

A: Enter New Customer

Information

B: Identity Check

J: Notify Customer and Close Case

G: Accept initial Deposit

F: Apply Account Policy

E: Open Account

D: Approve Account Opening

I: Initiate Account

C: Login for Existing

Customer

H: Accept Empty Initial

Balance

Task Semantic AnnotationA newCustomer (x)B checkIdentity (x)C checkIdentity (x), recordIdentity (x)E owner (x , y ), account(y )F accountType(y , type)G positiveBalance(y )H ¬positiveBalance(y )I accountActive(y )J notify (x , y )

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 52/64

Page 107: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Rules for the Process

• All new customers must be scanned against provided databases foridentity checks.

r1 : newCustomer (x)⇒ OcheckIdentity (x)

• Retain history of identity checks performed.

r2 : checkIdentity (x)⇒ OrecordIdentity (x)

• Accounts must maintain a positive balance, unless approved by a bankmanager, or for VIP customers.

r3 : account(x)⇒ OpositiveBalance(x)⊗ OapproveManager (x)

r4 : account(x), accountType(x , VIP)⇒ P¬positiveBalance(x)

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 53/64

Page 108: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Ideal Semantics: compliance checking

• FCL constraints determine behavioural paths (generic)• behavioural paths special case business processes• currently expressed as event sequences

• Ideal situation• Execution traces do not violate NFCL

• Sub-ideal situation• There are violations, but they are repaired/compensated

• Non-ideal (non-compliant) situation• There are violations, but they are NOT repaired/compensated

• Irrelevant situation• No rule is applicable

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 54/64

Page 109: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Handling Obligations

An obligation chain OA1 ⊗ · · · ⊗ OAn is active given a set of literals S, if

• there is a rule Γ⇒ OA1 ⊗ · · · ⊗OAn such that Γ ⊆ S, i.e., the rule istriggered by the situation, and

• for all rule for conflicting chains, either• the chain is not triggered by the situation or• the negation of an element before the conflicting element is not in the

situation.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 55/64

Page 110: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

The Algorithm

Input:Current set of active obligation chainsA1 ⊗ A2 = C ∈ Current

For each C ∈ Currentif A1 = OB, then

if B ∈ S, thenremove([T , R, A1 ⊗ A2], Current),remove([T , R, A1 ⊗ A2], Unfulfilled)if [T , R, B1 ⊗ B2 ⊗ A1 ⊗ A2] ∈ Violated then

add([T , R, B1 ⊗ B2 ⊗ A1 ⊗ A2], Compensated)if ¬B ∈ S, then

add([T , R, A1 ⊗ A2], Violated), add([T , R, A2], Current)else

add([T , R, A1 ⊗ A2], Unfulfilled).

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 56/64

Page 111: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Finally Compliant!

Definition

• An execution trace is compliant iff for all [T , R, A] ∈ Current ,A = OB ⊗ C, for every [T , R, A, B] ∈ Violated ,[T , R, A, B] ∈ Compensated and Unfulfilled = ∅.

• An execution trace is fully compliant iff for all [T , R, A] ∈ Current ,A = OB ⊗ C, Violated = ∅ and Unfulfilled = ∅.

• A process is (fully) compliant iff all its execution traces are (fully)compliant.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 57/64

Page 112: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Compute the current chains of obligations. Add them to CurrentCurrent[A, r1, Ob1 ⊗ Oc1][A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3]

Violated

Unfulfilled Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 113: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Examine the chain one by one against the effects.Current[A, r1, Ob1 ⊗ Oc1][A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3]

Violated

Unfulfilled Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 114: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Ob1 ⊗ Oc1 and b1. Remove the chain from CurrentCurrent[A, r1, Ob1 ⊗ Oc1][A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3]

Violated

Unfulfilled Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 115: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Ob1 ⊗ Oc1 and b1. Remove the chain from CurrentCurrent[A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3]

Violated

Unfulfilled Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 116: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Ob2 ⊗ Oc2 and ¬b2. ViolationCurrent[A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3]

Violated

Unfulfilled Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 117: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Add the chain to Violated, add the compensatory part to CurrentCurrent[A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3][B, r2, Oc2]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 118: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Ob3 ⊗ Oc3 ⊗ Od3. No information about b3Current[A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3][B, r2, Oc2]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 119: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Remove Ob3 ⊗ Oc3 ⊗ Od3 from Current, add it to UnfulfilledCurrent[A, r2, Ob2 ⊗ Oc2][B, r2, Oc2]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled[A, r3, Ob3 ⊗ Oc3 ⊗ Od3]

Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 120: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Oc2. No information about c2Current[A, r2, Ob2 ⊗ Oc2][B, r2, Oc2]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled[A, r3, Ob3 ⊗ Oc3 ⊗ Od3]

Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 121: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Remove Oc2 from Current, add it to UnfulfilledCurrent[A, r2, Ob2 ⊗ Oc2]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled[A, r3, Ob3 ⊗ Oc3 ⊗ Od3][B, r2, Oc2]

Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 122: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

We have done with B and we move to CCurrent[A, r2, Ob2 ⊗ Oc2]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled[A, r3, Ob3 ⊗ Oc3 ⊗ Od3][B, r2, Oc2]

Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 123: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

We move the elements of Unfulfilled to CurrentCurrent[A, r2, Ob2 ⊗ Oc2]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled[A, r3, Ob3 ⊗ Oc3 ⊗ Od3][B, r2, Oc2]

Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 124: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

We move the elements of Unfulfilled to CurrentCurrent[A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3][B, r2, Oc2]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 125: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

We compute the set of chains for CCurrent[A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3][B, r2, Oc2][C, r5, Oc3]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 126: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Oc2 and c2, remove the chain from CurrentCurrent[A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3][C, r5, Oc3]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled Compensated

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 127: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

B, r2, Ob2 ⊗ Oc2 in Violated and c2, add to CompensatedCurrent[A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3][C, r5, Oc3]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled Compensated[B, r2, Ob2 ⊗ Oc2]

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 128: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Oc3 and c3, remove the chain from CurrentCurrent[A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3][C, r5, Oc3]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled Compensated[B, r2, Ob2 ⊗ Oc2]

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 129: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Checking Compliance: Example

A B C

a1

a2

a3

b1¬b2

c2c3

r1 : a1 ⇒ Ob1 ⊗ Oc1r2 : a2 ⇒ Ob2 ⊗ Oc2r3 : a3 ⇒ Ob3 ⊗ Oc3 ⊗ Od3r4 : a4 ⇒ Ob4 ⊗ Oc4r5 : c2 ⇒ Oc3

Ob3 ⊗ Oc3 ⊗ Od3. No information about b3 Still no informationabout b3. The chain to UnfulfilledCurrent[A, r2, Ob2 ⊗ Oc2][A, r3, Ob3 ⊗ Oc3 ⊗ Od3]

Violated[B, r2, Ob2 ⊗ Oc2]

Unfulfilled Compensated[B, r2, Ob2 ⊗ Oc2]

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 58/64

Page 130: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Regorous

http://www.regorous.com

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 59/64

Page 131: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Evaluation of Regorous

Formalised Chapter 8 (Complaints) of TCPC 2012. Modelled the complianthandling/management processes of an Australian telco

process removed.

41 tasks, 12 decision points (xor), 2 loopsshortest trace: 6 traces longest trace (loop): 33 taskslongest trace (no loop): 22 tasksover 1000 traces, over 25000 states

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 60/64

Page 132: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

Evaluation of Regorous (2)

TCPC 2012 Chapter 8. Contains over 100 commas, plus 120 terms (in Termsand Definition Section).Required 223 propositions, 176 rules.

Punctual Obligation 5 (5)

Achievement Obligation 90 (110)

Preemptive 41 (46)Non preemptive 49 (64)

Non perdurant 5 (7)

Maintenance Obligation 11 (13)

Prohibition 7 (9)Non perdurant 1 (4)

Permission 9 (16)

Compensation 2 (2)

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 61/64

Page 133: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

We Are Here Now

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 62/64

Page 134: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

References

Guido Governatori.Representing business contracts in RuleML.International Journal of Cooperative Information Systems, 14(2-3):181–216, 2005.

Guido Governatori.An Abstract Normative Framework for Business Process Compliance.IT. Information Technology, forthcoming, 2013.

Guido Governatori and Antonino Rotolo.A conceptually rich model of business process compliance.In APCCM 2010, CRPIT, 2010.

Guido Governatori and Antonino Rotolo.Norm Compliance in Business Process Modeling.In RuleML 2010, LNCS 6403, Springer, 2010.

Guido Governatori and Shazia Sadiq.The journey to business process compliance.In Jorge Cardoso and Wil van der Aalst, editors, Handbook of Research on BPM, chapter 20,pages 429–457, IGI Global, 2009.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 63/64

Page 135: The Regorous Approach toBusiness Process Compliance · The Regorous Approach to Business Process Compliance Guido Governatori Last JD, 20 October 2013 NICTA Funding and Supporting

References

Guido Governatori and Shazia ÂoShek.Rule based business process compliance.In Proc. of RuleML2012@ECAI Challenge, CEUR Workshop Proceedings 874, article 5, 2012.

Ruopeng Lu, Shazia Sadiq, and Guido Governatori.Measurement of compliance distance in business processes.Information Systems Management, 25(4):344–355, 2008.

Shazia Sadiq and Guido Governatori.Managing Regulatory Compliance in Business Processes.In Jan van Brocke and Michael Rosemann, editors, Handbook of Business Process Management, Springer,2009.

Shazia Sadiq, Guido Governatori, and Kioumars Naimiri.Modelling of control objectives for business process compliance.In BPM 2007, LNCS 4714, 2007.

The Regorous Approach toBusiness Process Compliance Copyright NICTA 2013Guido Governatori 64/64