Evaluating existing security and privacy requirements for legal compliance

  • Authors:
  • Aaron K. Massey;Paul N. Otto;Lauren J. Hayward;Annie I. Antón

  • Affiliations:
  • North Carolina State University, Department of Computer Science, Raleigh, NC, USA;North Carolina State University, Department of Computer Science, Raleigh, NC, USA and Duke University, School of Law, Durham, NC, USA;North Carolina State University, Department of Computer Science, Raleigh, NC, USA;North Carolina State University, Department of Computer Science, Raleigh, NC, USA

  • Venue:
  • Requirements Engineering - Special Issue on RE'09: Security Requirements Engineering; Guest Editors: Eric Dubois and Haralambos Mouratidis
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Governments enact laws and regulations to safeguard the security and privacy of their citizens. In response, requirements engineers must specify compliant system requirements to satisfy applicable legal security and privacy obligations. Specifying legally compliant requirements is challenging because legal texts are complex and ambiguous by nature. In this paper, we discuss our evaluation of the requirements for iTrust, an open-source Electronic Health Records system, for compliance with legal requirements governing security and privacy in the healthcare domain. We begin with an overview of the method we developed, using existing requirements engineering techniques, and then summarize our experiences in applying our method to the iTrust system. We illustrate some of the challenges that practitioners face when specifying requirements for a system that must comply with law and close with a discussion of needed future research focusing on security and privacy requirements.