Examples for Data Privacy Vocabulary

for Data Privacy Vocabulary (DPV)

Final Community Group Report

This version:
https://www.w3.org/community/reports/dpvcg/CG-FINAL-examples-20250316/
Latest published version:
https://w3id.org/dpv/examples
Latest editor's draft:
https://dev.dpvcg.org/examples
Editor:
Harshvardhan J. Pandit (ADAPT Centre, Dublin City University)
Feedback:
GitHub w3c/dpv (pull requests, new issue, open issues)
Key Publications
Data Privacy Vocabulary (DPV) -- Version 2.0 (2024)

Abstract

This document lists the examples for concepts in DPV and aligned vocabularies. The examples are available in DPVCG GitHub repo under ./examples path.

DPV Specifications: The [DPV] is the core specification within the DPV family, with the following extensions: Personal Data [PD], Locations [LOC], Risk Management [RISK], Technology [TECH] and [AI], [JUSTIFICATIONS], [SECTOR] specific extensions, and [LEGAL] extensions modelling specific jurisdictions and regulations. A [PRIMER] introduces the concepts and modelling of DPV specifications, and [GUIDES] describe application of DPV for specific applications and use-cases. The Search Index page provides a searchable hierarchy of all concepts. The Data Privacy Vocabularies and Controls Community Group (DPVCG) develops and manages these specifications through GitHub. For meetings, see the DPVCG calendar.

To cite and understand the structure of DPV, the article "Data Privacy Vocabulary (DPV) - Version 2.0" (2024) describes the current state of DPV and extensions from version 2.0 onwards (open access version here). The earlier article "Creating A Vocabulary for Data Privacy" (2019) describes how the DPV was developed (open access versions here, here, and here).

Contributing: The DPVCG welcomes participation to improve the DPV and associated resources, including expansion or refinement of concepts, requesting information and applications, and addressing open issues. See contributing guide for further information.

Status of This Document

This specification was published by the Data Privacy Vocabularies and Controls Community Group. It is not a W3C Standard nor is it on the W3C Standards Track. Please note that under the W3C Community Final Specification Agreement (FSA) other conditions apply. Learn more about W3C Community and Business Groups.

GitHub Issues are preferred for discussion of this specification.

The namespaces used in this document are as follows:

: <<https://w3id.org/dpv/examples/vocab#>
dpv:<https://w3id.org/dpv#>
dct:<http://purl.org/dc/terms/>
rdfs:<http://www.w3.org/2000/01/rdf-schema#>
skos:<http://www.w3.org/2004/02/skos/core#>
owl:<http://www.w3.org/2002/07/owl#>
vann:<http://purl.org/vocab/vann/>
xsd:<http://www.w3.org/2001/XMLSchema#>
sh:<http://www.w3.org/ns/shacl#>

1. Vocabulary

1.1 Conformance

As well as sections marked as non-normative, all authoring guidelines, diagrams, examples, and notes in this specification are non-normative. Everything else in this specification is normative.

The key words MAY and MUST in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

1.2 Example

IRIhttps://w3id.org/dpv/use-cases/vocab#
skos:definitionAn Example provides a description where information within the scope of DPVCG is expected to be relevant or applied, and acts as the basis for identifying requirements (including but not limited to creation of concepts). Use cases can contain descriptions of systems, their operations, actors and entities involved, restrictions or constraints, or any other pertinent detail. They can be a simple textual paragraph or elaborative structured documents (in which case we prefer to reference them here as an URL).
  1. An Example MUST have a title (provided using dct:title)
  2. An Example MUST have a description (provided using dct:description)
  3. An Example MUST have an identifier with prefix 'U' (provided using dct:identifier)
  4. An Example MAY have one or more contributors (specified using dct:contributor)
  5. An Example MAY have a date (e.g. creation or modification) (specified using dct:date)
  6. An Example MAY specify the source of its information (using dct:source)
  7. An Example MAY specify its primary subject or concept (using dct:subject)
  8. An Example MAY specify relevant requirements derived from it (using dct:references)

2. Examples

2.1 E0001: Implications of using SKOS vs OWL

2.2 E0002: Extending concepts to represent use-case specific information

2.3 E0003: Extending multiple concepts

2.4 E0004: Interoperability of extended concepts across use-cases

2.5 E0005: Process used to combine core concepts and represent an use-case

2.6 E0006: Nesting Processes

2.7 E0007: Extending Purposes and adding human-readable descriptions

2.8 E0008: Using NACE codes to restrict Purposes

2.9 E0009: Derivation and inference of personal data

2.10 E0010: Indicating personal data is sensitive or special category

2.11 E0011: Indicating Storage Conditions

2.12 E0012: Indicating Data Sources

2.13 E0013: Spam filter as Automated Decision Making with Human Involvement

2.19 E0019: Indicating Entity Information, including DPO and Representatives

2.20 E0020: Using technical measure: Protecting data using encryption and access control

2.21 E0021: Using organisational measure: Indicating staff training for use of Credentials

2.22 E0022: Privacy Notice used in an activity

2.24 E0024: Controller-Processor agreement denoting processing to be carried out

2.25 E0025: Data transfer safeguards

2.26 E0026: Example of Contextual Necessity

2.27 E0027: Indicating risks, consequences, and impacts

2.28 E0028: Rule specifying permission

2.29 E0029: Rule specifying prohibition

2.30 E0030: Rule combining DPV with ODRL

2.32 E0032: Indicating Controller identity and details of representative

2.33 E0033: Indicating Processor as the implementing entity in a process

2.34 E0034: Specifying recipients of data

2.35 E0035: Specifying data exporters and importers

2.36 E0036: Indicate relevant authority for processing

2.37 E0037: Indicating type of organisation and involvement of specific orgnisational units

2.38 E0038: Indicating subsidiaries of an organisation

2.39 E0039: Indicating involvement of data subjects

2.40 E0040: Extending a purpose and using human-readable descriptions

2.41 E0041: Indicating purposes associated with a Service

2.43 E0043: Indicating sector or domain and associating it with a purpose

2.44 E0044: Specifying personal data

2.45 E0045: Indicating data belongs to sensitive or special category

2.46 E0046: Indicating data being collected and derived

2.47 E0047: Indicating processing conditions for duration and location

2.48 E0048: Indicating storage conditions for duration, location, deletion, and restoration

2.49 E0049: Indicating data volume, geo-location coverage, data subject scale, and a processing scale

2.50 E0050: Specifying duration

2.51 E0051: Specifying frequency

2.52 E0052: Specifying necessity and importance in context

2.53 E0053: Specifying applicability of information

2.54 E0054: Specifying status associated with activities

2.55 E0055: Specifying compliance status and lawfulness

2.56 E0056: Specifying the audit status associated with a DPIA

2.57 E0057: Expressing GDPR Right to Data Portability could not be fulfilled due to Identity Verification failure

2.58 E0058: Expressing a right exercise request is delayed due to high volume of requests

2.59 E0059: Exercising the right to rectification with contesting accuracy of information as justification

2.60 E0060: Specifying the location of a process

2.61 E0061: Associating justifications with right exercise non-fulfilment

2.62 E0062: Using justifications across categories

2.63 E0063: Expressing data breach notifications to data subjects are not required using a justification

2.64 E0064: Indicating use of a technical measure and its implementation

2.65 E0065: Specifying legitimate interest of a controller

2.66 E0066: Specifying permissions and prohibitions

2.67 E0067: Indicating applicable rights

2.68 E0068: Using DPV and RISK extension to represent risks

2.69 E0069: Using DPV and RISK extension to represent incidents

2.70 E0070: Indicating personal data involved in an incident

2.71 E0071: Using risk controls to express how tech/org measures address the risk

2.73 E0073: Tracking the status of a Notice across its lifecycle

2.74 E0074: Expressing involvement of a 'human subject' in a process

2.75 E0075: Expressing involvement of tracking and profiling in processing

2.76 E0076: Representing contract metadata and controls

2.77 E0077: Representing the status of contracts

2.78 E0078: Representing clauses or terms within a contract

2.80 E0080: Stating status of Legitimate Interest

2.81 E0081: Stating status of using Official Authority

2.82 E0082: Stating status of using Public Interest

2.83 E0083: Stating status of using Vital Interest

2.84 E0084: Stating status of Rule fulfilment

2.85 E0085: Role of dpv:Processing and using it in dpv:Process

2.86 E0086: Using Risk Controls to indicate measures adopted for a specific event

2.87 E0087: Flexibility of RISK taxonomy in expressing varying roles

2.88 E0088: Expressing impact on specific rights

Funding Acknowledgements

Funding Sponsors

The DPVCG was established as part of the SPECIAL H2020 Project, which received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731601 from 2017 to 2019.

Harshvardhan J. Pandit was funded to work on DPV from 2020 to 2022 by the Irish Research Council's Government of Ireland Postdoctoral Fellowship Grant#GOIPD/2020/790.

The ADAPT SFI Centre for Digital Media Technology is funded by Science Foundation Ireland through the SFI Research Centres Programme and is co-funded under the European Regional Development Fund (ERDF) through Grant#13/RC/2106 (2018 to 2020) and Grant#13/RC/2106_P2 (2021 onwards).

Funding Acknowledgements for Contributors

The contributions of Beatriz Esteves have received funding through the PROTECT ITN Project from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 813497.

The contributions of Harshvardhan J. Pandit have been made with the financial support of Science Foundation Ireland under Grant Agreement No. 13/RC/2106_P2 at the ADAPT SFI Research Centre.

A. References

A.1 Normative references

[AI]
AI Technology concepts for DPV. URL: https://w3id.org/dpv/ai
[DPV]
Data Privacy Vocabulary (DPV) Specification. URL: https://w3id.org/dpv
[GUIDES]
Guides for DPV. URL: https://w3id.org/dpv/guides
[JUSTIFICATIONS]
Concepts representing Justifications for DPV. URL: https://w3id.org/dpv/justifications
Legal Jurisdiction-relevant concepts for DPV. URL: https://w3id.org/dpv/legal
[LOC]
Location and Geo-Political Membership concepts for DPV. URL: https://w3id.org/dpv/loc
[PD]
Personal Data categories for DPV. URL: https://w3id.org/dpv/pd
[PRIMER]
Primer for Data Privacy Vocabulary. URL: https://w3id.org/dpv/primer
[RFC2119]
Key words for use in RFCs to Indicate Requirement Levels. S. Bradner. IETF. March 1997. Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc2119
[RFC8174]
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words. B. Leiba. IETF. May 2017. Best Current Practice. URL: https://www.rfc-editor.org/rfc/rfc8174
[RISK]
Risk Assessment and Management concepts for DPV. URL: https://w3id.org/dpv/risk
[SECTOR]
Sector-specific Extensions for DPV. URL: https://w3id.org/dpv/sector
[TECH]
Technology concepts for DPV. URL: https://w3id.org/dpv/tech

A.2 Informative references

[DCT]
DCMI Metadata Terms (DCT). URL: https://www.dublincore.org/specifications/dublin-core/dcmi-terms/
Consent Records and Receipts as per ISO/IEC TS 27560:2023 using DPV. URL: https://w3id.org/dpv/guides/consent-27560
[TIME]
Time Ontology in OWL. URL: https://www.w3.org/TR/owl-time/