DPV-TECH: Extension providing Technology concepts for DPV

version 0.8.2

Draft Community Group Report

Latest published version:
https://w3id.org/dpv/dpv-tech
Latest editor's draft:
https://w3id.org/dpv/ed/dpv-tech
Editor:
Harshvardhan J. Pandit (ADAPT Centre, Dublin City University)
Authors:
Beatriz Esteves (Universidad Politécnica de Madrid)
Georg P. Krog (Signatu AS)
Harshvardhan J. Pandit (ADAPT Centre, Dublin City University)
Julian Flake (University of Koblenz-Landau)
Paul Ryan (Uniphar PLC)
Feedback:
GitHub w3c/dpv (pull requests, new issue, open issues)

The Data Privacy Vocabulary (DPV) Specification provides a rich taxonomy of concepts which includes Technology. While it enables expression of how some technology is applied within the context of personal data and its processing, there is a need for further specific details regarding technologies, their management, and relevance to actual real-world tools and systems. DPV-TECH provides such concepts associated with Technologies as an extension to DPV concepts.

The namespace for terms in dpv-tech is https://www.w3id.org/dpv/dpv-tech#
The suggested prefix for the namespace is dpv-tech
The DPV-TECH vocabulary and its documentation is available on GitHub.

Issue 47: WARNING: unstable vocabulary

WARNING This vocabulary will be undergoing major changes based on the necessity to specify cloud technology concepts and to ensure provided concepts are useful. There may be extensive removal/additions of concepts that changes the structure and semantics of this extension.

DPV Family of Documents

Related Links

Status of This Document

This specification was published by the Data Privacy Vocabularies and Controls Community Group. It is not a W3C Standard nor is it on the W3C Standards Track. Please note that under the W3C Community Contributor License Agreement (CLA) there is a limited opt-out and other conditions apply. Learn more about W3C Community and Business Groups.

This document is published by the Data Privacy Vocabularies and Controls Community Group (DPVCG) as a deliverable and report of its work in creating and maintaining the Data Privacy Vocabulary (DPV).

Note

Contributing to the DPV and its extensions The DPVCG welcomes participation regarding the DPV, including expansion or refinement of its terms, addressing open issues, and welcomes suggestions on their resolution or mitigation. For further information, please see the contribution section.

GitHub Issues are preferred for discussion of this specification.

1. Overview of Concepts

Figure 1 Overview of concepts in DPV-TECH

This section provides an introduction and overview of the concepts within the DPV-TECH extension, with the Section on Taxonomy providing a formal listing of all concepts.

The central or focal concept is dpv:Technology alongwith its use with the relation dpv:hasTechnology - as defined within [DPV]. This extension extends these concepts - by way of additional subtypes or subclasses or specialisations, and adds more concepts which are relevant to provide a description of technologies as they are utilised towards privacy and data protection.

1.1 Core Concepts

The concept concepts provided in DPV-TECH include subtypes of dpv:Technology as DataTechnology, OperationalTechnology (as in relating to operations or processes), SecurityTechnology, IdentityTechnology, ManagementTechnology, and SurveillanceTechnology. These enable expression of the role of a particular technology within the context of personal data processing.

To indicate how technology was provided or is used, the concept TechnologyProvisionMethod and relation hasProvisionMethod are useful. It enables expression of where technology is used as a Product or Subscription (e.g. from a vendor), or as a System or a Component (e.g. standalone).

The concept CommunicationMechanism and relation hasCommunicationMechanism enables expressing how the technology communicates, such as by use of Internet, Cellular Networks, GPS, etc.

To indicate entities or actors associated with the Technology and their specific roles, the concept TechnologyActor and associated relations are useful.

To represent location of technology use, the existing DPV concepts related to location can be used, i.e. dpv:Location and dpv:hasLocation along with its various types and contextually relevant concepts. To explicitly refer to location as associated with use of technology, the concept TechnologyUsageLocation is provided. For example, to indicate that some technology (whose actual location is on a server) is used in an office. Some synonyms used to indicate usage location for similar information are: application, deployment, or operation.

To indicate the maturity of a technology, the concept TechnologyReadinessLevel and relation hasTRL are useful. This information can be based on standards, such as the ISO 16290:2013, or those provided by other bodies and domains.

1.2 Types of Technologies

1.2.1 Data Technologies

Technologies that involve operating on data, such as to collect, store, use, share, and erase it - are defined as DataTechnology. Since their definition is based on interaction with data, their specific types and hierarchy mirror the dpv:Processing taxonomy. The shared name, such as with dpv:Store as processing operation and DataStorageTechnology as technology, indicates the correspondence between processing and the technology that performs it.

1.2.2 Operational Technologies

OperationalTechnology relates to the processes or operations that themselves do not relate directly to data, such as execution environments, devices, or other processes - that are necessary or relevant for processing data. This is differentiated from DataTechnology in that technology related to operations refers only to the implementation and execution whereas data technology would be focused on how it involves or processes data.

Specific types of operational technologies include OperationEnvironment, OperationDevice, and OperationManagement. The concept Application represents the program or application which is the operation, or contains or facilitates its execution.

1.2.3 Security Technologies

SecurityTechnology refers to any technology whose purpose is to provide security whether directly (e.g. securing access) or indirectly (e.g. PETs, identifying vulnerabilities). Specific types of security technologies include PET (Privacy Enhancing Technologies), and the risk-based categorisation as DetectionSecurityTechnology that detects security issues and vulnerabilities, PreventionSecurityTechnology that provides prevention or avoidance of exploitation, MitigationSecurityTechnology that provides reduction or mitigation of effects, and MonitoringSecurityTechnology that provides oversight and observations for security issues such as attacks.

1.2.4 Management Technologies

ManagementTechnology relates to managing or orchestrating or monitoring - such as the other technology types. It can also include purely managerial technologies such as dedicated control interfaces or dashboards or tools orchestrating processes. While there is some ambiguity regarding what management exactly means, this concept is provided for the benefit of use-cases where it needs to be explicitly shown that some management occurs or involves the use of technologies. For example, to include that access control (a security technology) is managed through use of a dedicated tool or algorithm (a management technology).

1.2.5 Identity Technologies

IdentityTechnology relates to technologies that are related to identity, identification, or identifiers. This includes their generation, verification, use in authentication, and management (e.g. by combining with ManagementTechnology).

1.2.6 Surveillance Technologies

In addition to these, a sixth additional broad concept of SurveillanceTechnology can also function as a category so as to explicitly acknowledge and represent technologies that have issues or warrant particular attention. Variants of surveillance include OvertSurveillanceTechnology and CovertSurveillanceTechnology.

1.3 Provision of Technology

The provision of technology can happen via the following methods:

1.4 Communication used by Technologies

Communication mediums or mechanism used by technology include:

1.5 Actors involved in Technologies

To specify the specific actors and their roles in the context of technologies, TechnologyActor is provided along with the following specific roles as its subtypes:

Note, that the technology actor concepts are based on the EU's proposal for AI reguation (i.e. AI ACT) and its corresponding concepts (e.g. AI Provider, AI Developer). Rather than limiting such concepts for "AI", we have expanded upon their intended meaning to encompass any technology. The concepts from the AI ACT can thus be modelled as subtypes of these.

2. Core Concepts

2.1 Classes

Communication Mechanism | Data Technology | Identity Technology | Management Technology | Operational Technology | Security Technology | Surveillance Technology | Technology Actor | Technology Provision Method | Technology Readiness Level | Technology Usage Location |

2.1.1 Communication Mechanism

IRI https://w3id.org/dpv/dpv-tech#CommunicationMechanism
Term: CommunicationMechanism
Label: Communication Mechanism
Description: Communication mechanism used or provided by Technologoy
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.2 Data Technology

IRI https://w3id.org/dpv/dpv-tech#DataTechnology
Term: DataTechnology
Label: Data Technology
Description: Technology that uses or interacts with data
SubType of: dpv:Technology
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.3 Identity Technology

IRI https://w3id.org/dpv/dpv-tech#IdentityTechnology
Term: IdentityTechnology
Label: Identity Technology
Description: Technology related to identity or identifiers
SubType of: dpv:Technology
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.4 Management Technology

IRI https://w3id.org/dpv/dpv-tech#ManagementTechnology
Term: ManagementTechnology
Label: Management Technology
Description: Technology that enables or provides management
SubType of: dpv:Technology
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.5 Operational Technology

IRI https://w3id.org/dpv/dpv-tech#OperationalTechnology
Term: OperationalTechnology
Label: Operational Technology
Description: Technology that enables or performs or executes operations and processes
SubType of: dpv:Technology
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.6 Security Technology

IRI https://w3id.org/dpv/dpv-tech#SecurityTechnology
Term: SecurityTechnology
Label: Security Technology
Description: Technology that enables or provides security
SubType of: dpv:Technology
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.7 Surveillance Technology

IRI https://w3id.org/dpv/dpv-tech#SurveillanceTechnology
Term: SurveillanceTechnology
Label: Surveillance Technology
Description: Technology related to surveillance of individuals or people
SubType of: dpv:Technology
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.8 Technology Actor

IRI https://w3id.org/dpv/dpv-tech#TechnologyActor
Term: TechnologyActor
Label: Technology Actor
Description: Actors and Entities involved in provision, use, and management of Technology
SubType of: dpv:Entity
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.9 Technology Provision Method

IRI https://w3id.org/dpv/dpv-tech#TechnologyProvisionMethod
Term: TechnologyProvisionMethod
Label: Technology Provision Method
Description: Method associated with provision or use of technology
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.10 Technology Readiness Level

IRI https://w3id.org/dpv/dpv-tech#TechnologyReadinessLevel
Term: TechnologyReadinessLevel
Label: Technology Readiness Level
Description: Indication of maturity of Technology (ISO 16290:2013)
SubType of: dpv:Technology
Created:
Contributor(s): Harshvardhan J. Pandit

2.1.11 Technology Usage Location

IRI https://w3id.org/dpv/dpv-tech#TechnologyUsageLocation
Term: TechnologyUsageLocation
Label: Technology Usage Location
Description: Location for where technology is provided or used
SubType of: dpv:Location
Created:
Contributor(s): Harshvardhan J. Pandit

2.2 Properties

has communication mechanism | has technology actor | has TRL |

2.2.1 has communication mechanism

IRI https://w3id.org/dpv/dpv-tech#hasCommunicationMechanism
Term: hasCommunicationMechanism
Label: has communication mechanism
Description: Indicates communication mechanisms used or provided by technology
Domain: dpv:Technology
Range: dpv-tech:CommunicationMechanism
Created:
Contributor(s): Harshvardhan J. Pandit

2.2.2 has technology actor

IRI https://w3id.org/dpv/dpv-tech#hasTechnologyActor
Term: hasTechnologyActor
Label: has technology actor
Description: Indicates an actor associated with technology
Domain: dpv:Technology
Range: dpv-tech:TechnologyActor
Created:
Contributor(s): Harshvardhan J. Pandit

2.2.3 has TRL

IRI https://w3id.org/dpv/dpv-tech#hasTRL
Term: hasTRL
Label: has TRL
Description: Indicates technology maturity level
Domain: dpv:Technology
Range: dpv-tech:TechnologyReadinessLevel
Created:
Contributor(s): Harshvardhan J. Pandit

3. Data Tech

3.1 Classes

Data Copying Technology | Data Disclosure Technology | Data Management Technology | Data Obtaining Technology | Data Organising Technology | Data Removal Technology | Data Security Technology | Data Storage Technology | Data Transfer Technology | Data Transformation Technology | Data Usage Technology |

3.1.1 Data Copying Technology

IRI https://w3id.org/dpv/dpv-tech#DataCopyingTechnology
Term: DataCopyingTechnology
Label: Data Copying Technology
Description: Technology related to copying data
SubType of: dpv-tech:DataTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.2 Data Disclosure Technology

IRI https://w3id.org/dpv/dpv-tech#DataDisclosureTechnology
Term: DataDisclosureTechnology
Label: Data Disclosure Technology
Description: Technology related to disclosing data
SubType of: dpv-tech:DataTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.3 Data Management Technology

IRI https://w3id.org/dpv/dpv-tech#DataManagementTechnology
Term: DataManagementTechnology
Label: Data Management Technology
Description: Technology related to management of data
SubType of: dpv-tech:DataTechnology, dpv-tech:ManagementTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.4 Data Obtaining Technology

IRI https://w3id.org/dpv/dpv-tech#DataObtainingTechnology
Term: DataObtainingTechnology
Label: Data Obtaining Technology
Description: Technology related to obtain data
SubType of: dpv-tech:DataTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.5 Data Organising Technology

IRI https://w3id.org/dpv/dpv-tech#DataOrganisingTechnology
Term: DataOrganisingTechnology
Label: Data Organising Technology
Description: Technology realted to organising data
SubType of: dpv-tech:DataTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.6 Data Removal Technology

IRI https://w3id.org/dpv/dpv-tech#DataRemovalTechnology
Term: DataRemovalTechnology
Label: Data Removal Technology
Description: Technology related to removing data
SubType of: dpv-tech:DataTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.7 Data Security Technology

IRI https://w3id.org/dpv/dpv-tech#DataSecurityTechnology
Term: DataSecurityTechnology
Label: Data Security Technology
Description: Technology related to security of data
SubType of: dpv-tech:DataTechnology, dpv-tech:SecurityTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.8 Data Storage Technology

IRI https://w3id.org/dpv/dpv-tech#DataStorageTechnology
Term: DataStorageTechnology
Label: Data Storage Technology
Description: Technology related to storing data
SubType of: dpv-tech:DataTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.9 Data Transfer Technology

IRI https://w3id.org/dpv/dpv-tech#DataTransferTechnology
Term: DataTransferTechnology
Label: Data Transfer Technology
Description: Technology related to transfering data
SubType of: dpv-tech:DataTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.10 Data Transformation Technology

IRI https://w3id.org/dpv/dpv-tech#DataTransformationTechnology
Term: DataTransformationTechnology
Label: Data Transformation Technology
Description: Technology related to transforming data
SubType of: dpv-tech:DataTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

3.1.11 Data Usage Technology

IRI https://w3id.org/dpv/dpv-tech#DataUsageTechnology
Term: DataUsageTechnology
Label: Data Usage Technology
Description: Technology related to using data
SubType of: dpv-tech:DataTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

4. Operational Tech

4.1 Classes

Application | Operation Device | Operation Environment | Operation Management |

4.1.1 Application

IRI https://w3id.org/dpv/dpv-tech#Application
Term: Application
Label: Application
Description: A computing or digital program
SubType of: dpv-tech:OperationalTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.2 Operation Device

IRI https://w3id.org/dpv/dpv-tech#OperationDevice
Term: OperationDevice
Label: Operation Device
Description: Technology that acts as an equipment or mechanism for operations
SubType of: dpv-tech:OperationalTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.3 Operation Environment

IRI https://w3id.org/dpv/dpv-tech#OperationEnvironment
Term: OperationEnvironment
Label: Operation Environment
Description: Technology that provides an environment for operations to be executed
SubType of: dpv-tech:OperationalTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

4.1.4 Operation Management

IRI https://w3id.org/dpv/dpv-tech#OperationManagement
Term: OperationManagement
Label: Operation Management
Description: Technology that manages operations
SubType of: dpv-tech:OperationalTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

5. Security Tech

5.1 Classes

Detection Security Technology | Mitigation Security Technology | Monitoring Security Technology | PET (Privacy Enhancing Technology) | Prevention Security Technology | Security Management Technology |

5.1.1 Detection Security Technology

IRI https://w3id.org/dpv/dpv-tech#DetectionSecurityTechnology
Term: DetectionSecurityTechnology
Label: Detection Security Technology
Description: Technology related to detection of vulnerabilities, threats, and exploitations
SubType of: dpv-tech:SecurityTechnology
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan

5.1.2 Mitigation Security Technology

IRI https://w3id.org/dpv/dpv-tech#MitigationSecurityTechnology
Term: MitigationSecurityTechnology
Label: Mitigation Security Technology
Description: Technology related to mitigation of vulnerabilities, threats, exploitations
SubType of: dpv-tech:SecurityTechnology
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan

5.1.3 Monitoring Security Technology

IRI https://w3id.org/dpv/dpv-tech#MonitoringSecurityTechnology
Term: MonitoringSecurityTechnology
Label: Monitoring Security Technology
Description: Technology related to monitoring of vulnerabilities, threats, exploitations
SubType of: dpv-tech:SecurityTechnology
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan

5.1.4 PET (Privacy Enhancing Technology)

IRI https://w3id.org/dpv/dpv-tech#PET
Term: PET
Label: PET (Privacy Enhancing Technology)
Description: Privacy Enhancing Technologies (PETs) that provide minimisation or security related to data and privacy
SubType of: dpv-tech:SecurityTechnology
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan

5.1.5 Prevention Security Technology

IRI https://w3id.org/dpv/dpv-tech#PreventionSecurityTechnology
Term: PreventionSecurityTechnology
Label: Prevention Security Technology
Description: Technology related to prevention of vulnerabilities, threats, exploitations
SubType of: dpv-tech:SecurityTechnology
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan

5.1.6 Security Management Technology

IRI https://w3id.org/dpv/dpv-tech#SecurityManagementTechnology
Term: SecurityManagementTechnology
Label: Security Management Technology
Description: Technology related to management of security
SubType of: dpv-tech:ManagementTechnology, dpv-tech:SecurityTechnology
Created:
Contributor(s): Georg P Krog, Harshvardhan J. Pandit, Julian Flake, Paul Ryan

6. Surveillance Types

6.1 Classes

Covert SurveillanceTechnology | Overt Surveillance Technology |

6.1.1 Covert SurveillanceTechnology

IRI https://w3id.org/dpv/dpv-tech#CovertSurveillanceTechnology
Term: CovertSurveillanceTechnology
Label: Covert SurveillanceTechnology
Description: Surveillance that is covert i.e. invisible or non-apparent or implicit
SubType of: dpv-tech:SurveillanceTechnology
Note: For example, a web resource that performs tracking in the background
Created:
Contributor(s): Harshvardhan J. Pandit

6.1.2 Overt Surveillance Technology

IRI https://w3id.org/dpv/dpv-tech#OvertSurveillanceTechnology
Term: OvertSurveillanceTechnology
Label: Overt Surveillance Technology
Description: Surveillance that is overt i.e. visible or apparent or explicit
SubType of: dpv-tech:SurveillanceTechnology
Note: For example, a CCTV with a notice
Created:
Contributor(s): Harshvardhan J. Pandit

7. Provision Method

7.1 Classes

Algorithmic | Component | Fixed Use | Goods | Product | Service | Subscription | System |

7.1.1 Algorithmic

IRI https://w3id.org/dpv/dpv-tech#Algorithmic
Term: Algorithmic
Label: Algorithmic
Description: Technology provided as an algorithm or method
Instance of: dpv-tech:TechnologyProvisionMethod
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.2 Component

IRI https://w3id.org/dpv/dpv-tech#Component
Term: Component
Label: Component
Description: Technology provided as a component
Instance of: dpv-tech:TechnologyProvisionMethod
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.3 Fixed Use

IRI https://w3id.org/dpv/dpv-tech#FixedUse
Term: FixedUse
Label: Fixed Use
Description: Technology that can be used a fixed numner of times
Instance of: dpv-tech:TechnologyProvisionMethod
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.4 Goods

IRI https://w3id.org/dpv/dpv-tech#Goods
Term: Goods
Label: Goods
Description: Technology provided or used as goods
Instance of: dpv-tech:TechnologyProvisionMethod
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.5 Product

IRI https://w3id.org/dpv/dpv-tech#Product
Term: Product
Label: Product
Description: Technology that is provided as a product
Instance of: dpv-tech:TechnologyProvisionMethod
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.6 Service

IRI https://w3id.org/dpv/dpv-tech#Service
Term: Service
Label: Service
Description: Technology provided or used as service(s)
Instance of: dpv-tech:TechnologyProvisionMethod
Note: Removed plural suffix for consistency in terms
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.7 Subscription

IRI https://w3id.org/dpv/dpv-tech#Subscription
Term: Subscription
Label: Subscription
Description: Technology that is provided or used as a periodic subscription
Instance of: dpv-tech:TechnologyProvisionMethod
Created:
Contributor(s): Harshvardhan J. Pandit

7.1.8 System

IRI https://w3id.org/dpv/dpv-tech#System
Term: System
Label: System
Description: Technology provided as a system
Instance of: dpv-tech:TechnologyProvisionMethod
Created:
Contributor(s): Harshvardhan J. Pandit

7.2 Properties

has provision method |

7.2.1 has provision method

IRI https://w3id.org/dpv/dpv-tech#hasProvisionMethod
Term: hasProvisionMethod
Label: has provision method
Description: Specifies the provision or usage method of technology
Domain: dpv:Technology
Range: dpv-tech:TechnologyProvisionMethod
Created:
Contributor(s): Harshvardhan J. Pandit

8. Actors

8.1 Classes

Technology Developer | Technology Provider | Technology Subject | Technology User |

8.1.1 Technology Developer

IRI https://w3id.org/dpv/dpv-tech#TechnologyDeveloper
Term: TechnologyDeveloper
Label: Technology Developer
Description: Actor that develops Technology
SubType of: dpv-tech:TechnologyActor
Created:
Contributor(s): Harshvardhan J. Pandit

8.1.2 Technology Provider

IRI https://w3id.org/dpv/dpv-tech#TechnologyProvider
Term: TechnologyProvider
Label: Technology Provider
Description: Actor that provides Technology
SubType of: dpv-tech:TechnologyActor
Created:
Contributor(s): Harshvardhan J. Pandit

8.1.3 Technology Subject

IRI https://w3id.org/dpv/dpv-tech#TechnologySubject
Term: TechnologySubject
Label: Technology Subject
Description: Actor that is subject of use of Technology
SubType of: dpv-tech:TechnologyActor
Created:
Contributor(s): Harshvardhan J. Pandit

8.1.4 Technology User

IRI https://w3id.org/dpv/dpv-tech#TechnologyUser
Term: TechnologyUser
Label: Technology User
Description: Actor that uses Technologoy
SubType of: dpv-tech:TechnologyActor
Created:
Contributor(s): Harshvardhan J. Pandit

8.2 Properties

has developer | has provider | has subject | has user |

8.2.1 has developer

IRI https://w3id.org/dpv/dpv-tech#hasDeveloper
Term: hasDeveloper
Label: has developer
Description: Indicates technology developer
Domain: dpv:Technology
Range: dpv-tech:TechnologyDeveloper
Created:
Contributor(s): Harshvardhan J. Pandit

8.2.2 has provider

IRI https://w3id.org/dpv/dpv-tech#hasProvider
Term: hasProvider
Label: has provider
Description: Indicates technology provider
Domain: dpv:Technology
Range: dpv-tech:TechnologyProvider
Created:
Contributor(s): Harshvardhan J. Pandit

8.2.3 has subject

IRI https://w3id.org/dpv/dpv-tech#hasSubject
Term: hasSubject
Label: has subject
Description: Indicates technology subject
Domain: dpv:Technology
Range: dpv-tech:TechnologySubject
Created:
Contributor(s): Harshvardhan J. Pandit

8.2.4 has user

IRI https://w3id.org/dpv/dpv-tech#hasUser
Term: hasUser
Label: has user
Description: Indicates technology user
Domain: dpv:Technology
Range: dpv-tech:TechnologyUser
Created:
Contributor(s): Harshvardhan J. Pandit

9. Communication Methods

9.1 Classes

Bluetooth | Cellular Network | GPS | Internet | Local Network | Networking | WiFi |

9.1.1 Bluetooth

IRI https://w3id.org/dpv/dpv-tech#Bluetooth
Term: Bluetooth
Label: Bluetooth
Description: Technology utilising bluetooth communication
SubType of: dpv-tech:Networking
Created:
Contributor(s): Harshvardhan J. Pandit

9.1.2 Cellular Network

IRI https://w3id.org/dpv/dpv-tech#CellularNetwork
Term: CellularNetwork
Label: Cellular Network
Description: Technology utilising cellular networking communication
SubType of: dpv-tech:Networking
Created:
Contributor(s): Harshvardhan J. Pandit

9.1.3 GPS

IRI https://w3id.org/dpv/dpv-tech#GPS
Term: GPS
Label: GPS
Description: Technology utilising GPS communication
SubType of: dpv-tech:CommunicationMechanism
Created:
Contributor(s): Harshvardhan J. Pandit

9.1.4 Internet

IRI https://w3id.org/dpv/dpv-tech#Internet
Term: Internet
Label: Internet
Description: Technology utilising internet communication
SubType of: dpv-tech:Networking
Created:
Contributor(s): Harshvardhan J. Pandit

9.1.5 Local Network

IRI https://w3id.org/dpv/dpv-tech#LocalNetwork
Term: LocalNetwork
Label: Local Network
Description: Technology utilising local networking communication
SubType of: dpv-tech:Networking
Created:
Contributor(s): Harshvardhan J. Pandit

9.1.6 Networking

IRI https://w3id.org/dpv/dpv-tech#Networking
Term: Networking
Label: Networking
Description: Technology utilising networking communication
SubType of: dpv-tech:CommunicationMechanism
Created:
Contributor(s): Harshvardhan J. Pandit

9.1.7 WiFi

IRI https://w3id.org/dpv/dpv-tech#WiFi
Term: WiFi
Label: WiFi
Description: Technology utilising wifi wireless networking communication
SubType of: dpv-tech:Networking
Created:
Contributor(s): Harshvardhan J. Pandit

10. Tools

10.1 Classes

Cookie | Database | File System | Identity Management Technology | Identity Wallet | Personal Information Management System | Smartphone Application |

10.1.2 Database

IRI https://w3id.org/dpv/dpv-tech#Database
Term: Database
Label: Database
Description: A database, database management system (DBMS), or application database
SubType of: dpv-tech:DataStorageTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

10.1.3 File System

IRI https://w3id.org/dpv/dpv-tech#FileSystem
Term: FileSystem
Label: File System
Description: A data storage and retrieval interface provided by an operating system
SubType of: dpv-tech:DataStorageTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

10.1.4 Identity Management Technology

IRI https://w3id.org/dpv/dpv-tech#IdentityManagementTechnology
Term: IdentityManagementTechnology
Label: Identity Management Technology
Description: Technologies providing identity provision, verification, management, and governance
SubType of: dpv-tech:IdentityTechnology, dpv-tech:ManagementTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

10.1.5 Identity Wallet

IRI https://w3id.org/dpv/dpv-tech#IdentityWallet
Term: IdentityWallet
Label: Identity Wallet
Description: product and service that allows the user to store identity data, credentials and attributes linked to her/his identity, to provide them to relying parties on request and to use them for authentication, online and offline, and to create qualified electronic signatures and seals
SubType of: dpv-tech:DataStorageTechnology, dpv-tech:IdentityManagementTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

10.1.6 Personal Information Management System

IRI https://w3id.org/dpv/dpv-tech#PersonalInformationManagementSystem
Term: PersonalInformationManagementSystem
Label: Personal Information Management System
Description: A PIMS is a system that helps to give individuals more control over their personal data by managing their personal data in secure, on-premises or online storage systems and sharing it when and with whomever they choose
SubType of: dpv-tech:DataManagementTechnology
Created:
Contributor(s): Harshvardhan J. Pandit

10.1.7 Smartphone Application

IRI https://w3id.org/dpv/dpv-tech#SmartphoneApplication
Term: SmartphoneApplication
Label: Smartphone Application
Description: A computing or digital program on a smartphone device
SubType of: dpv-tech:Application
Created:
Contributor(s): Harshvardhan J. Pandit

A. Issue summary

B. Funding Acknowledgements

B.1 Funding Sponsors

The DPVCG and DPV were initiated as part of the SPECIAL H2020 Project, which received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 731601. The SPECIAL project ran over a 3-year period from 2017 to 2019.

Harshvardhan J. Pandit was funded by the Irish Research Council Government of Ireland Postdoctoral Fellowship Grant#GOIPD/2020/790 for working within the DPVCG and contributing to the DPV. The fellowship lasted from 2020 to 2022.

B.2 Funding Acknowledgements for Contributors

The contributions of Beatriz Esteves have received funding through the PROTECT ITN Project from the European Union’s Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 813497.

The contributions of Harshvardhan J. Pandit have received funding from the ADAPT SFI Centre for Digital Media Technology is funded by Science Foundation Ireland through the SFI Research Centres Programme and is co-funded under the European Regional Development Fund (ERDF) through Grant#13/RC/2106 (2018 to 2020) and Grant#13/RC/2106_P2 (2021 onwards)

C. References

C.1 Informative references

[DPV]
Data Privacy Vocabulary (DPV) Specification. URL: https://www.w3id.org/dpv
[DPV-GDPR]
DPV-GDPR: Extension providing GDPR concepts. URL: https://www.w3id.org/dpv/dpv-gdpr
Guide for Consent Records using DPV. URL: https://w3id.org/dpv/guides/consent
[DPV-GUIDE-GDPR-DPIA]
Guide for GDPR DPIA's using DPV. URL: https://w3id.org/dpv/dpv-gdpr/dpia
[DPV-GUIDE-GDPR-ROPA]
Guide for GDPR ROPA's using DPV. URL: https://w3id.org/dpv/dpv-gdpr/ropa
[DPV-GUIDE-Notice]
Guide for Privacy Notices using DPV. URL: https://w3id.org/dpv/guides/notice
[DPV-GUIDE-OWL2]
Guide for using DPV in OWL2. URL: https://w3id.org/dpv/guides/dpv-owl
[DPV-GUIDE-Serialisations]
Guide on DPV's serialisations and semantics. URL: https://w3id.org/dpv/guides/serialisations
[DPV-GUIDE-SKOS]
Guide for using DPV with RDFS and SKOS. URL: https://w3id.org/dpv/guides/dpv-skos
[DPV-GUIDES]
Guidelines for Adoption and Use of DPV. URL: https://w3id.org/dpv/guides
DPV-LEGAL: Extension providing Jurisdiction-relevant concepts. URL: https://www.w3id.org/dpv/dpv-legal
[DPV-NACE]
NACE Taxonomy serialised in RDFS. URL: https://www.w3id.org/dpv/dpv-nace
[DPV-OWL]
DPV-OWL: Data Privacy Vocabulary serialised in OWL2. URL: https://www.w3id.org/dpv/dpv-owl
[DPV-OWL-GDPR]
DPV-OWL-GDPR: Extension providing GDPR concepts. URL: https://www.w3id.org/dpv/dpv-owl/dpv-gdpr
DPV-OWL-LEGAL: Extension providing Jurisdiction-relevant concepts. URL: https://www.w3id.org/dpv/dpv-owl/dpv-legal
[DPV-OWL-PD]
DPV-OWL-PD: Extension providing Personal Data Categories. URL: https://www.w3id.org/dpv/dpv-owl/dpv-pd
[DPV-OWL-TECH]
DPV-OWL-TECH: Extension providing Technology-relevant concepts. URL: https://www.w3id.org/dpv/dpv-owl/dpv-tech
[DPV-PD]
DPV-PD: Extension providing Personal Data Categories. URL: https://www.w3id.org/dpv/dpv-pd
[DPV-Primer]
Primer for Data Privacy Vocabulary. URL: https://www.w3id.org/dpv/primer
[DPV-SKOS]
DPV-SKOS: Data Privacy Vocabulary serialised in RDFS & SKOS. URL: https://www.w3id.org/dpv/dpv-skos
[DPV-SKOS-GDPR]
DPV-SKOS-GDPR: Extension providing GDPR concepts. URL: https://www.w3id.org/dpv/dpv-skos/dpv-gdpr
DPV-SKOS-LEGAL: Extension providing Jurisdiction-relevant concepts. URL: https://www.w3id.org/dpv/dpv-skos/dpv-legal
[DPV-SKOS-PD]
DPV-SKOS-PD: Extension providing Personal Data Categories. URL: https://www.w3id.org/dpv/dpv-skos/dpv-pd
[DPV-SKOS-TECH]
DPV-SKOS-TECH: Extension providing Technology-relevant concepts. URL: https://www.w3id.org/dpv/dpv-skos/dpv-tech
[DPV-TECH]
DPV-TECH: Extension providing Technology-relevant concepts. URL: https://www.w3id.org/dpv/dpv-tech
[DPVCG]
W3C Data Privacy Vocabularies and Controls Community Group (DPVCG). URL: https://www.w3.org/community/dpvcg/
[Examples]
DPV Examples. URL: https://w3id.org/dpv/examples
[RIGHTS-EU]
Extension providing EU Rights. URL: https://www.w3id.org/dpv/rights/eu
[RIGHTS-EU-OWL]
Extension providing EU Rights. URL: https://www.w3id.org/dpv/dpv-owl/rights/eu
[RIGHTS-EU-SKOS]
Extension providing EU Rights. URL: https://www.w3id.org/dpv/dpv-skos/rights/eu
[RISK]
Risk Extension for DPV. URL: https://www.w3id.org/dpv/risk
[RISK-OWL]
Risk Extension for DPV. URL: https://www.w3id.org/dpv/dpv-owl/risk
[RISK-SKOS]
Risk Extension for DPV. URL: https://www.w3id.org/dpv/dpv-skos/risk
[UseCases-Requirements]
DPV Use-Cases and Requirements. URL: https://w3id.org/dpv/use-cases