Verb-Based Dataflow Diagram for Privacy Design

Contributors

Section and Mentor

Resources

Introduction

In an era where data privacy is paramount, the tools we use to visualize data flows must evolve to meet modern challenges. Traditional data flow diagrams tend to adopt a noun-based approach, framing systems primarily as collections of devices and static components. This method often omits essential details—such as data collection methods, processing steps, storage durations, and other contextual metadata—leaving developers with an incomplete picture of how sensitive information is managed. Moreover, reliance on device-specific modules (e.g., phones, computers, IoT devices) restricts flexibility, especially in today’s heterogeneous technological environments.

Our work, building on insights from the paper “Verb-Based Dataflow Diagram for Privacy Design,” introduces a transformative shift: focusing on the actions—the verbs—that define data actions, and stakeholder interactions. By centering on data actions (like collecting, processing, sharing, and storing), we capture a more dynamic and comprehensive view of data flows. This verb-based approach not only details the specific operations influencing data privacy but also integrates critical metadata (such as collection types and data retention periods) directly into each enumerable property of the diagram.

Designed with developers in mind—particularly those engaged in product development and decision-making—this method addresses common challenges faced with existing tools. It empowers teams to visualize and communicate complex data processes more clearly and accurately, thereby fostering greater transparency and trust. Ultimately, by shifting from static, device-centric diagrams to a dynamic, action-oriented paradigm, our approach enables more precise design and robust privacy compliance in an increasingly data-driven world.


Method

Layer 1: Data Action Nodes

Layer 1 Diagram

Purpose:
Focuses on defining core data actions such as data collection, storage, processing, and usage. Developers can customize nodes to include detailed metadata.

Features:

Results:


Layer 2: Data Interaction Nodes

Layer 2 Diagram

Purpose:
Represents interactions between users, stakeholders, and systems, focusing on how data is accessed, influenced, or controlled.

Predefined Interaction Nodes:

Results:


Layer 3: Unenumerable Details for Storytelling

Layer 3 Diagram

Purpose:
Captures subjective, narrative-driven elements that provide context for data actions and user journeys, enhancing the structured layers.

Features:

Drawboard for User Journey Mapping:

Open-ended Storytelling:

Results:

Add-on Features

Threat Analysis Table

Threat Analysis Table

The Threat Analysis Table extends the Privacy Storyboard platform, helping developers assess privacy risks in data workflows. It identifies, categorizes, and visualizes threats linked to data actions and interactions, allowing developers to proactively address risks early in the design process.

Key threat categories include:

This feature promotes responsible and secure data practices by integrating privacy risk assessments into the design process.

User Journey Map

User Journey Map / Noun-Based Representation Feature

The user journey map, or noun-based representation, consolidates data flow information from multiple layers into a cohesive visualization. It highlights key data actions like collection, storage, processing, and sharing with intuitive icons and clear relationships between nodes.

This streamlined view helps users quickly understand system-wide data flows, identify bottlenecks or privacy risks, and make informed design decisions.


Discussion

The current approach introduces a layer 2 schema for data actions and interactions to generalize privacy design considerations. However, this schema might not fully capture all industry practices, indicating the need for further refinement through industry surveys and case studies.

A key challenge is the manual construction of dataflow diagrams, which is time-consuming. A potential solution is integrating Privacy Akinator—an intelligent system that guides developers through privacy considerations using a dynamic Q&A approach based on the 4W1H methodology and FIPP’s eight dimensions. This system could automate privacy assessments, reducing manual effort and improving efficiency.


Conclusion

This paper presents a novel verb-based dataflow diagram approach that focuses on dynamic data actions and stakeholder interactions, providing a structured view of how data is collected, stored, processed, and used.

The integration of features like the Threat Analysis Table and User Journey Map enhances transparency and accountability in system design, helping developers align with regulations such as GDPR and CCPA. This method not only ensures compliance but also strengthens privacy resilience against emerging threats.

Actual Page of the Application

PrivacyVerb Application