PE-BPMN is an extension of BPMN language to add Privacy Enhanced Technologies (PETs) information via privacy stereotypes. The stereotype characterizes the changed type of the BPMN construct (task, data object or message flow). We have derived the stereotypes based on the actions of the technologies and made sure that the technologies achieving common privacy goals are as similar as possible to each other. Some privacy protection goals result in a series of tasks, for example data protection allows adding protection with Protect and removing it with Open type of tasks. The stereotype parameters further describes the task, whereas the inputs and outputs of the tasks should be clearly modelled as data objects or data collections in BPMN.
There are different possible parameters a stereotype can have. Access specification can, for example, specify the decryption key or the sets of shares that qualify to open the secret. For integrity protection, this specifies what is necessary to check the integrity in Open. Privacy requirements can specify security parameters or other properties of the scheme that should be used. The user interface of Pleak asks for the parameters and specifications based on the chosen stereotype and the restrictions are documented on the pages of the stereotypes.