{"@context":{"ns0":"https://w3id.org/dpv#","rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","skos":"http://www.w3.org/2004/02/skos/core#","owl":"http://www.w3.org/2002/07/owl#","rdfs":"http://www.w3.org/2000/01/rdf-schema#","vann":"http://purl.org/vocab/vann/","ns1":"https://w3id.org/dpv/examples#","dct":"http://purl.org/dc/terms/","ns2":"http://www.w3.org/2003/06/sw-vocab-status/ns#","metadata_def":"http://data.bioontology.org/metadata/def/","ns3":"http://purl.org/dc/dcam/","ns4":"https://schema.org/"},"@graph":[{"@id":"ns0:TechnicalMeasure","@type":["skos:Concept","owl:Class","owl:NamedIndividual"],"rdfs:subClassOf":{"@id":"ns0:TechnicalOrganisationalMeasure"},"vann:example":[{"@id":"ns1:E0020"},{"@id":"ns1:E0064"}],"skos:broader":{"@id":"ns0:TechnicalOrganisationalMeasure"},"skos:definition":{"@language":"en","@value":"Technical measures used to safeguard and ensure good practices in connection with data and technologies"},"skos:prefLabel":{"@language":"en","@value":"Technical Measure"},"skos:inScheme":{"@id":"ns0:TOM-classes"},"dct:created":{"@type":"http://www.w3.org/2001/XMLSchema#date","@value":"2019-04-05"},"dct:modified":{"@type":"http://www.w3.org/2001/XMLSchema#date","@value":"2023-12-10"},"ns2:term_status":{"@language":"en","@value":"accepted"},"dct:contributor":"Axel Polleres, Rob Brennan, Harshvardhan J. Pandit, Mark Lizar","metadata_def:mappingLoom":"technicalmeasure","metadata_def:mappingSameURI":{"@id":"ns0:TechnicalMeasure"},"rdfs:isDefinedBy":{"@id":"https://w3id.org/dpv#"}},{"@id":"ns0:AccessControlMethod","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:ActivityMonitoring","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Anonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:AsymmetricCryptography","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:AsymmetricEncryption","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Authentication-ABC","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Authentication-PABC","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:AuthenticationProtocols","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:AuthorisationProtocols","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:BiometricAuthentication","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:CryptographicAuthentication","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:CryptographicKeyManagement","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:CryptographicMethods","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DataBackupProtocols","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DataRedaction","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DataSanitisationTechnique","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Deidentification","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DeterministicPseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DifferentialPrivacy","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DigitalRightsManagement","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DigitalSignatures","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DistributedSystemSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DocumentRandomisedPseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DocumentSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Encryption","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:EncryptionAtRest","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:EncryptionInTransfer","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:EncryptionInUse","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:EndToEndEncryption","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:FileSystemSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:FullyRandomisedPseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:HardwareSecurityProtocols","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:HashFunctions","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:HashMessageAuthenticationCode","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:HomomorphicEncryption","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:InformationFlowControl","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:IntrusionDetectionSystem","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:MessageAuthenticationCodes","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:MobilePlatformSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:MonotonicCounterPseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:MultiFactorAuthentication","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:NetworkProxyRouting","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:NetworkSecurityProtocols","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:OperatingSystemSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:PasswordAuthentication","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:PenetrationTestingMethods","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:PostQuantumCryptography","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:PrivacyPreservingProtocol","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:PrivateInformationRetrieval","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Pseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:QuantumCryptography","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:RNGPseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SecretSharingSchemes","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SecureMultiPartyComputation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SecurityMethod","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SingleSignOn","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SymmetricCryptography","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SymmetricEncryption","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:TrustedComputing","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:TrustedExecutionEnvironment","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:UsageControl","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:UseSyntheticData","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:VirtualisationSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:VulnerabilityTestingMethods","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:WebBrowserSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:WebSecurityProtocols","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:WirelessSecurityProtocols","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:ZeroKnowledgeAuthentication","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:hasTechnicalMeasure","ns3:rangeIncludes":{"@id":"ns0:TechnicalMeasure"},"ns4:rangeIncludes":{"@id":"ns0:TechnicalMeasure"}}]}
 
 
{"@context":{"ns0":"https://w3id.org/dpv#","rdf":"http://www.w3.org/1999/02/22-rdf-syntax-ns#","skos":"http://www.w3.org/2004/02/skos/core#","owl":"http://www.w3.org/2002/07/owl#","rdfs":"http://www.w3.org/2000/01/rdf-schema#","vann":"http://purl.org/vocab/vann/","ns1":"https://w3id.org/dpv/examples#","dct":"http://purl.org/dc/terms/","ns2":"http://www.w3.org/2003/06/sw-vocab-status/ns#","metadata_def":"http://data.bioontology.org/metadata/def/","ns3":"http://purl.org/dc/dcam/","ns4":"https://schema.org/"},"@graph":[{"@id":"ns0:TechnicalMeasure","@type":["skos:Concept","owl:Class","owl:NamedIndividual"],"rdfs:subClassOf":{"@id":"ns0:TechnicalOrganisationalMeasure"},"vann:example":[{"@id":"ns1:E0020"},{"@id":"ns1:E0064"}],"skos:broader":{"@id":"ns0:TechnicalOrganisationalMeasure"},"skos:definition":{"@language":"en","@value":"Technical measures used to safeguard and ensure good practices in connection with data and technologies"},"skos:prefLabel":{"@language":"en","@value":"Technical Measure"},"skos:inScheme":{"@id":"ns0:TOM-classes"},"dct:created":{"@type":"http://www.w3.org/2001/XMLSchema#date","@value":"2019-04-05"},"dct:modified":{"@type":"http://www.w3.org/2001/XMLSchema#date","@value":"2023-12-10"},"ns2:term_status":{"@language":"en","@value":"accepted"},"dct:contributor":"Axel Polleres, Rob Brennan, Harshvardhan J. Pandit, Mark Lizar","metadata_def:mappingLoom":"technicalmeasure","metadata_def:mappingSameURI":{"@id":"ns0:TechnicalMeasure"},"rdfs:isDefinedBy":{"@id":"https://w3id.org/dpv#"}},{"@id":"ns0:AccessControlMethod","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:ActivityMonitoring","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Anonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:AsymmetricCryptography","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:AsymmetricEncryption","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Authentication-ABC","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Authentication-PABC","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:AuthenticationProtocols","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:AuthorisationProtocols","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:BiometricAuthentication","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:CryptographicAuthentication","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:CryptographicKeyManagement","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:CryptographicMethods","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DataBackupProtocols","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DataRedaction","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DataSanitisationTechnique","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Deidentification","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DeterministicPseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DifferentialPrivacy","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DigitalRightsManagement","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DigitalSignatures","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DistributedSystemSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DocumentRandomisedPseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:DocumentSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Encryption","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:EncryptionAtRest","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:EncryptionInTransfer","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:EncryptionInUse","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:EndToEndEncryption","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:FileSystemSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:FullyRandomisedPseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:HardwareSecurityProtocols","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:HashFunctions","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:HashMessageAuthenticationCode","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:HomomorphicEncryption","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:InformationFlowControl","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:IntrusionDetectionSystem","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:MessageAuthenticationCodes","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:MobilePlatformSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:MonotonicCounterPseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:MultiFactorAuthentication","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:NetworkProxyRouting","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:NetworkSecurityProtocols","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:OperatingSystemSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:PasswordAuthentication","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:PenetrationTestingMethods","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:PostQuantumCryptography","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:PrivacyPreservingProtocol","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:PrivateInformationRetrieval","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:Pseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:QuantumCryptography","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:RNGPseudonymisation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SecretSharingSchemes","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SecureMultiPartyComputation","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SecurityMethod","skos:broader":{"@id":"ns0:TechnicalMeasure"},"@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SingleSignOn","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SymmetricCryptography","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:SymmetricEncryption","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:TrustedComputing","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:TrustedExecutionEnvironment","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:UsageControl","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:UseSyntheticData","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:VirtualisationSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:VulnerabilityTestingMethods","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:WebBrowserSecurity","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:WebSecurityProtocols","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:WirelessSecurityProtocols","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:ZeroKnowledgeAuthentication","@type":"ns0:TechnicalMeasure"},{"@id":"ns0:hasTechnicalMeasure","ns3:rangeIncludes":{"@id":"ns0:TechnicalMeasure"},"ns4:rangeIncludes":{"@id":"ns0:TechnicalMeasure"}}]}