Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
First Claim
1. A computer-implemented data processing method for generating a visualization of one or more data transfers between one or more data assets, the method comprising:
- identifying, by one or more computer processors, one or more data assets associated with a particular entity;
analyzing, by the one or more computer processors, the one or more data assets to identify one or more data elements stored in the identified one or more data assets, wherein the step of analyzing the one or more data assets comprises analyzing the one or more data assets using one or more intelligent identity scanning techniques comprising;
scanning one or more databases to generate a catalog of one or more individuals and one or more pieces of information associated with the one or more individuals,scanning one or more data repositories based at least in part on the generated catalog to identify one or more attributes of data associated with the particular one or more individuals,analyzing and correlating the one or more attributes with metadata for the scanned one or more data repositories,using one or more machine learning techniques to categorize one or more data elements from the generated catalog,analyzing a flow of the data elements among the one or more data repositories, andcategorizing the one or more data elements based on a confidence score;
defining, by the one or more computer processors, a plurality of physical locations and identifying, for each of the identified one or more data assets, a respective particular physical location of the plurality of physical locations;
analyzing, by the one or more computer processors, the identified one or more data elements to determine one or more data transfers between the one or more data assets in different particular physical locations;
determining, by the one or more computer processors, one or more regulations that relate to the one or more data transfers; and
generating, by the one or more computer processors, a visual representation of the one or more data transfers based at least in part on the one or more regulations, wherein generating the visual representation of the one or more data transfers comprises;
generating a visual representation of a map comprising the plurality of physical locations,superimposing an indicia for each of the one or more data assets that indicates the respective particular physical location of the plurality of physical locations for each of the one or more data assets, andgenerating a visual indication of the one or more data transfers between the one or more data assets.
2 Assignments
0 Petitions
Accused Products
Abstract
In various embodiments, a Data Model Adaptive Execution System may be configured to take one or more suitable actions to remediate an identified risk in view of one or more regulations (e.g., one or more legal regulations, one or more binding corporate rules, etc.). For example, in order to ensure compliance with one or more standards related to the collection and/or storage of personal data, an entity may be required to modify one or more aspects of a way in which the entity collects, stores, and/or otherwise processes personal data (e.g., in response to a change in a legal or other requirement). In order to identify whether a particular change or other risk trigger requires remediation, the system may be configured to assess a relevance of the risk posed by the risk and identify one or more processing activities or data assets that may be affected by the risk.
437 Citations
24 Claims
-
1. A computer-implemented data processing method for generating a visualization of one or more data transfers between one or more data assets, the method comprising:
-
identifying, by one or more computer processors, one or more data assets associated with a particular entity; analyzing, by the one or more computer processors, the one or more data assets to identify one or more data elements stored in the identified one or more data assets, wherein the step of analyzing the one or more data assets comprises analyzing the one or more data assets using one or more intelligent identity scanning techniques comprising; scanning one or more databases to generate a catalog of one or more individuals and one or more pieces of information associated with the one or more individuals, scanning one or more data repositories based at least in part on the generated catalog to identify one or more attributes of data associated with the particular one or more individuals, analyzing and correlating the one or more attributes with metadata for the scanned one or more data repositories, using one or more machine learning techniques to categorize one or more data elements from the generated catalog, analyzing a flow of the data elements among the one or more data repositories, and categorizing the one or more data elements based on a confidence score; defining, by the one or more computer processors, a plurality of physical locations and identifying, for each of the identified one or more data assets, a respective particular physical location of the plurality of physical locations; analyzing, by the one or more computer processors, the identified one or more data elements to determine one or more data transfers between the one or more data assets in different particular physical locations; determining, by the one or more computer processors, one or more regulations that relate to the one or more data transfers; and generating, by the one or more computer processors, a visual representation of the one or more data transfers based at least in part on the one or more regulations, wherein generating the visual representation of the one or more data transfers comprises; generating a visual representation of a map comprising the plurality of physical locations, superimposing an indicia for each of the one or more data assets that indicates the respective particular physical location of the plurality of physical locations for each of the one or more data assets, and generating a visual indication of the one or more data transfers between the one or more data assets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer-implemented method of identifying and responding to one or more potential risk triggers based on a data model, the method comprising:
-
identifying, by at least one computer processor, one or more potential risk triggers for an entity; assessing and analyzing, by the at least one processor, the one or more potential risk triggers to determine a relevance of a risk posed to the entity by the one or more potential risk triggers, wherein determining the relevance of the risk posed to the entity comprises; identifying one or more particular previous risk triggers experienced by the entity, identifying one or more particular similar risk triggers from the one or more particular previous risk triggers, the one or more particular similar risk triggers being similar to the one or more potential risk triggers, and determining the relevance of a risk posed by the one or more potential risk triggers based at least in part on a previously determined relevance of the one or more particular similar risk triggers; identifying, by the at least one processor using one or more data modeling techniques, one or more data assets associated with the entity that may be affected by the risk, wherein identifying the one or more data assets that may be affected by the risk comprises; scanning a respective digital inventory for each of the one or more data assets, each respective digital inventory comprising one or more inventory attributes, and analyzing each respective digital inventory to determine one or more inventory attributes that may be affected by the risk; determining, by the at least one processor, based at least in part on the one or more identified data assets and the relevance of the risk posed to the entity by the one or more potential risk triggers, whether to take one or more actions in response to the one or more potential risk triggers; and in response to determining to take the one or more actions, taking, by the at least one processor, the one or more actions to remediate the risk. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification