Proprietary information identification, management and protection
First Claim
1. A computer-implemented method for facilitating the identification, management or protection of proprietary data, the method comprising:
- receiving data descriptive of proprietary information;
receiving data descriptive of one or more entities involved in at least one of;
creating, conveying, receiving or accessing the proprietary information;
generating one or more suggested actions based upon the data received and relating to the protection of the proprietary information; and
generating one or more artifacts based upon the data received.
1 Assignment
0 Petitions
Accused Products
Abstract
Computerized methods and systems are presented for facilitating identification, management and/or protection of proprietary information. Data can be received that is descriptive of proprietary information, entities involved in creating, conveying, receiving or accessing the proprietary information as well as any information that will be created, conveyed, received or accessed. The system receives data and generates suggested actions and artifacts to aid in the identification, management and/or protection of proprietary information that may result from the circumstances described by the data received. Embodiments can also include receiving data descriptive of a process and determining potential proprietary information that may be involved. Relevant suggested actions and artifacts can also be generated.
-
Citations
23 Claims
-
1. A computer-implemented method for facilitating the identification, management or protection of proprietary data, the method comprising:
-
receiving data descriptive of proprietary information;
receiving data descriptive of one or more entities involved in at least one of;
creating, conveying, receiving or accessing the proprietary information;
generating one or more suggested actions based upon the data received and relating to the protection of the proprietary information; and
generating one or more artifacts based upon the data received. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method for facilitating protection of proprietary data, the method comprising:
-
receiving data descriptive of information;
based upon the data descriptive of the information, presenting at least one of;
a description of one or more classifications that can be associated with the information;
examples of information associated with one or more classifications; and
a purpose for one or more classifications;
receiving an indication of a classification to be associated with the information, wherein the classification comprises an indication of a level of confidentiality; and
generating one or more suggested actions related to the information based upon the data descriptive of information and the indication of a classification to be associated with the information. - View Dependent Claims (15)
-
-
16. A computer-implemented method for facilitating identification, management or protection of proprietary data, the method comprising:
-
receiving data descriptive of a process;
based upon the data descriptive of the business process, presenting one or more suggested action items associated with at least one of;
identifying;
managing; and
protecting;
the proprietary information created, revealed, received or accessed as a result of the business process; and
generating one or more artifacts related to the protection of the proprietary information based upon the data descriptive of the process and a potential for creating, revealing, or accessing proprietary information as a result of the process.
-
-
17. A computerized system for facilitating identification, management or protection of proprietary data, the system comprising:
-
a computer server accessible with a network access device via a communications network; and
executable software stored on the server and executable on demand, the software operative with the server to cause the system to;
receive data descriptive of proprietary information;
receive data descriptive of one or more entities involved in at least one of;
creating, convey, receiving or accessing the proprietary information;
generate one or more suggested actions based upon the data received and relating to the protection of the proprietary information; and
generate one or more artifacts based upon the data received.
-
-
18. Computer executable program code residing on a computer-readable medium, the program code comprising instructions for causing the computer to:
-
receive data descriptive of proprietary information from the network access device;
receive data descriptive of one or more entities involved in conveying the proprietary information;
generating one or more suggested actions based upon the data received and relating to the protection of the proprietary information; and
generate one or more artifacts based upon the data received.
-
-
19. A computer data signal embodied in a digital data stream comprising data relating to managing risk associated with maintaining information as proprietary, wherein the computer data signal is generated by a method comprising the steps of:
-
receiving data descriptive of proprietary information;
receiving data descriptive of one or more entities involved in at least one of;
creating, conveying, receiving or accessing the proprietary information;
receiving data descriptive of a time period during which the information will be created, conveyed, received or accessed;
generating one or more suggested actions based upon the data received and relating to the protection of the proprietary information; and
generating one or more artifacts based upon the data received.
-
-
20. A method of interacting with a network access device so as to facilitate identification, management or protection of proprietary data, the method comprising the steps of:
-
initiating communication with a server via a communications network;
inputting data descriptive of proprietary information via a graphical user interface;
inputting data descriptive of one or more entities involved in creating, conveying, receiving or accessing the proprietary information;
inputting data descriptive of a time period during which the information will be created, conveyed, received or accessed;
receiving data descriptive of one or more suggested actions generated based upon the data input and relating to the protection of the proprietary information; and
receiving one or more artifacts based upon the data received.
-
-
21. A computer-implemented method for facilitating protection of an invention, the method comprising:
-
receiving an indication that the invention comprises at least one novel element;
receiving an indication that the invention comprises at least one of a product, a process, an apparatus and a composition;
receiving an indication of whether or not the invention comprises a physical manipulation;
receiving an indication of a date of any public disclosures;
receiving an indication of a date of any offers for sale;
generating an indication of availability of patent protection; and
generating an invention disclosure input medium.
-
-
22. A computer-implemented method for facilitating identification, management or protection of proprietary data, the method comprising:
-
receiving data descriptive of one or more customizations to data in a data structure wherein the data relates to the identification, management or protection of proprietary data; and
presenting to a user an artifact modified according to the data descriptive of the one or more customizations.
-
-
23. A graphical user interface displayable on a network access device, the interface comprising:
-
a first area for displaying data descriptive of a business process;
a second area for displaying one or more suggested actions for facilitating the identification, management or protection of proprietary data associated with the business process; and
a third area for displaying one or more artifacts for facilitating the identification, management or protection of proprietary data associated with the business process.
-
Specification