Privacy model
First Claim
1. A system that enhances privacy and security of shared content comprising:
- a monitoring component that monitors one or more resources or one or more user interactions in connection with the resources;
an analysis component that cross-checks against various data collected during the monitoring to determine whether to adjust one or more access rights; and
a suggestion component that suggests to make at least one adjustment to a user'"'"'s access rights based at least in part upon the data collected.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and/or methods that mitigate overexposure of shared content and that facilitate improving security of content in a computing environment. In particular, the systems and methods involves monitoring resource activities such as user interactions (between users and/or between users and resources), email activity, share space activity, shared content activity, distribution lists, contact lists, personnel or organization structures, and the like. Data can be collected as one or more resource activities are monitored and then analyzed to determine where, if any, changes have taken place. For example, if a user has been removed from a distribution list or a user has not accessed the shared content within a time period, a recommendation can be formulated to suggest an adjustment to the affected access rights. Furthermore, the systems and/or methods can be integrated with other applications such as an email client, whereby an out-of-office indicator can leave access rights as they are.
-
Citations
26 Claims
-
1. A system that enhances privacy and security of shared content comprising:
-
a monitoring component that monitors one or more resources or one or more user interactions in connection with the resources;
an analysis component that cross-checks against various data collected during the monitoring to determine whether to adjust one or more access rights; and
a suggestion component that suggests to make at least one adjustment to a user'"'"'s access rights based at least in part upon the data collected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 26)
-
-
10. A method that mitigates overexposure of shared content comprising:
-
monitoring a plurality of resources in a computing environment;
analyzing data collected from the plurality of resources; and
providing a suggestion to adjust at least a portion of user access rights to the shared content based at least in part upon an analysis of the data to facilitate maintaining consistency in delineating access rights. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A system that mitigates overexposure of shared content comprising:
-
means for monitoring a plurality of resource activity in a computing environment;
means for analyzing data collected while monitoring; and
means for providing a suggestion to adjust at least a portion of user access rights to the shared content based at least in part upon an analysis of the data.
-
-
25. A data packet adapted to be transmitted between two or more computer processes facilitating improved control and management of user access rights to optimize security of a computing environment, the data packet comprising:
- information associated with recommending adjustments to respective access rights based at least in part upon an analysis of data collected while monitoring user interactions and/or resource activities in the computing environment.
Specification