Critical function monitoring and compliance auditing system
First Claim
Patent Images
1. A system for monitoring, auditing and flagging exceptions or compliance issues comprising the following process steps and apparatus:
- a. A computer processor means for identifying and tracking a plurality of business processes and comparative data requirements, and b. computer storage means for storing data on a storage medium, and c. a first executable method for processing comparative data for matching required entries and their parameters and for flagging specified exceptions, inconsistencies and anomalies to a secondary portion of said storage medium or history log files, and d. a second executable method and means for output of the data and exception reports as required on the local computer processor or by authorized LAN or WAN remote access, and e. a means of providing security of data and allowing local and LAN or WAN remote access or query of said data to only pre-authorized servers or personnel, and
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for monitoring, auditing and flagging compliance issues or other user defined exceptions with user defined systems for internal monitoring of adherence to critical functions and operations or systems such as ISO-9000 and other government mandated requirements such as HIPPA and other mandated security provisions as defined in federal and state legislative acts and derivative rules as defined by government agencies under authority of such legislative acts.
136 Citations
8 Claims
-
1. A system for monitoring, auditing and flagging exceptions or compliance issues comprising the following process steps and apparatus:
-
a. A computer processor means for identifying and tracking a plurality of business processes and comparative data requirements, and b. computer storage means for storing data on a storage medium, and c. a first executable method for processing comparative data for matching required entries and their parameters and for flagging specified exceptions, inconsistencies and anomalies to a secondary portion of said storage medium or history log files, and d. a second executable method and means for output of the data and exception reports as required on the local computer processor or by authorized LAN or WAN remote access, and e. a means of providing security of data and allowing local and LAN or WAN remote access or query of said data to only pre-authorized servers or personnel, and - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification