CONFIDENTIAL CONTENT REPORTING SYSTEM AND METHOD WITH ELECTRONIC MAIL VERIFICATION FUNCTIONALITY
First Claim
1. A method, in a data processing system, of reporting items of information containing confidential information, comprising:
- identifying at least one item of information containing confidential information based on one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information;
analyzing the at least one item of information to determine if the at least one item of information meets security policy compliance requirements, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state;
identifying one or more security policy violations based on results of the analysis if the results indicate that the at least one item of information does not meet security policy compliance requirements; and
providing an output identifying the at least one item of information, wherein the output includes, for each item of information in the at least one item of information, an identifier of the item of information and one or more security policy violations associated with the item of information.
1 Assignment
0 Petitions
Accused Products
Abstract
A confidential content reporting system and method with electronic mail verification functionality are provided. With the system and method, a security compliance search engine is provided for searching items of information to identify items containing confidential content and security violations with regard to this confidential content. Results of the search may be reported to a user via a graphical user interface (GUI) that identifies the item of information, the security violations detected, and suggested corrective actions, such as encryption. A user may interact with the GUI to apply security mechanisms in accordance with the suggested corrective actions. Moreover, the searching and reporting mechanism may be used to search electronic mail messages and their attachments prior to distribution of the electronic mail messages. Automatic modification of the electronic mail message to modify distribution lists and/or content of the electronic mail message may be performed using the mechanisms of the illustrative embodiments.
-
Citations
20 Claims
-
1. A method, in a data processing system, of reporting items of information containing confidential information, comprising:
-
identifying at least one item of information containing confidential information based on one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information;
analyzing the at least one item of information to determine if the at least one item of information meets security policy compliance requirements, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state;
identifying one or more security policy violations based on results of the analysis if the results indicate that the at least one item of information does not meet security policy compliance requirements; and
providing an output identifying the at least one item of information, wherein the output includes, for each item of information in the at least one item of information, an identifier of the item of information and one or more security policy violations associated with the item of information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product comprising a computer useable medium having a computer readable program, wherein the computer readable program, when executed on a computing device, causes the computing device to:
-
identify at least one item of information containing confidential information based on one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information;
analyze the at least one item of information to determine if the at least one item of information meets security policy compliance requirements, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state;
identify one or more security policy violations based on results of the analysis if the results indicate that the at least one item of information does not meet security policy compliance requirements; and
provide an output identifying the at least one item of information, wherein the output includes, for each item of information in the at least one item of information, an identifier of the item of information and one or more security policy violations associated with the item of information. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. The computer program product of claim 19, wherein the at least one item of information is an electronic mail message, and wherein the one or more corrective actions include at least one of automatically modifying a distribution list for the electronic mail message to not include unauthorized individuals that may pose a security risk, automatically encrypting the electronic mail message, or automatically encrypting an attachment to the electronic mail message.
-
20. A system for reporting items of information containing confidential information, comprising:
-
a processor; and
a memory coupled to the processor, wherein the memory contains instructions which, when executed by the processor, cause the processor to;
identify at least one item of information containing confidential information based on one or more security search rules setting forth one or more security criteria for identifying items of information that contain confidential information;
analyze the at least one item of information to determine if the at least one item of information meets security policy compliance requirements, wherein the security policy compliance requirements identify requirements for maintaining items of information that contain confidential information in a confidential state;
identify one or more security policy violations based on results of the analysis if the results indicate that the at least one item of information does not meet security policy compliance requirements; and
provide an output identifying the at least one item of information, wherein the output includes, for each item of information in the at least one item of information, an identifier of the item of information and one or more security policy violations associated with the item of information.
-
Specification