SENSITIVE INFORMATION MANAGEMENT
First Claim
1. A method of managing information comprising:
- associating a sensitive information identifier with information identified as sensitive,tracking actions relative to the sensitive information; and
performing, in response to the tracking step, an action on the sensitive information based on information in the sensitive information identifier, wherein the action includes one or more of deletion, sanitization, obfuscation and access restriction.
21 Assignments
0 Petitions
Accused Products
Abstract
Information is identified as sensitive and a lapsed time job (Chron Job) is created that will allow the deletion of sensitive information after a period of time. The interval could be set to be longer than vacation or other planned use, and yet short enough to limit the period where risk to the organization or individual is incurred. The Chron Job could be integrated with the user'"'"'s calendar, such that the Chron Job considers holiday time as a means of delaying execution of the Chron Job which would allow a shorter interval to be selected. In addition to deletion of the information identified as sensitive, additional steps could also be taken, such as the purging of the recycle bin, modification of the FAT, and optionally the deletion of related information. Once information is identified as sensitive, the information and derivative works are tracked and managed.
99 Citations
22 Claims
-
1. A method of managing information comprising:
-
associating a sensitive information identifier with information identified as sensitive, tracking actions relative to the sensitive information; and performing, in response to the tracking step, an action on the sensitive information based on information in the sensitive information identifier, wherein the action includes one or more of deletion, sanitization, obfuscation and access restriction. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 21)
-
-
11. An information management system comprising:
-
an intelligent analysis module adapted to associate a sensitive information identifier with information identified as sensitive and to track actions relative to the sensitive information; and a sensitive information identifier action module adapted to perform an action on the sensitive information based on information in the sensitive information identifier, wherein the action includes one or more of deletion, sanitization, obfuscation and access restriction. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. Means for managing information comprising:
-
means for associating a sensitive information identifier with information identified as sensitive, means for tracking actions relative to the sensitive information; and means for performing an action on the sensitive information based on information in the sensitive information identifier, wherein the action includes one or more of deletion, sanitization, obfuscation and access restriction.
-
-
22. A sensitive information identifier, configured to track sensitive information, comprising:
-
an indicator specifying the sensitive information; a portion to log actions relative to at least one computational component storing the sensitive information; and an action portion that specifies an action relative to the sensitive information based on logged actions.
-
Specification