ADAPTIVE DATA LOSS PREVENTION POLICIES
First Claim
Patent Images
1. A method of safeguarding sensitive information comprising:
- detecting a policy violation on a computing device, wherein the policy violation includes a user attempt to perform an operation to move data including sensitive information off the computing device;
determining whether one or more previous policy violations have occurred on the computing device; and
performing an action to minimize a risk of data loss based on the one or more previous policy violations.
2 Assignments
0 Petitions
Accused Products
Abstract
A monitor detects a policy violation on a computing device, wherein the policy violation includes a user attempt to perform an operation to move data that includes sensitive information off the computing device. The monitor determines whether one or more previous policy violations have occurred on the computing device. The monitor performs an action to minimize a risk of data loss based on the one or more previous policy violations.
229 Citations
24 Claims
-
1. A method of safeguarding sensitive information comprising:
-
detecting a policy violation on a computing device, wherein the policy violation includes a user attempt to perform an operation to move data including sensitive information off the computing device; determining whether one or more previous policy violations have occurred on the computing device; and performing an action to minimize a risk of data loss based on the one or more previous policy violations. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computing apparatus having a memory and a processor, the memory including instructions that, when executed by the processor, cause the computing apparatus to include a data loss prevention system comprising:
-
a policy violation detector to detect a policy violation on the computing apparatus, wherein the policy violation includes a user attempt to perform an operation to move data including sensitive information off the computing apparatus; and a policy violation responder to determine whether one or more previous policy violations have occurred on the computing device, and to perform an action to minimize a risk of data loss based on the one or more previous policy violations. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer readable medium including instructions that, when executed by a processing system, cause the processing system to perform a method of safeguarding sensitive information, comprising:
-
detecting a policy violation on a computing device, wherein the policy violation includes a user attempt to perform an operation to move data including sensitive information off the computing device; determining whether one or more previous policy violations have occurred on the computing device; and performing an action to minimize a risk of data loss based on the one or more previous policy violations. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification