PROTECTING SENSITIVE INFORMATION FROM A SECURE DATA STORE
First Claim
1. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
- a. Receiving an indication that a computer facility has access to a secure data store;
b. Causing a security parameter of a storage medium local to the computer facility to be assessed;
c. Determining if the security parameter is compliant with a security policy relating to computer access of the remote secure data store;
d. In response to an indication that the security parameter is non-compliant, causing the computer facility to implement an action to prevent further dissemination of information.
9 Assignments
0 Petitions
Accused Products
Abstract
In embodiments of the present invention improved capabilities are described for the steps of receiving an indication that a computer facility has access to a secure data store, causing a security parameter of a storage medium local to the computer facility to be assessed, determining if the security parameter is compliant with a security policy relating to computer access of the remote secure data store, and in response to an indication that the security parameter is non-compliant, cause the computer facility to implement an action to prevent further dissemination of information, to disable access to network communications, to implement an action to prevent further dissemination of information, and the like.
70 Citations
3 Claims
-
1. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
-
a. Receiving an indication that a computer facility has access to a secure data store; b. Causing a security parameter of a storage medium local to the computer facility to be assessed; c. Determining if the security parameter is compliant with a security policy relating to computer access of the remote secure data store; d. In response to an indication that the security parameter is non-compliant, causing the computer facility to implement an action to prevent further dissemination of information.
-
-
2. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
-
a. Receiving an indication that a computer facility has access to a secure data store; b. Causing a security parameter of a storage medium local to the computer facility to be assessed; c. Determining if the security parameter is compliant with a security policy relating to computer access of the remote secure data store; d. In response to an indication that the security parameter is non-compliant, causing the computer facility to disable access to network communications.
-
-
3. A computer program product embodied in a computer readable medium that, when executing on one or more computers, performs the steps of:
-
a. Receiving an indication that a computer facility has access to a secure data store; b. Causing a security parameter relating to the computer facility to be assessed; c. Determining if the security parameter is compliant with a security policy relating to computer access of the remote secure data store; d. In response to an indication that the security parameter is non-compliant, causing the computer facility to implement an action to prevent further dissemination of information.
-
Specification