SYSTEM AND METHOD FOR DATA LEAKAGE PREVENTION
First Claim
1. A method for securing information, comprising:
- detecting an access to sensitive data;
determining user information associated with the access to sensitive data;
determining a unique user identifier associated with the user information;
comparing the access to sensitive data to a policy utilizing the unique user identifier;
determining that the access to sensitive data violates the policy in response to comparing the access to the policy; and
recording an entry in response to determining that the access to sensitive data violates the policy.
2 Assignments
0 Petitions
Accused Products
Abstract
According to one embodiment, a method for securing information includes detecting an access to sensitive data and determining user information associated with the access to sensitive data. The method also includes determining a unique user identifier associated with the user information. In addition, the method includes comparing the access to sensitive data to a policy utilizing the unique user identifier. Further, the method includes determining that the access to sensitive data violates the policy in response to comparing the access to the policy. The method also includes recording an entry in response to determining that the access to sensitive data violates the policy.
-
Citations
21 Claims
-
1. A method for securing information, comprising:
-
detecting an access to sensitive data; determining user information associated with the access to sensitive data; determining a unique user identifier associated with the user information; comparing the access to sensitive data to a policy utilizing the unique user identifier; determining that the access to sensitive data violates the policy in response to comparing the access to the policy; and recording an entry in response to determining that the access to sensitive data violates the policy. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. One or more tangible, computer-readable storage media comprising instructions that, when executed by at least one processor, are operable to:
-
detect an access to sensitive data; determine user information associated with the access to sensitive data; determine a unique user identifier associated with the user information; compare the access to sensitive data to a policy utilizing the unique user identifier; determine that the access violates the policy in response to comparing the access to the policy; and record an entry in response to determining that the access violates the policy. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for data leakage prevention, comprising:
-
an agent operable to; detect an access to sensitive data; and determine user information associated with the access to sensitive data; and a subsystem operable to; determine a unique user identifier associated with the user information; compare the access to sensitive data to a policy utilizing the unique user identifier; determine that the access violates the policy in response to comparing the access to the policy; and record an entry in response to determining that the access violates the policy. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification