Security Classification Applying Social Norming
First Claim
1. A method for content management, said method including:
- receiving content from a user;
storing the received content in a data repository;
identifying an attempt to access the content from a non-user;
determining whether the content includes a security classification; and
sending an alert to the user when the content does not include a security classification, the alert including a request to assign a security classification to the content.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment of the invention provides a method for security classification applying social norming. More specifically, content is received from a user via an interface; and, a data repository connected to the interface stores the content. A portal connected to the data repository identifies an attempt to access the content from a non-user. A program processor connected to the portal determines whether the content includes a security classification. When the content does not include a security classification, a communications module connected to the program processor sends an alert to the user. The alert includes a request to assign a security classification to the content. When the content includes a security classification, the communications module sends a message to the user, wherein the message includes a request to verify the security classification.
17 Citations
25 Claims
-
1. A method for content management, said method including:
-
receiving content from a user; storing the received content in a data repository; identifying an attempt to access the content from a non-user; determining whether the content includes a security classification; and sending an alert to the user when the content does not include a security classification, the alert including a request to assign a security classification to the content. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for content management, said method including:
-
receiving content from a user; storing the received content in a data repository; identifying an attempt to access the content from a non-user; determining whether the content includes a security classification; sending an alert to the user when the content does not include a security classification, the alert including a request to assign a security classification to the content; and sending a message to the user when the content includes a security classification, the message including a request to verify the security classification. - View Dependent Claims (13)
-
-
14. A system for content management, said system including:
-
an interface for receiving content from a user; a data repository connected to said interface for storing the received content; a portal connected to said data repository, said portal identifies an attempt to access the content by a non-user; a program processor connected to said portal, said program processor determines whether the content includes a security classification; and a communications module connected to said program processor, said communications module sends an alert to the user when the content does not include a security classification, the alert including a request to assign a security classification to the content. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A computer program product for content management, said computer program product including:
-
a computer readable storage medium; first program instructions to receive content from a user; second program instructions to store the received content in a data repository; third program instructions to identify an attempt to access the content from a non-user; fourth program instructions to determine whether the content includes a security classification; and fifth program instructions to send an alert to the user when the content does not include a security classification, the alert including a request to assign a security classification to the content, said first program instructions, said second program instructions, said third program instructions, said fourth program instructions, and said fifth program instructions are stored on said computer readable storage medium.
-
Specification