Proprietary information identification, management and protection
First Claim
1. A computer-implemented method for facilitating the identification, management or protection of confidential proprietary data, the method comprising:
- receiving data descriptive of an instance of confidential proprietary information;
receiving into a database data descriptive of one or more entities involved in at least one of;
creating, conveying, receiving or accessing the instance of confidential proprietary information;
automatically generating one or more suggested actions based upon the data received and relating to the protection of the instance of confidential proprietary information; and
automatically generating one or more artifacts based upon the data received and in support of the one or more suggested actions related to the protection of the instance of confidential proprietary information.
1 Assignment
0 Petitions
Accused Products
Abstract
Computerized methods and systems are presented for facilitating identification, management and/or protection of proprietary information. Data can be received that is descriptive of proprietary information, entities involved in creating, conveying, receiving or accessing the proprietary information as well as any information that will be created, conveyed, received or accessed. The system receives data and generates suggested actions and artifacts to aid in the identification, management and/or protection of proprietary information that may result from the circumstances described by the data received. Embodiments can also include receiving data descriptive of a process and determining potential proprietary information that may be involved. Relevant suggested actions and artifacts can also be generated.
201 Citations
23 Claims
-
1. A computer-implemented method for facilitating the identification, management or protection of confidential proprietary data, the method comprising:
-
receiving data descriptive of an instance of confidential proprietary information; receiving into a database data descriptive of one or more entities involved in at least one of;
creating, conveying, receiving or accessing the instance of confidential proprietary information;automatically generating one or more suggested actions based upon the data received and relating to the protection of the instance of confidential proprietary information; and automatically generating one or more artifacts based upon the data received and in support of the one or more suggested actions related to the protection of the instance of confidential proprietary information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computer-implemented method for facilitating protection of an instance of confidential proprietary information, the method comprising:
-
receiving data descriptive of an instance of confidential proprietary information; based upon the data descriptive of the instance of confidential proprietary information, automatically generating examples of confidential proprietary information associated with one or more classifications; and automatically generating one or more suggested actions related to the instance of confidential proprietary information based upon the data descriptive of the instance of confidential proprietary information and the one or more classifications to be associated with the instance of confidential proprietary information. - View Dependent Claims (15)
-
-
16. A computer-implemented method for facilitating identification, management or protection of an instance of confidential proprietary information, the method comprising:
-
receiving data descriptive of a business process; based upon the data descriptive of a business process, automatically presenting one or more suggested action items associated with protecting an instance of confidential proprietary information created, revealed, received or accessed in connection with the business process; and automatically generating one or more artifacts related to the protection of the instance of confidential proprietary information based upon the data descriptive of the process and a potential for creating, revealing or accessing the instance of confidential proprietary information as a result of the process.
-
-
17. A computerized system for facilitating identification, management or protection of an instance of confidential proprietary information, the system comprising:
- a computer server accessible with a network access device via a communications network; and
executable software stored on the server and executable on demand, the software operative with the server to cause the system to;receive data descriptive of an instance of confidential proprietary information; receive data descriptive of one or more entities involved in at least one of; creating, conveying, receiving or accessing the instance of confidential proprietary information; automatically generate one or more suggested actions based upon the data received and relating to the protection of the instance of confidential proprietary information; and automatically generate one or more artifacts based upon the data received, wherein the artifact facilitates protection of the instance of confidential proprietary information.
- a computer server accessible with a network access device via a communications network; and
-
18. Computer executable program code residing on a computer-readable medium, the program code comprising instructions for causing the computer to:
-
receive data descriptive of an instance of confidential proprietary information; receive data descriptive of one or more entities involved in conveying the instance of confidential proprietary information; automatically generating one or more suggested actions based upon the data received and relating to the protection of the instance of confidential proprietary information; and automatically generating one or more artifacts based upon the data received, wherein the artifact facilitates protection of the instance of confidential proprietary information.
-
-
19. A method of interacting with a network access so as to facilitate identification, management or protection of an instance of confidential proprietary information, the method comprising the steps of:
-
initiating communication with a server via a network; inputting data descriptive of an instance of confidential proprietary information into a database on the server; inputting data descriptive of one or more entities involved in creating, conveying, receiving or accessing the instance of confidential proprietary information into the database on the server; inputting data descriptive of a time period during which the instance of confidential proprietary information will be created, conveyed, received or accessed into the database on the server; receiving data descriptive of one or more suggested actions wherein the data descriptive of the one or more actions is automatically generated based upon the data input into the database on the server and wherein the suggested action relates to the protection of the instance of confidential proprietary information; and receiving one or more artifacts with content based upon the data input into the database on the server.
-
-
20. A computer-implemented method for facilitating management of an instance of confidential proprietary information, the method comprising:
-
receiving data descriptive of an instance of confidential proprietary information to be protected; receiving data descriptive of one or more entities involved in at least one of;
creating, conveying, administering, securing, receiving and accessing the instance of confidential proprietary information;providing a computer interface comprising one or more options relating to protection of the instance of confidential proprietary information, wherein the one or more options comprise automatically creating a record in a database of recipients of the instance of confidential proprietary information; automatically generating one or more suggested actions based upon the data descriptive of the instance of confidential proprietary information to be protected and the data descriptive of the one or more entities; and automatically generating one or more artifacts based upon the data descriptive of the instance of confidential proprietary information to be protected and the data descriptive of the one or more entities wherein the one or more artifacts comprise at least one of;
a list of entities to whom the instance of confidential proprietary information has been disclosed and a list of instances of confidential proprietary information that has been disclosed. - View Dependent Claims (21)
-
-
22. A computer-implemented method for automatically creating and maintaining a database inventory of confidential proprietary information by category classification, the method comprising:
-
receiving data descriptive of an instance of confidential proprietary information; automatically indicating a category associated with the instance of confidential proprietary information based upon the data descriptive of the instance of confidential proprietary information, wherein the category is automatically retrieved from a database; providing a user interface comprising one or more user selectable options, wherein the options comprise at least one of;
adding a new category of confidential proprietary information to the database and adding a new instance of confidential proprietary information to the database;automatically generating one or more suggested actions based upon the data descriptive of the instance of confidential proprietary information and the category indicated; and automatically generating one or more artifacts based upon the data descriptive of the instance of confidential proprietary information and the category indicated, wherein the artifact comprises one or more of;
a list of instances of confidential proprietary information and a list of instances of confidential proprietary information categorized according to specific confidentiality classifications.
-
-
23. A method of interacting with a network device to facilitate identification, management or protection of confidential proprietary information, the method comprising the steps of:
-
initiating communication with a server via a communications network; inputting data descriptive of an instance of confidential proprietary information via a user interface or other application server; inputting data descriptive of one or more entities involved in creating, conveying, receiving or accessing the instance of confidential proprietary information; receiving automatically generated one or more suggested actions based upon the data descriptive of the instance of confidential proprietary information and the data descriptive of one or more entities; and receiving an automatically generated agreement specifying rights and obligations relating to the instance of confidential proprietary information based upon the data descriptive of an instance of confidential proprietary information and the data descriptive of one or more entities.
-
Specification