Information aggregation, processing and distribution system
First Claim
1. A method for use in managing access to and release of information in a collaborative environment, comprising the steps of:
- establishing a collaborative environment for collaboration among multiple network users, said collaborative environment including network structure for use in enabling a collaboration with respect to collaboration subject matter including sensitive information subject to a policy regarding handling thereof relative to particular ones of said network users, said policy being implemented by allowing access by one of said users to an altered version of said subject matter to facilitated collaboration and protect said sensitive information in accordance with said policy, said collaborative environment further including a computer-based tool for monitoring activities involving said collaboration subject matter;
first operating said computer-based tool to identify an activity involving said sensitive information;
second operating said computer-based tool to establish a log entry, separate from said collaboration subject matter, for said activity identifying a user associated with said activity and a nature of said activity, said log entry allowing, for auditing of operation of said network structure to verify, handling of said sensitive information in accordance with policy, wherein said activity comprises a request to access a document including said sensitive information; and
third operating said computer-based tool to automatically, substantially free from any contemporaneous user control, to create an altered version of said document that is altered with respect to said item of sensitive information.
1 Assignment
0 Petitions
Accused Products
Abstract
A utility is provided for managing exchanges of information within a context involving multiple users, for example, multi-user network collaboration. The invention enables automatic enforcement of a policy regarding sensitive information. The policy may be negotiated among the users and expressed as multiple rule sets that govern access to a use of sensitive information. The utility also logs activities involving sensitive information to ensure compliance with the policy. These logs can be audited by a third party or automatically processed for audit compliance by the utility. In this manner, an environment of trust is created which encourages fruitful collaboration.
91 Citations
4 Claims
-
1. A method for use in managing access to and release of information in a collaborative environment, comprising the steps of:
-
establishing a collaborative environment for collaboration among multiple network users, said collaborative environment including network structure for use in enabling a collaboration with respect to collaboration subject matter including sensitive information subject to a policy regarding handling thereof relative to particular ones of said network users, said policy being implemented by allowing access by one of said users to an altered version of said subject matter to facilitated collaboration and protect said sensitive information in accordance with said policy, said collaborative environment further including a computer-based tool for monitoring activities involving said collaboration subject matter; first operating said computer-based tool to identify an activity involving said sensitive information; second operating said computer-based tool to establish a log entry, separate from said collaboration subject matter, for said activity identifying a user associated with said activity and a nature of said activity, said log entry allowing, for auditing of operation of said network structure to verify, handling of said sensitive information in accordance with policy, wherein said activity comprises a request to access a document including said sensitive information; and third operating said computer-based tool to automatically, substantially free from any contemporaneous user control, to create an altered version of said document that is altered with respect to said item of sensitive information. - View Dependent Claims (2, 3)
-
-
4. A method for use in managing access to and release of information in a collaborative environment, comprising the steps of:
-
establishing a network structure for handling information relative to multiple users of the network structure, said information including sensitive information subject to a policy regarding handling thereof; storing rules defining said policy; first operating a computer-based tool to monitor operation of said network structure to identify an activity concerning an item of said sensitive information involving a particular user; in response to said monitoring, second operating said computer-based tool to access at least one of said rules associated with particular user; and third operating said computer-based tool to control operation of said network structure based on said at least one of said rules so as to automatically handle said activity concerning said item of sensitive information in accordance with said policy, wherein said activity comprises a request by said particular user to access a document including said item of sensitive information and said step of third operating comprises using said computer-based tool to automatically, substantially free from any contemporaneous user control, create an altered version of said document that is altered with respect to said item of sensitive information so that said particular user can access said altered version of said document to facilitated collaboration and protect said sensitive information is protected in accordance with said policy.
-
Specification