System and method for ensuring privacy while tagging information in a network environment
First Claim
1. A method, comprising:
- receiving data propagating in a network environment;
verifying whether the data is associated with a first end user represented in a registered user list;
verifying a ratification of a policy by the first end user that authorizes monitoring of e-mail traffic generated by the first end user;
identifying selected words within the data based on a whitelist, wherein the whitelist includes a plurality of designated words to be tagged; and
generating a resultant composite of the selected words that are tagged.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is provided in one example and includes receiving data propagating in a network environment and verifying whether the data is associated with a first end user represented in a registered user list. The method also includes verifying a ratification of a policy associated with data monitoring related to the first end user. Selected words can be identified within the data based on a whitelist, where the whitelist includes a plurality of designated words to be tagged. A resultant composite of the selected words that are tagged is generated. In more specific embodiments, the method can include verifying whether the data is associated with a business email domain. In still other embodiments, the method can include verifying whether the data is associated with a business uniform resource locator (URL) domain.
42 Citations
20 Claims
-
1. A method, comprising:
-
receiving data propagating in a network environment; verifying whether the data is associated with a first end user represented in a registered user list; verifying a ratification of a policy by the first end user that authorizes monitoring of e-mail traffic generated by the first end user; identifying selected words within the data based on a whitelist, wherein the whitelist includes a plurality of designated words to be tagged; and generating a resultant composite of the selected words that are tagged. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. Logic encoded in one or more non-transitory media that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
receiving data propagating in a network environment; verifying whether the data is associated with a first end user represented in a registered user list; verifying a ratification of a policy by the first end user that authorizes monitoring of e-mail traffic generated by the first end user; identifying selected words within the data based on a whitelist, wherein the whitelist includes a plurality of designated words to be tagged; and generating a resultant composite of the selected words that are tagged. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. An apparatus, comprising:
-
a memory element configured to store data; a processor operable to execute instructions associated with the data; and a policy acceptance module configured to interface with the memory element and the processor, the policy acceptance module being configured to; receive data propagating in a network environment; verify whether the data is associated with a first end user represented in a registered user list; verify a ratification of a policy by the first end user that authorizes monitoring of e-mail traffic generated by the first end user; and a user traffic processing module configured to; identify selected words within the data based on a whitelist, wherein the whitelist includes a plurality of designated words to be tagged; and generate a resultant composite of the selected words that are tagged. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification