Monitoring communications
First Claim
Patent Images
1. A method, comprising:
- identifying, by a computing device, a communication that includes non-public information;
identifying, by the computing device, a sender of the communication;
evaluating, by the computing device, the amount of non-public information included in the communication;
determining, by the computing device, whether the amount of non-public information included in the communication exceeds a predetermined threshold corresponding to the sender;
in response to determining whether the amount of non-public information included in the communication exceeds the predetermined threshold, determining, by the computing device, whether the communication meets at least one outlier condition that, when met, represents a risk of unauthorized dissemination of the non-public information;
in response to determining that the communication meets the at least one outlier condition, submitting, by the computing device, the communication for review; and
based on a result of the review of the communication, automatically updating the predetermined threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, computer readable media, and apparatuses for monitoring communications are presented. A communication that includes non-public information may be identified. Subsequently, it may be determined whether the communication meets at least one outlier condition. In response to determining that the communication meets the at least one outlier condition, the communication may be submitted for review.
-
Citations
21 Claims
-
1. A method, comprising:
-
identifying, by a computing device, a communication that includes non-public information; identifying, by the computing device, a sender of the communication; evaluating, by the computing device, the amount of non-public information included in the communication; determining, by the computing device, whether the amount of non-public information included in the communication exceeds a predetermined threshold corresponding to the sender; in response to determining whether the amount of non-public information included in the communication exceeds the predetermined threshold, determining, by the computing device, whether the communication meets at least one outlier condition that, when met, represents a risk of unauthorized dissemination of the non-public information; in response to determining that the communication meets the at least one outlier condition, submitting, by the computing device, the communication for review; and based on a result of the review of the communication, automatically updating the predetermined threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus, comprising:
-
at least one processor; and at least one memory storing computer-executable instructions that, when executed by the at least one processor, cause the apparatus to; identify a communication that includes non-public information; identify a sender of the communication; evaluate the amount of non-public information included in the communication; determine whether the amount of non-public information included in the communication exceeds a predetermined threshold corresponding to the sender; in response to determining whether the amount of non-public information included in the communication exceeds the predetermined threshold, determine whether the communication meets at least one outlier condition that, when met, represents a risk of unauthorized dissemination of the non-public information; in response to determining that the communication meets the at least one outlier condition, submit the communication for review; and based on a result of the review of the communication, automatically update the predetermined threshold. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. At least one non-transitory computer-readable medium storing computer-executable instructions that, when executed by at least one processor, cause the at least one processor to:
-
identify a communication that includes non-public information; identify a sender of the communication; evaluate the amount of non-public information included in the communication; determine whether the amount of non-public information included in the communication exceeds a predetermined threshold corresponding to the sender; in response to determining whether the amount of non-public information included in the communication exceeds the predetermined threshold, determine whether the communication meets at least one outlier condition that, when met, represents a risk of unauthorized dissemination of the non-public information; in response to determining that the communication meets the at least one outlier condition, submit the communication for review; and based on a result of the review of the communication, automatically update the predetermined threshold. - View Dependent Claims (17, 18, 19, 20, 21)
-
Specification