Methods and apparatus for analyzing social media for enterprise compliance issues
First Claim
1. An apparatus, comprising:
- a risk analysis module implemented in at least one of a memory or a processing device, the risk analysis module configured to receive, from a source communication device, a message addressed to a destination communication device and having an untracked attachment, the risk analysis module configured to analyze content of the untracked attachment to determine a risk level associated with the content of the untracked attachment; and
a file tracking module, remote from the destination communication device, configured to define, based on the untracked attachment, a tracked attachment in response to the risk level satisfying a criterion, the file tracking module configured to send a message having the tracked attachment to the destination communication device such that the tracked attachment sends periodic requests for updates from the destination communication device to the file tracking module, the file tracking module configured to receive, from the destination communication device, a confirmation in response to the tracked attachment being opened at the destination communication device.
8 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, a non-transitory processor-readable medium includes code that causes a processor to receive, at a compliance device, a message from a source communication device addressed to a destination communication device. The code causes the processor to analyze at a context engine, the content of the message to determine a first risk level associated with a preference of an organization. The code further causes the processor to analyze at a regulatory engine, the content of the message to determine a second risk level associated with a regulatory standard of a specific industry and to define a composite risk level based on the first risk level and the second risk level. The code further causes the processor to send a notification to an administrator if the composite risk level satisfies a criterion, and to send the message to the destination communication device irrespective of the composite risk level.
40 Citations
24 Claims
-
1. An apparatus, comprising:
-
a risk analysis module implemented in at least one of a memory or a processing device, the risk analysis module configured to receive, from a source communication device, a message addressed to a destination communication device and having an untracked attachment, the risk analysis module configured to analyze content of the untracked attachment to determine a risk level associated with the content of the untracked attachment; and a file tracking module, remote from the destination communication device, configured to define, based on the untracked attachment, a tracked attachment in response to the risk level satisfying a criterion, the file tracking module configured to send a message having the tracked attachment to the destination communication device such that the tracked attachment sends periodic requests for updates from the destination communication device to the file tracking module, the file tracking module configured to receive, from the destination communication device, a confirmation in response to the tracked attachment being opened at the destination communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive, from a source communication device and at a compliance device different from the source communication device and a destination communication device, a message addressed to the destination communication device and having an untracked attachment; analyze, at the compliance device, content of the untracked attachment to determine a risk level associated with the content of the untracked attachment; define, based on the untracked attachment and at the compliance device, a tracked attachment including a tracking portion in response to the risk level satisfying a criterion; send, from the compliance device, a message having the tracked attachment to the destination communication device; receive, from the destination communication device and at the compliance device, a confirmation in response to the tracked attachment being opened at the destination communication device, the confirmation being defined by the tracking portion of the tracked attachment; determine, in response to the confirmation and at the compliance device, that the tracked attachment is an outdated version of the tracked attachment; and send, from the compliance device, an updated version of the tracked attachment to the destination communication device such that the outdated version of the tracked attachment is replaced by the updated version of the tracked attachment at the destination communication device. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A non-transitory processor-readable medium storing code representing instructions to be executed by a processor, the code comprising code to cause the processor to:
-
receive, from a source communication device, a message addressed to a destination communication device and having an unlocked attachment; analyze content of the unlocked attachment to determine a risk level associated with the content of the unlocked attachment, the risk level being a composite risk level generated based at least in part on two different risk analysis methods; define, based on the unlocked attachment and in response to the risk level satisfying a criterion, a locked attachment by modifying a file extension type of the unlocked attachment, combining a cookie with the unlocked attachment, or modifying a header portion of the message having the unlocked attachment, content of the locked attachment corresponding to the content of the unlocked attachment; and send a message having the locked attachment to the destination communication device such that the destination communication device is able to open the locked attachment but unable to modify the locked attachment. - View Dependent Claims (21, 22, 23, 24)
-
Specification