×

Privacy management policy hub

  • US 9,367,884 B2
  • Filed: 12/09/2013
  • Issued: 06/14/2016
  • Est. Priority Date: 10/19/2007
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method comprising:

  • evaluating, by a processor of a computer system, a privacy rule by accessing a privacy knowledgebase;

    in response to the evaluating, storing a privacy preference in a privacy database, whereinthe privacy database is stored in a computer readable storage medium of the computer system,a privacy process module is communicatively coupled to the privacy database,the privacy preference corresponds to the privacy rule;

    generating, by the processor, a cleansed record by cleansing a legacy record, whereingenerating the cleansed record comprises;

    retrieving the legacy record, wherein the privacy process module receives the legacy record from a legacy computer system as part of an insert operation, and wherein the privacy process module determines if a best version record associated with the legacy computer system exists in the database,determining, by the processor, that the insert operation is a real-time insert operation;

    determining, by the processor, whether customer data management (CDM) is active,if the CDM is not active,inserting the legacy record into the best version record; and

    if the CDM is active,performing the cleansing of the legacy record based at least in part on the privacy preference, andinserting the cleansed legacy record into the best version record if no match for the legacy record is found in the best version record.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×