Privacy management policy hub
First Claim
Patent Images
1. A computer implemented method comprising:
- evaluating, by a processor of a computer system, a privacy rule by accessing a privacy knowledgebase;
in response to the evaluating, storing a privacy preference in a privacy database, whereinthe privacy database is stored in a computer readable storage medium of the computer system,a privacy process module is communicatively coupled to the privacy database,the privacy preference corresponds to the privacy rule;
generating, by the processor, a cleansed record by cleansing a legacy record, whereingenerating the cleansed record comprises;
retrieving the legacy record, wherein the privacy process module receives the legacy record from a legacy computer system as part of an insert operation, and wherein the privacy process module determines if a best version record associated with the legacy computer system exists in the database,determining, by the processor, that the insert operation is a real-time insert operation;
determining, by the processor, whether customer data management (CDM) is active,if the CDM is not active,inserting the legacy record into the best version record; and
if the CDM is active,performing the cleansing of the legacy record based at least in part on the privacy preference, andinserting the cleansed legacy record into the best version record if no match for the legacy record is found in the best version record.
0 Assignments
0 Petitions
Accused Products
Abstract
A system architecture is disclosed that includes a privacy management system. In particular, the privacy management system provides a policy hub for maintaining and managing customer privacy information. The privacy management system maintains a master data database for customer information and customer privacy preferences, and a rules database for privacy rules. The privacy management system captures, synchronizes, and stores customer privacy data. Privacy rules may be authored using a privacy management vocabulary, and can be customized for an enterprise'"'"'s privacy policies.
-
Citations
14 Claims
-
1. A computer implemented method comprising:
-
evaluating, by a processor of a computer system, a privacy rule by accessing a privacy knowledgebase; in response to the evaluating, storing a privacy preference in a privacy database, wherein the privacy database is stored in a computer readable storage medium of the computer system, a privacy process module is communicatively coupled to the privacy database, the privacy preference corresponds to the privacy rule; generating, by the processor, a cleansed record by cleansing a legacy record, wherein generating the cleansed record comprises; retrieving the legacy record, wherein the privacy process module receives the legacy record from a legacy computer system as part of an insert operation, and wherein the privacy process module determines if a best version record associated with the legacy computer system exists in the database, determining, by the processor, that the insert operation is a real-time insert operation; determining, by the processor, whether customer data management (CDM) is active, if the CDM is not active, inserting the legacy record into the best version record; and if the CDM is active, performing the cleansing of the legacy record based at least in part on the privacy preference, and inserting the cleansed legacy record into the best version record if no match for the legacy record is found in the best version record. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A privacy management system comprising:
-
one or more processors; a computer readable storage medium coupled to the one or more processors; a privacy database stored in the computer readable storage medium; and instructions stored in the computer readable storage medium executable by the one or more processors to evaluate a privacy rule by accessing a privacy knowledgebase; in response to the evaluating, store a privacy preference in the privacy database, wherein a privacy process module is communicatively coupled to the privacy database, the privacy preference corresponds to the privacy rule; generate a cleansed record by cleansing a legacy record, wherein the generating the cleansed record comprises; retrieving the legacy record, wherein the privacy process module receives the legacy record from a legacy computer system as part of an insert operation, and wherein the privacy process module determines if a best version record associated with the legacy computer system exists in the privacy database, determine that the insert operation is a real-time insert operation; determine whether customer data management (CDM) is active, if the CDM is not active, insert the legacy record into the best version record; and if the CDM is active, perform the cleansing of the legacy record based at least in part on the privacy preference, and insert the cleansed legacy record into the best version record if no match for the legacy record is found in the best version record. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer program product comprising non-transitory computer readable storage media comprising a plurality of instructions executable on a computer system, wherein the plurality of instructions are configured to
evaluate, by a processor of the computer system, a privacy rule by accessing a privacy knowledgebase; -
in response to the evaluating, store a privacy preference in a privacy database, wherein the privacy database is stored in the computer readable storage medium of the computer system, a privacy process module is communicatively coupled to the privacy database, the privacy preference corresponds to the privacy rule; generate, by the processor, a cleansed record by cleansing a legacy record, wherein generating the cleansed record comprises retrieving the legacy record, wherein the privacy process module receives the legacy record from a legacy computer system as part of an insert operation, and wherein the privacy process module determines if a best version record associated with the legacy computer system exists in the privacy database; determine, by the processor, that, the insert operation is a real-time insert operation; determine, by the processor, whether customer data management (CDM) is active, if the CDM is not active, insert the legacy record into the best version record; and if the CDM is active, perform the cleansing of the legacy record based at least in part on the privacy preference, and insert the cleansed legacy record into the best version record if no match for the legacy record is found in the best version record. - View Dependent Claims (12, 13, 14)
-
Specification