×

Data processing systems and communication systems and methods for the efficient generation of privacy risk assessments

  • US 10,706,447 B2
  • Filed: 09/23/2019
  • Issued: 07/07/2020
  • Est. Priority Date: 04/01/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented data processing method for conducting privacy risk assessments for a plurality of privacy campaigns, the method comprising, for each of the plurality of privacy campaigns:

  • performing, by one or more processors for a particular privacy campaign, a first threshold privacy impact assessment, wherein performing the first threshold privacy impact assessment comprises;

    presenting, to a user, a first set of one or more questions for a first plurality of question/answer pairings that identify one or more privacy characteristics of the particular privacy campaign;

    receiving, by one or more processors, at least one respective answer for the first plurality of question/answer pairings regarding the one or more privacy characteristics of the particular privacy campaign;

    determining, by one or more processors, a threshold privacy risk score for the particular privacy campaign that identifies a level of risk for one or more of the one or more privacy characteristics indicated in the first plurality of question/answer pairings;

    comparing, by one or more processors, the threshold privacy risk score to a threshold privacy risk value, the threshold privacy risk value indicating a pre-determined level of risk regarding the one or more privacy characteristics of the particular privacy campaign;

    determining, by one or more processors, whether the threshold privacy risk score exceeds the threshold privacy risk value;

    in response to determining that the threshold privacy risk score exceeds the threshold privacy risk value, performing, by one or more processors for the privacy campaign, a second threshold privacy impact assessment, wherein performing the second threshold privacy impact assessment comprises;

    obtaining a copy of a software application used to collect or use sensitive user information as part of the particular privacy campaign;

    automatically electronically analyzing, by one or more computer processors, the software application to determine one or more privacy-related attributes of the software application, each of the one or more privacy-related attributes indicating one or more types of personal information the software application collects or accesses;

    electronically displaying to a second user, by one or more computer processors, a list of the one or more privacy-related attributes of the software application;

    electronically displaying, by one or more computer processors, one or more prompts to the second user, wherein each prompt informs the second user to input information regarding one or more particular attributes of the one or more privacy-related attributes;

    communicating, by one or more computer processors, the one or more privacy-related attributes to the user for use in conducting the second threshold privacy impact assessment of the software application;

    presenting, by one or more processors to the user, a second set of one or more questions for a second plurality of question/answer pairings that identify one or more privacy characteristics of the particular privacy campaign,receiving, by one or more processors, at least one respective answer for the second plurality of question/answer pairings regarding the one or more privacy characteristics of the particular privacy campaign,determining a respective weighting factor for each of the second plurality of question/answer pairings based on one or more privacy-related factors associated with the particular privacy campaign,determining a second privacy risk score based upon, for each of the second plurality of question/answer pairings, the respective weighting factor, andelectronically associating the second privacy risk score with the particular privacy campaign; and

    in response to determining that the threshold privacy risk score does not exceed the threshold privacy risk value, storing, by one or more processors, an indication that the particular privacy campaign is a low privacy risk campaign.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×