DATA PROCESSING SYSTEMS FOR DATA TRANSFER RISK IDENTIFICATION AND RELATED METHODS
First Claim
1. A computer-implemented data processing method for assessing a risk associated with one or more data transfers between one or more data assets, the method comprising:
- creating a data transfer record for a data transfer between a first asset in a first location and a second asset in a second location;
accessing a set of data transfer rules that are associated with the data transfer record;
performing a data transfer assessment based at least in part on applying the set of data transfer rules on the data transfer record;
identifying one or more data transfer risks associated with the data transfer record, based at least in part on the data transfer assessment;
calculating a risk score for the data transfer based at least in part on the one or more data transfer risks associated with the data transfer record; and
digitally storing the risk score for the data transfer.
2 Assignments
0 Petitions
Accused Products
Abstract
In particular embodiments, a Data Transfer Risk Identification System may be configured to analyze one or more data systems (e.g., data assets), identify data transfers between/among those systems, apply data transfer rules to each data transfer record, perform a data transfer assessment on each data transfer record based on the data transfer rules to be applied to each data transfer record, and calculate a risk score for the data transfer based at least in part on the one or more data transfer risks associated with the data transfer record.
-
Citations
20 Claims
-
1. A computer-implemented data processing method for assessing a risk associated with one or more data transfers between one or more data assets, the method comprising:
-
creating a data transfer record for a data transfer between a first asset in a first location and a second asset in a second location; accessing a set of data transfer rules that are associated with the data transfer record; performing a data transfer assessment based at least in part on applying the set of data transfer rules on the data transfer record; identifying one or more data transfer risks associated with the data transfer record, based at least in part on the data transfer assessment; calculating a risk score for the data transfer based at least in part on the one or more data transfer risks associated with the data transfer record; and digitally storing the risk score for the data transfer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented data processing method for assessing a risk associated with one or more data transfers between one or more data assets, the method comprising:
-
accessing a data transfer record for a data transfer between a first asset in a first location and a second asset in a second location; accessing a set of data transfer rules that are associated with the data transfer record, wherein the set of data transfer rules comprise; one or more privacy law framework of the one or more of the first location and the second location, and one or more entity framework of one or more of (i) an entity associated with the one or more first data asset and (ii) an entity associated with the one or more second data asset; performing a data transfer assessment based at least in part on applying the set of data transfer rules on the data transfer record; identifying one or more data transfer risks associated with the data transfer record, based at least in part on the data transfer assessment; calculating a risk score for the data transfer based at least in part on the one or more data transfer risks associated with the data transfer record; and digitally storing the risk score for the data transfer. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented data processing method for assessing a risk associated with one or more data transfers between one or more data assets, the method comprising:
-
accessing a data transfer record for a data transfer between a first asset in a first location and a second asset in a second location; accessing a set of data transfer rules that are associated with the data transfer record; performing a data transfer assessment based at least in part on applying the set of data transfer rules on the data transfer record; identifying one or more data transfer risks associated with the data transfer record, based at least in part on the data transfer assessment; calculating a risk score for the data transfer based at least in part on the one or more data transfer risks associated with the data transfer record; digitally storing the risk score for the data transfer; comparing the risk score for the data transfer to a threshold risk score; determining that the risk score for the data transfer is a greater risk than the threshold risk score; and in response to determining that the risk score for the data transfer is a greater risk than the threshold risk score, taking one or more action. - View Dependent Claims (17, 18, 19, 20)
-
Specification