×

Application of information management policies based on operation with a geographic entity

  • US 9,633,216 B2
  • Filed: 12/27/2012
  • Issued: 04/25/2017
  • Est. Priority Date: 12/27/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method of providing data storage services for a first computing device, comprising:

  • determining, with a second computing device, a current location of the first computing device,wherein the first computing device generates application data, andwherein the second computing device is associated with providing the data storage services for the first computing device; and

    wherein the first computing device is a mobile device;

    determining, with the second computing device, a country or geographic region corresponding to the current location of the first computing device;

    querying a data structure using the country or geographic region to determine which data storage rules apply to the determined country or geographic region corresponding to the current location of the first computing device,wherein the data storage rules are based on data retention regulations for the determined country or geographic region; and

    applying, with the second computing device, a data storage policy to the application data generated by the first computing device,wherein the application data includes production copies of data created at the first computing device,wherein the data storage policy includes creating at least one secondary copy of the application data,wherein the data storage policy is applied based on the data storage rules determined by querying the data structure to apply to the determined country or geographic region corresponding to the current location of the first computing device,wherein the applied data storage policy includes;

    a frequency with which secondary copies of the production copies of the application data are made,a location to which the secondary copies of the production copies of the application data are stored,a type of secondary copy of the production copies of the application data to be made, andsecurity measures to be applied to at least some of the application data stored on the first computing device.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×