Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design

作者: Kabir A. Barday

DOI:

关键词:

摘要: Computer implemented methods, according to various embodiments, comprise: (1) integrating a privacy management system with DLP tools; (2) using the tools identify sensitive information that is stored in computer memory outside of context system; and (3) response data being discovered by tool, displaying each area officer (e.g., similar pending transactions checking account have not been reconciled). A designated may then select particular entry either match it up reconcile it) an existing flow or campaign system, trigger new assessment be done on capture related attributes information.

参考文章(252)
Murthy V. Rallapalli, Duanhua Tu, Michael J. Currier, Lisa N. Schenkewitz, Sunil Joshi, System and method for enterprise privacy information compliance ,(2008)
Evimaria Terzi, Kun Liu, Algorithms for identity anonymization on graphs ,(2008)
Michael P. Gerlek, Don W. Davis, Ryan Cunningham, Programmatic data discovery platforms for computing applications ,(2014)
Andrew C. Felch, QUERY LANGUAGE FOR UNSTRUCTED DATA ,(2015)
Mathias Schoenecker, Matthias Richter, Data destruction mechanisms ,(2011)
Rita H. Wouhaybi, Eddie Balthasar, Hong Li, Persona manager for network communications ,(2011)