作者: Kabir A. Barday
DOI:
关键词:
摘要: Computer implemented methods, according to various embodiments, comprise: (1) integrating a privacy management system with DLP tools; (2) using the tools identify sensitive information that is stored in computer memory outside of context system; and (3) response data being discovered by tool, displaying each area officer (e.g., similar pending transactions checking account have not been reconciled). A designated may then select particular entry either match it up reconcile it) an existing flow or campaign system, trigger new assessment be done on capture related attributes information.