Verint Americas Inc. (20240249023). SYSTEM AND METHOD OF AUTOMATED DETERMINATION OF USE OF SENSITIVE INFORMATION AND CORRECTIVE ACTION FOR IMPROPER USE simplified abstract

From WikiPatents
Jump to navigation Jump to search

SYSTEM AND METHOD OF AUTOMATED DETERMINATION OF USE OF SENSITIVE INFORMATION AND CORRECTIVE ACTION FOR IMPROPER USE

Organization Name

Verint Americas Inc.

Inventor(s)

Michael Johnston of Alpharetta GA (US)

Neil Eades of Glasgow (GB)

Ashish Sood of Glasgow (GB)

SYSTEM AND METHOD OF AUTOMATED DETERMINATION OF USE OF SENSITIVE INFORMATION AND CORRECTIVE ACTION FOR IMPROPER USE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240249023 titled 'SYSTEM AND METHOD OF AUTOMATED DETERMINATION OF USE OF SENSITIVE INFORMATION AND CORRECTIVE ACTION FOR IMPROPER USE

The present invention enables a CEC system to automatically monitor the use, storage, access, and modification of sensitive information/data through desktop monitoring. Additionally, the system can automatically detect improper use, access, storage, and modification of sensitive information by monitoring CSRs through desktop, video, and audio monitoring, implementing sensitive data use rules tailored to the user. The system can also automatically identify and enforce violation actions for improper handling of sensitive information, creating an intelligent system that can locate and regulate all sensitive data in the system.

  • Automated tracking of sensitive information/data usage, storage, access, and modification in a CEC system through desktop monitoring.
  • Detection of improper use, access, storage, and modification of sensitive information by monitoring CSRs through desktop, video, and audio monitoring.
  • Implementation of sensitive data use rules customized for the user to enhance data security.
  • Automatic identification and enforcement of violation actions for mishandling of sensitive information.
  • Intelligent system capable of locating and regulating all sensitive data in the system.

Potential Applications: - Data security and compliance monitoring in corporate environments. - Preventing data breaches and unauthorized access to sensitive information. - Enhancing data protection and privacy measures in organizations.

Problems Solved: - Lack of automated monitoring and enforcement of data security policies. - Difficulty in detecting and preventing improper use of sensitive information. - Inadequate tools for regulating access and storage of sensitive data.

Benefits: - Improved data security and compliance. - Enhanced protection of sensitive information. - Automated monitoring and enforcement of data security policies.

Commercial Applications: Title: Automated Sensitive Information Monitoring System for Enhanced Data Security This technology can be utilized in industries such as finance, healthcare, and government agencies to ensure compliance with data protection regulations and prevent unauthorized access to sensitive information.

Questions about Automated Sensitive Information Monitoring System for Enhanced Data Security: 1. How does the system differentiate between proper and improper use of sensitive information? 2. What are the key features that make this system effective in enhancing data security measures?

Frequently Updated Research: Stay updated on the latest advancements in data security technologies and compliance regulations to ensure the system remains effective in safeguarding sensitive information.


Original Abstract Submitted

the present invention allows a cec system to automatedly track the use, storage, access, and modification of sensitive information/data in the system through desktop monitoring. further, through desktop, video, and audio monitoring of csrs the system can automatedly determine the improper use, access, storage, and modification of sensitive information by implementing sensitive data use rules that allow a system to be specialized for the user. finally, the system can automatedly determine and implement violation actions for the improper use, storage, access, and manipulation of sensitive information. this provides an intelligent system capable of locating all sensitive data in the system and regulating the use, access, and storage of sensitive data in the system.