Management of sensitive information access and use
Abstract:
Methods, systems, and apparatus, including computer programs encoded on computer storage media, sharing sensitive information with authorized individuals while reducing the likelihood that the sensitive information will be shared with unauthorized individuals. One of the methods includes receiving from a user an indication that a particular piece of information is sensitive information; automatically individually encrypting the sensitive information; automatically logging each access of the sensitive information; and reporting to the user that the sensitive information has been accessed, wherein the information management system to which the user indicates that a particular piece of information is sensitive information is the same information management system that reports to the user that the encrypted sensitive information has been accessed.
Public/Granted literature
Information query
Patent Agency Ranking
0/0