US20150172296A1 - Systems and methods for device configuration and activation with automated privacy law compliance - Google Patents
Systems and methods for device configuration and activation with automated privacy law compliance Download PDFInfo
- Publication number
- US20150172296A1 US20150172296A1 US14/629,407 US201514629407A US2015172296A1 US 20150172296 A1 US20150172296 A1 US 20150172296A1 US 201514629407 A US201514629407 A US 201514629407A US 2015172296 A1 US2015172296 A1 US 2015172296A1
- Authority
- US
- United States
- Prior art keywords
- privacy
- path
- computer
- implemented method
- configuration
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Definitions
- the inventions relate generally to the field of device configuration and, more particularly, but not by way of limitation, to initial device configuration and activation with automated privacy policy localization and acceptance confirmation.
- the experience that a user has when preparing a first use of a new product is the user's out-of-box experience (OOBE).
- OOBE out-of-box experience
- computer equipment and systems were difficult to configure for first use.
- Technical operations were often required, including correct input of data parameter values into particular forms, or to provide selections for technical configuration options, in order to set up user accounts and profiles, system passwords, networking, user preferences and privacy controls.
- the input interfaces available for configuration often reside within device control panels or other settings interfaces that are intimidating to users who do not have prior technical knowledge.
- a user manual or a README file were typically tools provided to guide a user to prepare the product or device for first use.
- Guided setups include using setup assistants or wizards that provide a user with an ordered path to input the required information and perform the required selections.
- the device linearly navigates the user through a series of interfaces which prompt the user for the required information, and may provide instructions for selecting available configuration options. It is desirable to provide an OOBE that further improves on the basic setup for a device.
- a system and method for device configuration and activation with automated privacy law compliance is disclosed.
- a selection for a configuration path for a device is received during device initialization.
- the configuration path is either a simple path or a full path.
- a restricted device configuration is applied to allow restricted access to device applications and resources of the device.
- a privacy policy requirement is determined that is applicable to the device based on location information of the device.
- FIGS. 1A and 1B are a flow diagram illustrating a dual-path out-of-box experience, according to some embodiments.
- FIG. 2 is an example of an interface provided within the out-of-box experience for complying with COPPA, according to some embodiments.
- FIG. 3 is a flow diagram illustrating a method within the out-of-box experience for complying with COPPA, according to some embodiments.
- FIG. 4 is a block diagram that illustrates a computer system upon which some embodiments may be implemented.
- FIGS. 1A and 1B are a flow diagram in two parts illustrating a computer-device-executed process 100 for providing a dual-path out-of-box experience (OOBE), according to some embodiments.
- a dual-path OOBE is launched at device initialization.
- device initialization occurs during the device's first power-on by a user after the device is newly configured from the factory.
- device initialization occurs during the device's first power-on after the device is reset to factory settings.
- the dual-path OOBE is manually launched after receiving a user's launch command.
- a mode selected by a user is detected. Examples of OOBE paths include a simple path that provides restricted access to a pre-determined set of device applications and resources, or a full path that provides full access to all device resources.
- the dual-path is implemented by use of settings parameters, such that a simple path comprises a set of parameter values providing access to a limited set of device applications and resources, and a full path comprises a set of parameter values providing access to an unrestricted set of device applications and resources.
- step 105 device applications and resources are determined by the device for the simple path.
- Examples of device applications and resources that may be affected by the simple-path selection include media assets such as videos and music, application programs, internet connectivity permissions, and access to online purchasing of new content.
- the device may include multiple operating modes, such as parent-mode or child-mode, wherein an input of a valid password is required to switch from one mode to another.
- a temporary or default parent-mode password is provided to input authorization for switching between modes.
- a temporary password may include a hard-coded password or a factory-set password that is disclosed to a parent during set-up that is intended to be replaced by a user-provided password.
- the simple path is completed and the device allows operation in a restricted mode.
- one or more prompts are provided to request input from the user for setting up accounts and settings on the device, including, for example, one or more of billing data, parent mode username and password, user information, including parent information and child information for some embodiments, warranty registration, and internet connectivity selections, including WiFi network selection.
- the requests for information may occur in any particular order on various interface configurations.
- an international privacy law analysis module is invoked.
- the module determines which, if any, privacy policies are applicable under laws, regulations, and/or other requirements relevant to use of the device within one or more legal, corporate, or other jurisdictions encompassing the location of use as reflected in the user location information.
- the international privacy law analysis module determines the applicable privacy policy by accessing a database or other store of information correlating potential locations of use with corresponding privacy policies preferably conforming with laws, regulations, and/or other requirements applicable to use of the device in each potential location of use.
- User location information may be accepted from a user at step 111 .
- user location information is automatically determined based on location detection methods.
- the device may detect current device location by Global Positioning System (GPS) technology in the device and/or an associated IP address location or other location service on the device if internet or other required network connectivity is available during the OOBE process.
- GPS Global Positioning System
- the use GPS technology may be restricted by privacy laws and is therefore not available for the OOBE process.
- user location information is set based on the firmware property file on a device, which may be read by the system without user input. User location information may be obtained by the device by other methods without departing from the spirit of the invention.
- the required privacy information is provided to the user, and required user input is requested and acquired from the user, for compliance with the particular applicable policy.
- Information provided to a user includes privacy notices and disclosures, and information requested and acquired includes obtaining a user's agreement with the terms of the privacy notice, in compliance with the applicable privacy law. Additionally, verification of the user's authority to agree with the privacy policy under applicable privacy law is also obtained if necessary.
- the device is unlocked for unrestricted use. In some embodiments, the OOBE process allows for partial compliance, and the device is unlocked for a modified restricted use that allows access to applications and resources that are in accordance with partial compliance. Partial compliance is further described below with reference to FIG. 3 .
- FIG. 2 illustrates an example of the interface presented during OOBE process 100 , with reference to FIGS. 1A and 1B , for providing and obtaining information from a user in compliance with COPPA after COPPA is determined by the international privacy law analysis module to be the applicable privacy law for the device, according to some embodiments.
- Privacy disclosure 201 includes the information provided to a user with authority to consent to the privacy notice, such as a person of adult age.
- Button 203 is provided to record a user's consent to privacy disclosure 201
- button 205 is provided to record that a user has declined to agree with privacy disclosure 201 .
- the system Upon receiving input at button 203 , the system begins a verification process for ensuring that the user has authority to consent under COPPA. For example, a user is requested to provide a valid credit card for charging with a temporary amount, such as $1, whereby access to a valid credit card is presumed to constitute reasonably reliable evidence that the user is an adult over required age. While the interface of FIG. 2 presents a system for using a credit card charge to verify authority to consent, other processes may be used in some embodiments to verify authority to consent without departing from the spirit of the invention.
- the system Upon receiving input at button 205 indicating that the user declines to agree, the system follows a simple path OOBE for allowing operation of the device in restricted mode.
- FIG. 3 is a flow diagram illustrating process 300 for complying with United States COPPA requirements, according to some embodiments.
- a COPPA compliance procedure begins.
- a COPPA privacy notice is provided for the user's review.
- input is received that indicates whether a user agrees to accept the terms of the notice. If a user does not accept, at step 307 , the device does not proceed to operation in full mode, and steps similar to the simple path with reference to FIG. 1A may proceed. For example, at step 307 , device applications and resources are determined for the declined path.
- Examples of device applications and resources that may be affected by the declined-path selection include media assets such as videos and music, application programs, internet connectivity permissions, and access to online purchasing of new content.
- the device may include multiple operating modes, such as parent-mode or child-mode, where an input of a password is required to switch from one mode to another.
- a temporary or default parent-mode password is provided to input authorization for switching between modes.
- the declined OOBE path is completed and the device allows operation in a restricted configuration.
- the authority to accept the terms is verified in proceeding steps. For example, according to some embodiments, at step 313 , a user is prompted to start a credit card charge for a temporary amount, such as $1.
- the process proceeds with the declined path at steps 307 , 309 , and 311 , to allow operation of the device in restricted mode. If authorization is obtained, at step 317 , the device is unlocked for unrestricted full use.
- the credit card authorization failure may be due to an error in the entry of the credit card information by a consenting parent.
- step 315 if authorization for a credit card fails, the process proceeds to step 303 to restart the COPPA term acceptance process instead of defaulting to a simple path configuration, thereby allowing a user to correctly execute the COPPA compliance procedure before configuring the device to any mode of use.
- the verification of parental status is performed separately from obtaining acceptance by a parent of the terms of the notice, and a parent may accept some terms of the notice, but not others, in partial compliance COPPA.
- COPPA collection, use, and disclosure of personal information of a child requires notice to and consent of the child's parent if the child is under age 13.
- personal information includes, for example, full name of the child, use of a persistent identifier to track a child's usage, and geolocation data, among other data.
- a parent accepts and consents to the collection of certain personal information, and the process proceeds with steps 313 to verify the parental consent.
- the device unlocks the applications and content that corresponds to the scope of the parent's consent for a modified-restricted configuration.
- the device applies a configuration that corresponds to the extent to which the privacy policy requirements applicable to COPPA are met by the type of consent acquired via the privacy module interface.
- FIG. 4 is a block diagram that illustrates an example of a computer system 400 upon which some embodiments may be implemented.
- Computer system 400 includes a bus 402 or other communication mechanism for communicating information, and a processor 404 coupled with bus 402 for processing information.
- Computer system 400 also includes a main memory 406 , such as a random access memory (RAM) or other dynamic storage device, coupled to bus 402 for storing information and instructions to be executed by processor 404 .
- Main memory 406 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 404 .
- Computer system 400 further includes a read only memory (ROM) 408 or other static storage device coupled to bus 402 for storing static information and instructions for processor 404 .
- a storage device 410 such as a magnetic disk, optical disk, or a flash memory device, is provided and coupled to bus 402 for storing information and instructions.
- Computer system 400 may be coupled via bus 402 to a display 412 , such as a cathode ray tube (CRT) or liquid crystal display (LCD) or other display device, for displaying information to a computer user.
- a display 412 such as a cathode ray tube (CRT) or liquid crystal display (LCD) or other display device
- An input device 414 is coupled to bus 402 for communicating information and command selections to processor 404 .
- cursor control 416 is Another type of user input device, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 404 and for controlling cursor movement on display 412 .
- This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
- input device 414 is integrated into display 412 , such as a touchscreen display for communication command selection to processor 404 .
- Another type of input device includes a video camera, a depth camera, or a 4D camera.
- Another type of input device includes a voice command input device, such as a microphone operatively coupled to speech interpretation module for communication command selection to processor 404 .
- Some embodiments are related to the use of computer system 400 for implementing the techniques described herein. According to some embodiments, those techniques are performed by computer system 400 in response to processor 404 executing one or more sequences of one or more instructions contained in main memory 406 . Such instructions may be read into main memory 406 from another machine-readable medium, such as storage device 410 . Execution of the sequences of instructions contained in main memory 406 causes processor 404 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments are not limited to any specific combination of hardware circuitry and software. In further embodiments, multiple computer systems 400 are operatively coupled to implement the embodiments in a distributed system.
- machine-readable medium refers to any medium that participates in providing data that causes a machine to operate in a specific fashion.
- various machine-readable media are involved, for example, in providing instructions to processor 404 for execution.
- Such a medium may take many forms, including but not limited to storage media and transmission media.
- Storage media includes both non-volatile media and volatile media.
- Non-volatile media includes, for example, optical disks, magnetic disks, or flash memory devices, such as storage device 410 .
- Volatile media includes dynamic memory, such as main memory 406 .
- Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 402 .
- Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications. All such media must be tangible to enable the instructions carried by the media to be detected by a physical mechanism that reads the instructions into a machine.
- Machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, flash memory device, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
- Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 404 for execution.
- the instructions may initially be carried on a magnetic disk of a remote computer.
- the remote computer can load the instructions into its dynamic memory and send the instructions over a data transmission line using a modem.
- a modem local to computer system 400 can receive the data on the data transmission line and use an infra-red transmitter to convert the data to an infra-red signal.
- An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 402 .
- Bus 402 carries the data to main memory 406 , from which processor 404 retrieves and executes the instructions.
- the instructions received by main memory 406 may optionally be stored on storage device 410 either before or after execution by processor 404 .
- Computer system 400 also includes a communication interface 418 coupled to bus 402 .
- Communication interface 418 provides a two-way data communication coupling to a network link 420 that is connected to a local network 422 .
- communication interface 418 may be an integrated services digital network (ISDN) card or other internet connection device, or a modem to provide a data communication connection to a corresponding type of data transmission line.
- ISDN integrated services digital network
- communication interface 418 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
- LAN local area network
- Wireless network links may also be implemented.
- communication interface 418 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
- Network link 420 typically provides data communication through one or more networks to other data devices.
- network link 420 may provide a connection through local network 422 to a host computer 424 or to data equipment operated by an Internet Service Provider (ISP) 426 .
- ISP 426 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the Internet 428 .
- Local network 422 and Internet 428 both use electrical, electromagnetic or optical signals that carry digital data streams.
- the signals through the various networks and the signals on network link 420 and through communication interface 418 which carry the digital data to and from computer system 400 , are exemplary forms of carrier waves transporting the information.
- Computer system 400 can send and receive messages and data, including program code, through the network(s), network link 420 and communication interface 418 .
- a server 430 might transmit a requested code for an application program through Internet 428 , ISP 426 , local network 422 and communication interface 418 .
- the received code may be executed by processor 404 as it is received, and/or stored in storage device 410 , or other non-volatile storage for later execution. In this manner, computer system 400 may obtain application code in the form of a carrier wave.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Medical Informatics (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
- This application is continuation of U.S. application Ser. No. 14/046,893, filed on Oct. 4, 2013, entitled “SYSTEMS AND METHODS FOR DEVICE CONFIGURATION AND ACTIVATION WITH AUTOMATED PRIVACY LAW COMPLIANCE,” the disclosure of which is hereby incorporated by reference in its entirety.
- The inventions relate generally to the field of device configuration and, more particularly, but not by way of limitation, to initial device configuration and activation with automated privacy policy localization and acceptance confirmation.
- The experience that a user has when preparing a first use of a new product is the user's out-of-box experience (OOBE). Traditionally, computer equipment and systems were difficult to configure for first use. Technical operations were often required, including correct input of data parameter values into particular forms, or to provide selections for technical configuration options, in order to set up user accounts and profiles, system passwords, networking, user preferences and privacy controls. Further, the input interfaces available for configuration often reside within device control panels or other settings interfaces that are intimidating to users who do not have prior technical knowledge. A user manual or a README file were typically tools provided to guide a user to prepare the product or device for first use.
- Approaches for improving OOBE for computing devices or equipment include using guided setups that are launched when a new device is powered-up by a user for the first time. Guided setups include using setup assistants or wizards that provide a user with an ordered path to input the required information and perform the required selections. Using such setup assistants or wizards, the device linearly navigates the user through a series of interfaces which prompt the user for the required information, and may provide instructions for selecting available configuration options. It is desirable to provide an OOBE that further improves on the basic setup for a device.
- A system and method for device configuration and activation with automated privacy law compliance is disclosed. According to one embodiment, a selection for a configuration path for a device is received during device initialization. The configuration path is either a simple path or a full path. In response to the selection for the simple path, a restricted device configuration is applied to allow restricted access to device applications and resources of the device. In response to the user selection for the full path, a privacy policy requirement is determined that is applicable to the device based on location information of the device.
- Various embodiments may incorporate one or more of these and other features described herein while remaining within the spirit and scope of the invention. Further features of the system or method for initial device configuration and activation with privacy protection, its nature, and various advantages and embodiments will be more apparent by reference to the accompanying drawings and the following detailed description.
- Preferred embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
-
FIGS. 1A and 1B are a flow diagram illustrating a dual-path out-of-box experience, according to some embodiments. -
FIG. 2 is an example of an interface provided within the out-of-box experience for complying with COPPA, according to some embodiments. -
FIG. 3 is a flow diagram illustrating a method within the out-of-box experience for complying with COPPA, according to some embodiments. -
FIG. 4 is a block diagram that illustrates a computer system upon which some embodiments may be implemented. - In the following description, numerous specific details have been set forth to provide a more thorough understanding of some embodiments of the present invention. However, it will be appreciated by those skilled in the art that embodiments of the invention may be practiced without such specific details or with different implementations for such details. Additionally some well known structures have not been shown in detail to avoid unnecessarily obscuring the present invention.
-
FIGS. 1A and 1B are a flow diagram in two parts illustrating a computer-device-executedprocess 100 for providing a dual-path out-of-box experience (OOBE), according to some embodiments. Atstep 101, a dual-path OOBE is launched at device initialization. In some embodiments, atstep 101, device initialization occurs during the device's first power-on by a user after the device is newly configured from the factory. In some embodiments, device initialization occurs during the device's first power-on after the device is reset to factory settings. In some embodiments, the dual-path OOBE is manually launched after receiving a user's launch command. Atstep 103, a mode selected by a user is detected. Examples of OOBE paths include a simple path that provides restricted access to a pre-determined set of device applications and resources, or a full path that provides full access to all device resources. - In some embodiments, the dual-path is implemented by use of settings parameters, such that a simple path comprises a set of parameter values providing access to a limited set of device applications and resources, and a full path comprises a set of parameter values providing access to an unrestricted set of device applications and resources.
- If a simple path is determined to have been selected at
step 103, atstep 105, device applications and resources are determined by the device for the simple path. Examples of device applications and resources that may be affected by the simple-path selection include media assets such as videos and music, application programs, internet connectivity permissions, and access to online purchasing of new content. According to some embodiments, the device may include multiple operating modes, such as parent-mode or child-mode, wherein an input of a valid password is required to switch from one mode to another. In such embodiments, atstep 107, a temporary or default parent-mode password is provided to input authorization for switching between modes. A temporary password may include a hard-coded password or a factory-set password that is disclosed to a parent during set-up that is intended to be replaced by a user-provided password. Atstep 109, the simple path is completed and the device allows operation in a restricted mode. - Returning to
step 103, if a full path is determined to have been selected, atstep 111, one or more prompts are provided to request input from the user for setting up accounts and settings on the device, including, for example, one or more of billing data, parent mode username and password, user information, including parent information and child information for some embodiments, warranty registration, and internet connectivity selections, including WiFi network selection. The requests for information may occur in any particular order on various interface configurations. - At
step 113, an international privacy law analysis module is invoked. Continuing toFIG. 1B , atstep 115, based on user location information, the module determines which, if any, privacy policies are applicable under laws, regulations, and/or other requirements relevant to use of the device within one or more legal, corporate, or other jurisdictions encompassing the location of use as reflected in the user location information. In exemplary embodiments, the international privacy law analysis module determines the applicable privacy policy by accessing a database or other store of information correlating potential locations of use with corresponding privacy policies preferably conforming with laws, regulations, and/or other requirements applicable to use of the device in each potential location of use. User location information may be accepted from a user atstep 111. Alternatively, user location information is automatically determined based on location detection methods. For example, the device may detect current device location by Global Positioning System (GPS) technology in the device and/or an associated IP address location or other location service on the device if internet or other required network connectivity is available during the OOBE process. In some embodiments, the use GPS technology may be restricted by privacy laws and is therefore not available for the OOBE process. In some embodiments, user location information is set based on the firmware property file on a device, which may be read by the system without user input. User location information may be obtained by the device by other methods without departing from the spirit of the invention. - Once the applicable privacy policy is determined, at
step 117, the required privacy information is provided to the user, and required user input is requested and acquired from the user, for compliance with the particular applicable policy. Information provided to a user includes privacy notices and disclosures, and information requested and acquired includes obtaining a user's agreement with the terms of the privacy notice, in compliance with the applicable privacy law. Additionally, verification of the user's authority to agree with the privacy policy under applicable privacy law is also obtained if necessary. Atstep 119, upon compliance with the applicable privacy policy, the device is unlocked for unrestricted use. In some embodiments, the OOBE process allows for partial compliance, and the device is unlocked for a modified restricted use that allows access to applications and resources that are in accordance with partial compliance. Partial compliance is further described below with reference toFIG. 3 . - While the steps in
process 100 are presented in a particular order, it is understood that the acquisition and provision of the necessary information may occur in another order without departing from the spirit of the invention. -
FIG. 2 illustrates an example of the interface presented duringOOBE process 100, with reference toFIGS. 1A and 1B , for providing and obtaining information from a user in compliance with COPPA after COPPA is determined by the international privacy law analysis module to be the applicable privacy law for the device, according to some embodiments.Privacy disclosure 201 includes the information provided to a user with authority to consent to the privacy notice, such as a person of adult age.Button 203 is provided to record a user's consent toprivacy disclosure 201, andbutton 205 is provided to record that a user has declined to agree withprivacy disclosure 201. - Upon receiving input at
button 203, the system begins a verification process for ensuring that the user has authority to consent under COPPA. For example, a user is requested to provide a valid credit card for charging with a temporary amount, such as $1, whereby access to a valid credit card is presumed to constitute reasonably reliable evidence that the user is an adult over required age. While the interface ofFIG. 2 presents a system for using a credit card charge to verify authority to consent, other processes may be used in some embodiments to verify authority to consent without departing from the spirit of the invention. - Upon receiving input at
button 205 indicating that the user declines to agree, the system follows a simple path OOBE for allowing operation of the device in restricted mode. -
FIG. 3 is a flowdiagram illustrating process 300 for complying with United States COPPA requirements, according to some embodiments. Atstep 301, after COPPA is determined to be the applicable privacy policy for the device, a COPPA compliance procedure begins. Atstep 303, a COPPA privacy notice is provided for the user's review. Atstep 305, input is received that indicates whether a user agrees to accept the terms of the notice. If a user does not accept, atstep 307, the device does not proceed to operation in full mode, and steps similar to the simple path with reference toFIG. 1A may proceed. For example, atstep 307, device applications and resources are determined for the declined path. Examples of device applications and resources that may be affected by the declined-path selection include media assets such as videos and music, application programs, internet connectivity permissions, and access to online purchasing of new content. According to some embodiments, the device may include multiple operating modes, such as parent-mode or child-mode, where an input of a password is required to switch from one mode to another. In such embodiments, atstep 309, a temporary or default parent-mode password is provided to input authorization for switching between modes. Atstep 311, the declined OOBE path is completed and the device allows operation in a restricted configuration. - Alternatively, if at
step 305, the user agrees to accept terms, the authority to accept the terms is verified in proceeding steps. For example, according to some embodiments, atstep 313, a user is prompted to start a credit card charge for a temporary amount, such as $1. Atstep 315, if authorization for the credit card fails, the process proceeds with the declined path atsteps step 317, the device is unlocked for unrestricted full use. The credit card authorization failure may be due to an error in the entry of the credit card information by a consenting parent. Accordingly, atstep 315, if authorization for a credit card fails, the process proceeds to step 303 to restart the COPPA term acceptance process instead of defaulting to a simple path configuration, thereby allowing a user to correctly execute the COPPA compliance procedure before configuring the device to any mode of use. - In some embodiments, the verification of parental status is performed separately from obtaining acceptance by a parent of the terms of the notice, and a parent may accept some terms of the notice, but not others, in partial compliance COPPA. Under COPPA, collection, use, and disclosure of personal information of a child requires notice to and consent of the child's parent if the child is under age 13. Personal information includes, for example, full name of the child, use of a persistent identifier to track a child's usage, and geolocation data, among other data. In some embodiments, at
step 305, a parent accepts and consents to the collection of certain personal information, and the process proceeds withsteps 313 to verify the parental consent. Atstep 317, the device unlocks the applications and content that corresponds to the scope of the parent's consent for a modified-restricted configuration. In other words, the device applies a configuration that corresponds to the extent to which the privacy policy requirements applicable to COPPA are met by the type of consent acquired via the privacy module interface. -
FIG. 4 is a block diagram that illustrates an example of acomputer system 400 upon which some embodiments may be implemented.Computer system 400 includes abus 402 or other communication mechanism for communicating information, and aprocessor 404 coupled withbus 402 for processing information.Computer system 400 also includes amain memory 406, such as a random access memory (RAM) or other dynamic storage device, coupled tobus 402 for storing information and instructions to be executed byprocessor 404.Main memory 406 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed byprocessor 404.Computer system 400 further includes a read only memory (ROM) 408 or other static storage device coupled tobus 402 for storing static information and instructions forprocessor 404. Astorage device 410, such as a magnetic disk, optical disk, or a flash memory device, is provided and coupled tobus 402 for storing information and instructions. -
Computer system 400 may be coupled viabus 402 to adisplay 412, such as a cathode ray tube (CRT) or liquid crystal display (LCD) or other display device, for displaying information to a computer user. Aninput device 414, including alphanumeric and other keys, is coupled tobus 402 for communicating information and command selections toprocessor 404. Another type of user input device iscursor control 416, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections toprocessor 404 and for controlling cursor movement ondisplay 412. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane. In some embodiments,input device 414 is integrated intodisplay 412, such as a touchscreen display for communication command selection toprocessor 404. Another type of input device includes a video camera, a depth camera, or a 4D camera. Another type of input device includes a voice command input device, such as a microphone operatively coupled to speech interpretation module for communication command selection toprocessor 404. - Some embodiments are related to the use of
computer system 400 for implementing the techniques described herein. According to some embodiments, those techniques are performed bycomputer system 400 in response toprocessor 404 executing one or more sequences of one or more instructions contained inmain memory 406. Such instructions may be read intomain memory 406 from another machine-readable medium, such asstorage device 410. Execution of the sequences of instructions contained inmain memory 406 causesprocessor 404 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments are not limited to any specific combination of hardware circuitry and software. In further embodiments,multiple computer systems 400 are operatively coupled to implement the embodiments in a distributed system. - The terms “machine-readable medium” as used herein refer to any medium that participates in providing data that causes a machine to operate in a specific fashion. In an embodiment implemented using
computer system 400, various machine-readable media are involved, for example, in providing instructions toprocessor 404 for execution. Such a medium may take many forms, including but not limited to storage media and transmission media. Storage media includes both non-volatile media and volatile media. Non-volatile media includes, for example, optical disks, magnetic disks, or flash memory devices, such asstorage device 410. Volatile media includes dynamic memory, such asmain memory 406. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprisebus 402. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications. All such media must be tangible to enable the instructions carried by the media to be detected by a physical mechanism that reads the instructions into a machine. - Common forms of machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, flash memory device, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
- Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to
processor 404 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a data transmission line using a modem. A modem local tocomputer system 400 can receive the data on the data transmission line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data onbus 402.Bus 402 carries the data tomain memory 406, from whichprocessor 404 retrieves and executes the instructions. The instructions received bymain memory 406 may optionally be stored onstorage device 410 either before or after execution byprocessor 404. -
Computer system 400 also includes acommunication interface 418 coupled tobus 402.Communication interface 418 provides a two-way data communication coupling to anetwork link 420 that is connected to alocal network 422. For example,communication interface 418 may be an integrated services digital network (ISDN) card or other internet connection device, or a modem to provide a data communication connection to a corresponding type of data transmission line. As another example,communication interface 418 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless network links may also be implemented. In any such implementation,communication interface 418 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information. - Network link 420 typically provides data communication through one or more networks to other data devices. For example,
network link 420 may provide a connection throughlocal network 422 to ahost computer 424 or to data equipment operated by an Internet Service Provider (ISP) 426.ISP 426 in turn provides data communication services through the world wide packet data communication network now commonly referred to as theInternet 428.Local network 422 andInternet 428 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals onnetwork link 420 and throughcommunication interface 418, which carry the digital data to and fromcomputer system 400, are exemplary forms of carrier waves transporting the information. -
Computer system 400 can send and receive messages and data, including program code, through the network(s),network link 420 andcommunication interface 418. In the Internet example, aserver 430 might transmit a requested code for an application program throughInternet 428,ISP 426,local network 422 andcommunication interface 418. - The received code may be executed by
processor 404 as it is received, and/or stored instorage device 410, or other non-volatile storage for later execution. In this manner,computer system 400 may obtain application code in the form of a carrier wave. - Other features, aspects and objects of the invention can be obtained from a review of the figures and the claims. It is to be understood that other embodiments of the invention can be developed and fall within the spirit and scope of the invention and claims.
- The foregoing description of preferred embodiments of the present invention has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Various additions, deletions and modifications are contemplated as being within its scope. The scope of the invention is, therefore, indicated by the appended claims rather than the foregoing description. Further, all changes which may fall within the meaning and range of equivalency of the claims and elements and features thereof are to be embraced within their scope.
Claims (22)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/629,407 US20150172296A1 (en) | 2013-10-04 | 2015-02-23 | Systems and methods for device configuration and activation with automated privacy law compliance |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/046,893 US9015796B1 (en) | 2013-10-04 | 2013-10-04 | Systems and methods for device configuration and activation with automated privacy law compliance |
US14/629,407 US20150172296A1 (en) | 2013-10-04 | 2015-02-23 | Systems and methods for device configuration and activation with automated privacy law compliance |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/046,893 Continuation US9015796B1 (en) | 2013-10-04 | 2013-10-04 | Systems and methods for device configuration and activation with automated privacy law compliance |
Publications (1)
Publication Number | Publication Date |
---|---|
US20150172296A1 true US20150172296A1 (en) | 2015-06-18 |
Family
ID=52778052
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/046,893 Expired - Fee Related US9015796B1 (en) | 2013-10-04 | 2013-10-04 | Systems and methods for device configuration and activation with automated privacy law compliance |
US14/629,407 Abandoned US20150172296A1 (en) | 2013-10-04 | 2015-02-23 | Systems and methods for device configuration and activation with automated privacy law compliance |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/046,893 Expired - Fee Related US9015796B1 (en) | 2013-10-04 | 2013-10-04 | Systems and methods for device configuration and activation with automated privacy law compliance |
Country Status (3)
Country | Link |
---|---|
US (2) | US9015796B1 (en) |
TW (1) | TW201531883A (en) |
WO (1) | WO2015051286A1 (en) |
Cited By (116)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10963591B2 (en) | 2018-09-07 | 2021-03-30 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US10972509B2 (en) | 2016-06-10 | 2021-04-06 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US10970371B2 (en) | 2016-06-10 | 2021-04-06 | OneTrust, LLC | Consent receipt management systems and related methods |
US10970675B2 (en) | 2016-06-10 | 2021-04-06 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US10984132B2 (en) | 2016-06-10 | 2021-04-20 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US10997318B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US10997315B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10997542B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Privacy management systems and methods |
US11004125B2 (en) | 2016-04-01 | 2021-05-11 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11023616B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11025675B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11023842B2 (en) * | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11030327B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11030563B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Privacy management systems and methods |
US11030274B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11038925B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11036771B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11036882B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11036674B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11057356B2 (en) | 2016-06-10 | 2021-07-06 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11062051B2 (en) | 2016-06-10 | 2021-07-13 | OneTrust, LLC | Consent receipt management systems and related methods |
US11068618B2 (en) | 2016-06-10 | 2021-07-20 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11070593B2 (en) | 2016-06-10 | 2021-07-20 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11074367B2 (en) | 2016-06-10 | 2021-07-27 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11087260B2 (en) | 2016-06-10 | 2021-08-10 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11100445B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11100444B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11113416B2 (en) | 2016-06-10 | 2021-09-07 | OneTrust, LLC | Application privacy scanning systems and related methods |
US11122011B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11120161B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11120162B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11126748B2 (en) | 2016-06-10 | 2021-09-21 | OneTrust, LLC | Data processing consent management systems and related methods |
US11134086B2 (en) | 2016-06-10 | 2021-09-28 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11138336B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11138299B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11138242B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11138318B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11144670B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11144675B2 (en) | 2018-09-07 | 2021-10-12 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11146566B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11144622B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Privacy management systems and methods |
US11151233B2 (en) | 2016-06-10 | 2021-10-19 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11157600B2 (en) | 2016-06-10 | 2021-10-26 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11182501B2 (en) | 2016-06-10 | 2021-11-23 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11188862B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Privacy management systems and methods |
US11188615B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11195134B2 (en) | 2016-06-10 | 2021-12-07 | OneTrust, LLC | Privacy management systems and methods |
US11200341B2 (en) | 2016-06-10 | 2021-12-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11210420B2 (en) | 2016-06-10 | 2021-12-28 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11222309B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11222142B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11222139B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US11227247B2 (en) * | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11228620B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11238390B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Privacy management systems and methods |
US11244367B2 (en) | 2016-04-01 | 2022-02-08 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11244071B2 (en) | 2016-06-10 | 2022-02-08 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US11277448B2 (en) | 2016-06-10 | 2022-03-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11301589B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Consent receipt management systems and related methods |
US11308435B2 (en) | 2016-06-10 | 2022-04-19 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11341447B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11373007B2 (en) | 2017-06-16 | 2022-06-28 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11397819B2 (en) | 2020-11-06 | 2022-07-26 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416634B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11436373B2 (en) | 2020-09-15 | 2022-09-06 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11444976B2 (en) | 2020-07-28 | 2022-09-13 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11442906B2 (en) | 2021-02-04 | 2022-09-13 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11475165B2 (en) | 2020-08-06 | 2022-10-18 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11494515B2 (en) | 2021-02-08 | 2022-11-08 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US11526624B2 (en) | 2020-09-21 | 2022-12-13 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US11533315B2 (en) | 2021-03-08 | 2022-12-20 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11586762B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11645688B2 (en) * | 2018-08-02 | 2023-05-09 | T-Mobile Usa, Inc. | User-behavior-based predictive product and service provisioning |
US11651402B2 (en) | 2016-04-01 | 2023-05-16 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of risk assessments |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11775348B2 (en) | 2021-02-17 | 2023-10-03 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11797528B2 (en) | 2020-07-08 | 2023-10-24 | OneTrust, LLC | Systems and methods for targeted data discovery |
US12045266B2 (en) | 2016-06-10 | 2024-07-23 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US12052289B2 (en) | 2016-06-10 | 2024-07-30 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US12118121B2 (en) | 2016-06-10 | 2024-10-15 | OneTrust, LLC | Data subject access request processing systems and related methods |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150073998A1 (en) | 2013-09-09 | 2015-03-12 | Apple Inc. | Use of a Biometric Image in Online Commerce |
US20150220931A1 (en) * | 2014-01-31 | 2015-08-06 | Apple Inc. | Use of a Biometric Image for Authorization |
US9477488B2 (en) * | 2014-06-12 | 2016-10-25 | David Milman | Systems and methods for managing distributed sales, service and repair operations |
US9980165B2 (en) * | 2016-02-10 | 2018-05-22 | Airwatch Llc | Visual privacy systems for enterprise mobility management |
US11410106B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Privacy management systems and methods |
JP2024115196A (en) * | 2023-02-14 | 2024-08-26 | トヨタ自動車株式会社 | Information management device, information management method, and information management program |
JP2024115197A (en) * | 2023-02-14 | 2024-08-26 | トヨタ自動車株式会社 | Information management device, information management method, and information management program |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020087472A1 (en) * | 2000-12-29 | 2002-07-04 | Walter Joanne S. | Data privacy encoding for consumer input media |
US20040229199A1 (en) * | 2003-04-16 | 2004-11-18 | Measured Progress, Inc. | Computer-based standardized test administration, scoring and analysis system |
US20070013515A1 (en) * | 2005-07-15 | 2007-01-18 | Microsoft Corporation | Parental controls for a media console |
US20070210894A1 (en) * | 2003-10-31 | 2007-09-13 | Ae-Soon Park | Method for Authenticating Subscriber Station, Method for Configuring Protocol Thereof, and Apparatus Thereof in Wireless Protable Internet System |
US20080005778A1 (en) * | 2006-07-03 | 2008-01-03 | Weifeng Chen | System and method for privacy protection using identifiability risk assessment |
US20100146301A1 (en) * | 2008-12-09 | 2010-06-10 | Shevchenko Oleksiy Yu | Privacy protection system |
US20110307799A1 (en) * | 2010-06-11 | 2011-12-15 | Aronov Svetlana | Scripting application with privacy mode coordination |
US20120011594A1 (en) * | 2010-07-12 | 2012-01-12 | Bruce Nguyen | System and method for coppa compliance for online education |
US20120122525A1 (en) * | 2009-08-05 | 2012-05-17 | Ford Global Technologies, Llc | System and method for controlling privacy mode operation in a vehicle |
US20120246122A1 (en) * | 2011-03-21 | 2012-09-27 | Sap Ag | Integrating data-handling policies into a workflow model |
US20120284801A1 (en) * | 2010-12-30 | 2012-11-08 | Ensighten, Inc. | Online Privacy Management |
US20130212638A1 (en) * | 2012-02-09 | 2013-08-15 | Aol Inc. | Systems and methods for testing online systems and content |
US20130276136A1 (en) * | 2010-12-30 | 2013-10-17 | Ensighten, Inc. | Online Privacy Management |
US20140283100A1 (en) * | 2013-03-15 | 2014-09-18 | Edward R. Harrison | Display privacy with dynamic configuration |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040010472A1 (en) | 2002-07-12 | 2004-01-15 | Hilby Robert T. | System and method for verifying information |
US8205093B2 (en) | 2007-06-29 | 2012-06-19 | At&T Intellectual Property I, L.P. | Restricting access to information |
US8509760B2 (en) | 2007-10-26 | 2013-08-13 | At&T Intellectual Property I, L.P. | Standardized control of wireless devices |
JP5190252B2 (en) | 2007-11-27 | 2013-04-24 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Preference matching system, method and program |
US20090247836A1 (en) | 2008-02-28 | 2009-10-01 | Confidant Inc. | Medical System and Method for Serving Users with a Chronic Disease or Health State |
US20130254660A1 (en) | 2008-03-13 | 2013-09-26 | Robb Fujioka | Tablet computer |
US8505078B2 (en) | 2008-12-28 | 2013-08-06 | Qualcomm Incorporated | Apparatus and methods for providing authorized device access |
US20130035946A1 (en) | 2011-08-03 | 2013-02-07 | Suneel James Ratan | Social networks for care coordination, management, and support and health information exchange |
US9946887B2 (en) * | 2012-06-04 | 2018-04-17 | Nokia Technologies Oy | Method and apparatus for determining privacy policy based on data and associated values |
-
2013
- 2013-10-04 US US14/046,893 patent/US9015796B1/en not_active Expired - Fee Related
-
2014
- 2014-10-03 WO PCT/US2014/059115 patent/WO2015051286A1/en active Application Filing
- 2014-10-03 TW TW103134531A patent/TW201531883A/en unknown
-
2015
- 2015-02-23 US US14/629,407 patent/US20150172296A1/en not_active Abandoned
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020087472A1 (en) * | 2000-12-29 | 2002-07-04 | Walter Joanne S. | Data privacy encoding for consumer input media |
US20040229199A1 (en) * | 2003-04-16 | 2004-11-18 | Measured Progress, Inc. | Computer-based standardized test administration, scoring and analysis system |
US20070210894A1 (en) * | 2003-10-31 | 2007-09-13 | Ae-Soon Park | Method for Authenticating Subscriber Station, Method for Configuring Protocol Thereof, and Apparatus Thereof in Wireless Protable Internet System |
US20070013515A1 (en) * | 2005-07-15 | 2007-01-18 | Microsoft Corporation | Parental controls for a media console |
US20080005778A1 (en) * | 2006-07-03 | 2008-01-03 | Weifeng Chen | System and method for privacy protection using identifiability risk assessment |
US20100146301A1 (en) * | 2008-12-09 | 2010-06-10 | Shevchenko Oleksiy Yu | Privacy protection system |
US8266708B2 (en) * | 2008-12-09 | 2012-09-11 | Broadlands Technologies Llc | Privacy protection system |
US20120122525A1 (en) * | 2009-08-05 | 2012-05-17 | Ford Global Technologies, Llc | System and method for controlling privacy mode operation in a vehicle |
US20110307799A1 (en) * | 2010-06-11 | 2011-12-15 | Aronov Svetlana | Scripting application with privacy mode coordination |
US20120011594A1 (en) * | 2010-07-12 | 2012-01-12 | Bruce Nguyen | System and method for coppa compliance for online education |
US8613051B2 (en) * | 2010-07-12 | 2013-12-17 | Bruce Nguyen | System and method for COPPA compliance for online education |
US20120284801A1 (en) * | 2010-12-30 | 2012-11-08 | Ensighten, Inc. | Online Privacy Management |
US20130276136A1 (en) * | 2010-12-30 | 2013-10-17 | Ensighten, Inc. | Online Privacy Management |
US20120246122A1 (en) * | 2011-03-21 | 2012-09-27 | Sap Ag | Integrating data-handling policies into a workflow model |
US20130212638A1 (en) * | 2012-02-09 | 2013-08-15 | Aol Inc. | Systems and methods for testing online systems and content |
US20140283100A1 (en) * | 2013-03-15 | 2014-09-18 | Edward R. Harrison | Display privacy with dynamic configuration |
Cited By (155)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11004125B2 (en) | 2016-04-01 | 2021-05-11 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11651402B2 (en) | 2016-04-01 | 2023-05-16 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of risk assessments |
US11244367B2 (en) | 2016-04-01 | 2022-02-08 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11244072B2 (en) | 2016-06-10 | 2022-02-08 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US10997318B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US10997315B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10997542B2 (en) | 2016-06-10 | 2021-05-04 | OneTrust, LLC | Privacy management systems and methods |
US10970675B2 (en) | 2016-06-10 | 2021-04-06 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11023616B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11025675B2 (en) | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11023842B2 (en) * | 2016-06-10 | 2021-06-01 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11030327B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11030563B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Privacy management systems and methods |
US11030274B2 (en) | 2016-06-10 | 2021-06-08 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11038925B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11036771B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11036882B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11036674B2 (en) | 2016-06-10 | 2021-06-15 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11057356B2 (en) | 2016-06-10 | 2021-07-06 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11062051B2 (en) | 2016-06-10 | 2021-07-13 | OneTrust, LLC | Consent receipt management systems and related methods |
US11068618B2 (en) | 2016-06-10 | 2021-07-20 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11070593B2 (en) | 2016-06-10 | 2021-07-20 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11074367B2 (en) | 2016-06-10 | 2021-07-27 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11087260B2 (en) | 2016-06-10 | 2021-08-10 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11100445B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11100444B2 (en) | 2016-06-10 | 2021-08-24 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11113416B2 (en) | 2016-06-10 | 2021-09-07 | OneTrust, LLC | Application privacy scanning systems and related methods |
US11122011B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11120161B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11120162B2 (en) | 2016-06-10 | 2021-09-14 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11126748B2 (en) | 2016-06-10 | 2021-09-21 | OneTrust, LLC | Data processing consent management systems and related methods |
US11134086B2 (en) | 2016-06-10 | 2021-09-28 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11138336B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11138299B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11138242B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11138318B2 (en) | 2016-06-10 | 2021-10-05 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11144670B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US12118121B2 (en) | 2016-06-10 | 2024-10-15 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11146566B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11144622B2 (en) | 2016-06-10 | 2021-10-12 | OneTrust, LLC | Privacy management systems and methods |
US11151233B2 (en) | 2016-06-10 | 2021-10-19 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11157600B2 (en) | 2016-06-10 | 2021-10-26 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US12086748B2 (en) | 2016-06-10 | 2024-09-10 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11182501B2 (en) | 2016-06-10 | 2021-11-23 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11188862B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Privacy management systems and methods |
US11188615B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11195134B2 (en) | 2016-06-10 | 2021-12-07 | OneTrust, LLC | Privacy management systems and methods |
US11200341B2 (en) | 2016-06-10 | 2021-12-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11210420B2 (en) | 2016-06-10 | 2021-12-28 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11222309B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11222142B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11222139B2 (en) | 2016-06-10 | 2022-01-11 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US11227247B2 (en) * | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11228620B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11238390B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Privacy management systems and methods |
US11240273B2 (en) | 2016-06-10 | 2022-02-01 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US10970371B2 (en) | 2016-06-10 | 2021-04-06 | OneTrust, LLC | Consent receipt management systems and related methods |
US11244071B2 (en) | 2016-06-10 | 2022-02-08 | OneTrust, LLC | Data processing systems for use in automatically generating, populating, and submitting data subject access requests |
US11256777B2 (en) | 2016-06-10 | 2022-02-22 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11277448B2 (en) | 2016-06-10 | 2022-03-15 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11308435B2 (en) | 2016-06-10 | 2022-04-19 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11328240B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11334682B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11334681B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Application privacy scanning systems and related meihods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11341447B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11347889B2 (en) | 2016-06-10 | 2022-05-31 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US12052289B2 (en) | 2016-06-10 | 2024-07-30 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11449633B2 (en) | 2016-06-10 | 2022-09-20 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US10984132B2 (en) | 2016-06-10 | 2021-04-20 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US11301589B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Consent receipt management systems and related methods |
US12045266B2 (en) | 2016-06-10 | 2024-07-23 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US12026651B2 (en) | 2016-06-10 | 2024-07-02 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US11409908B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US11416636B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent management systems and related methods |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416634B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11416576B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11418516B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11960564B2 (en) | 2016-06-10 | 2024-04-16 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11921894B2 (en) | 2016-06-10 | 2024-03-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US11868507B2 (en) | 2016-06-10 | 2024-01-09 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11361057B2 (en) | 2016-06-10 | 2022-06-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11461722B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Questionnaire response automation for compliance management |
US11468386B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11468196B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11847182B2 (en) | 2016-06-10 | 2023-12-19 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11488085B2 (en) | 2016-06-10 | 2022-11-01 | OneTrust, LLC | Questionnaire response automation for compliance management |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US10972509B2 (en) | 2016-06-10 | 2021-04-06 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11544405B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11550897B2 (en) | 2016-06-10 | 2023-01-10 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11551174B2 (en) | 2016-06-10 | 2023-01-10 | OneTrust, LLC | Privacy management systems and methods |
US11558429B2 (en) | 2016-06-10 | 2023-01-17 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11556672B2 (en) | 2016-06-10 | 2023-01-17 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11645418B2 (en) | 2016-06-10 | 2023-05-09 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11586762B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11645353B2 (en) | 2016-06-10 | 2023-05-09 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11609939B2 (en) | 2016-06-10 | 2023-03-21 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11373007B2 (en) | 2017-06-16 | 2022-06-28 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11663359B2 (en) | 2017-06-16 | 2023-05-30 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11645688B2 (en) * | 2018-08-02 | 2023-05-09 | T-Mobile Usa, Inc. | User-behavior-based predictive product and service provisioning |
US11593523B2 (en) | 2018-09-07 | 2023-02-28 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11144675B2 (en) | 2018-09-07 | 2021-10-12 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11157654B2 (en) | 2018-09-07 | 2021-10-26 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US10963591B2 (en) | 2018-09-07 | 2021-03-30 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11947708B2 (en) | 2018-09-07 | 2024-04-02 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11797528B2 (en) | 2020-07-08 | 2023-10-24 | OneTrust, LLC | Systems and methods for targeted data discovery |
US11968229B2 (en) | 2020-07-28 | 2024-04-23 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11444976B2 (en) | 2020-07-28 | 2022-09-13 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11475165B2 (en) | 2020-08-06 | 2022-10-18 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
US11704440B2 (en) | 2020-09-15 | 2023-07-18 | OneTrust, LLC | Data processing systems and methods for preventing execution of an action documenting a consent rejection |
US11436373B2 (en) | 2020-09-15 | 2022-09-06 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
US11526624B2 (en) | 2020-09-21 | 2022-12-13 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US11615192B2 (en) | 2020-11-06 | 2023-03-28 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11397819B2 (en) | 2020-11-06 | 2022-07-26 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US11442906B2 (en) | 2021-02-04 | 2022-09-13 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
US11494515B2 (en) | 2021-02-08 | 2022-11-08 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
US11775348B2 (en) | 2021-02-17 | 2023-10-03 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
US11533315B2 (en) | 2021-03-08 | 2022-12-20 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11816224B2 (en) | 2021-04-16 | 2023-11-14 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
Also Published As
Publication number | Publication date |
---|---|
US20150101007A1 (en) | 2015-04-09 |
US9015796B1 (en) | 2015-04-21 |
WO2015051286A1 (en) | 2015-04-09 |
TW201531883A (en) | 2015-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9015796B1 (en) | Systems and methods for device configuration and activation with automated privacy law compliance | |
US10171241B2 (en) | Step-up authentication for single sign-on | |
US9787654B2 (en) | Resolving authenticating issues with a second device | |
US11196752B2 (en) | Multifactor authentication for secure management of data center assets from a mobile device | |
KR101468977B1 (en) | Method and system for authentication using a mobile device | |
US7917641B2 (en) | Apparatus and method for provisioning wireless data communication devices | |
US12058264B2 (en) | Techniques for using signed nonces to secure cloud shells | |
WO2016062002A1 (en) | Connection management method and apparatus, electrical device | |
US20220294788A1 (en) | Customizing authentication and handling pre and post authentication in identity cloud service | |
US11818113B2 (en) | Techniques for simultaneously accessing multiple isolated systems while maintaining security boundaries | |
EP1575239A1 (en) | Method and apparatus for managing workflow in a single sign-on framework | |
CN106713321A (en) | Authority management method and device for debugging function of point of sale | |
US9455972B1 (en) | Provisioning a mobile device with a security application on the fly | |
CN116170234B (en) | Single sign-on method and system based on virtual account authentication | |
US20240121233A1 (en) | Automatic sign-in upon account signup | |
CN103176987A (en) | Method and device for controlling database access | |
CN105656856A (en) | Resource management method and device | |
KR20130113785A (en) | Method and server for user certification using voice information | |
CN113852596A (en) | Application authentication agent method and system based on Kubernetes | |
JP2024536240A (en) | Compound authorizations for entities within a domain | |
CN117390605A (en) | Access control method, device, equipment and storage medium | |
CN118364440A (en) | Information authorization method, device, terminal equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FUHU, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FUJIOKA, ROBB;REEL/FRAME:035705/0431 Effective date: 20150522 |
|
AS | Assignment |
Owner name: OBSIDIAN AGENCY SERVICES, INC., CALIFORNIA Free format text: SECURITY INTEREST;ASSIGNOR:FUHU, INC.;REEL/FRAME:035775/0173 Effective date: 20150527 |
|
AS | Assignment |
Owner name: MATTEL, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FUHU, INC.;REEL/FRAME:037917/0349 Effective date: 20160129 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |