US20150172296A1 - Systems and methods for device configuration and activation with automated privacy law compliance - Google Patents

Systems and methods for device configuration and activation with automated privacy law compliance Download PDF

Info

Publication number
US20150172296A1
US20150172296A1 US14/629,407 US201514629407A US2015172296A1 US 20150172296 A1 US20150172296 A1 US 20150172296A1 US 201514629407 A US201514629407 A US 201514629407A US 2015172296 A1 US2015172296 A1 US 2015172296A1
Authority
US
United States
Prior art keywords
privacy
path
computer
implemented method
configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/629,407
Inventor
Robb Fujioka
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mattel Inc
Original Assignee
Fuhu Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fuhu Inc filed Critical Fuhu Inc
Priority to US14/629,407 priority Critical patent/US20150172296A1/en
Assigned to FUHU, INC. reassignment FUHU, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FUJIOKA, ROBB
Assigned to OBSIDIAN AGENCY SERVICES, INC. reassignment OBSIDIAN AGENCY SERVICES, INC. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FUHU, INC.
Publication of US20150172296A1 publication Critical patent/US20150172296A1/en
Assigned to MATTEL, INC. reassignment MATTEL, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FUHU, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Definitions

  • the inventions relate generally to the field of device configuration and, more particularly, but not by way of limitation, to initial device configuration and activation with automated privacy policy localization and acceptance confirmation.
  • the experience that a user has when preparing a first use of a new product is the user's out-of-box experience (OOBE).
  • OOBE out-of-box experience
  • computer equipment and systems were difficult to configure for first use.
  • Technical operations were often required, including correct input of data parameter values into particular forms, or to provide selections for technical configuration options, in order to set up user accounts and profiles, system passwords, networking, user preferences and privacy controls.
  • the input interfaces available for configuration often reside within device control panels or other settings interfaces that are intimidating to users who do not have prior technical knowledge.
  • a user manual or a README file were typically tools provided to guide a user to prepare the product or device for first use.
  • Guided setups include using setup assistants or wizards that provide a user with an ordered path to input the required information and perform the required selections.
  • the device linearly navigates the user through a series of interfaces which prompt the user for the required information, and may provide instructions for selecting available configuration options. It is desirable to provide an OOBE that further improves on the basic setup for a device.
  • a system and method for device configuration and activation with automated privacy law compliance is disclosed.
  • a selection for a configuration path for a device is received during device initialization.
  • the configuration path is either a simple path or a full path.
  • a restricted device configuration is applied to allow restricted access to device applications and resources of the device.
  • a privacy policy requirement is determined that is applicable to the device based on location information of the device.
  • FIGS. 1A and 1B are a flow diagram illustrating a dual-path out-of-box experience, according to some embodiments.
  • FIG. 2 is an example of an interface provided within the out-of-box experience for complying with COPPA, according to some embodiments.
  • FIG. 3 is a flow diagram illustrating a method within the out-of-box experience for complying with COPPA, according to some embodiments.
  • FIG. 4 is a block diagram that illustrates a computer system upon which some embodiments may be implemented.
  • FIGS. 1A and 1B are a flow diagram in two parts illustrating a computer-device-executed process 100 for providing a dual-path out-of-box experience (OOBE), according to some embodiments.
  • a dual-path OOBE is launched at device initialization.
  • device initialization occurs during the device's first power-on by a user after the device is newly configured from the factory.
  • device initialization occurs during the device's first power-on after the device is reset to factory settings.
  • the dual-path OOBE is manually launched after receiving a user's launch command.
  • a mode selected by a user is detected. Examples of OOBE paths include a simple path that provides restricted access to a pre-determined set of device applications and resources, or a full path that provides full access to all device resources.
  • the dual-path is implemented by use of settings parameters, such that a simple path comprises a set of parameter values providing access to a limited set of device applications and resources, and a full path comprises a set of parameter values providing access to an unrestricted set of device applications and resources.
  • step 105 device applications and resources are determined by the device for the simple path.
  • Examples of device applications and resources that may be affected by the simple-path selection include media assets such as videos and music, application programs, internet connectivity permissions, and access to online purchasing of new content.
  • the device may include multiple operating modes, such as parent-mode or child-mode, wherein an input of a valid password is required to switch from one mode to another.
  • a temporary or default parent-mode password is provided to input authorization for switching between modes.
  • a temporary password may include a hard-coded password or a factory-set password that is disclosed to a parent during set-up that is intended to be replaced by a user-provided password.
  • the simple path is completed and the device allows operation in a restricted mode.
  • one or more prompts are provided to request input from the user for setting up accounts and settings on the device, including, for example, one or more of billing data, parent mode username and password, user information, including parent information and child information for some embodiments, warranty registration, and internet connectivity selections, including WiFi network selection.
  • the requests for information may occur in any particular order on various interface configurations.
  • an international privacy law analysis module is invoked.
  • the module determines which, if any, privacy policies are applicable under laws, regulations, and/or other requirements relevant to use of the device within one or more legal, corporate, or other jurisdictions encompassing the location of use as reflected in the user location information.
  • the international privacy law analysis module determines the applicable privacy policy by accessing a database or other store of information correlating potential locations of use with corresponding privacy policies preferably conforming with laws, regulations, and/or other requirements applicable to use of the device in each potential location of use.
  • User location information may be accepted from a user at step 111 .
  • user location information is automatically determined based on location detection methods.
  • the device may detect current device location by Global Positioning System (GPS) technology in the device and/or an associated IP address location or other location service on the device if internet or other required network connectivity is available during the OOBE process.
  • GPS Global Positioning System
  • the use GPS technology may be restricted by privacy laws and is therefore not available for the OOBE process.
  • user location information is set based on the firmware property file on a device, which may be read by the system without user input. User location information may be obtained by the device by other methods without departing from the spirit of the invention.
  • the required privacy information is provided to the user, and required user input is requested and acquired from the user, for compliance with the particular applicable policy.
  • Information provided to a user includes privacy notices and disclosures, and information requested and acquired includes obtaining a user's agreement with the terms of the privacy notice, in compliance with the applicable privacy law. Additionally, verification of the user's authority to agree with the privacy policy under applicable privacy law is also obtained if necessary.
  • the device is unlocked for unrestricted use. In some embodiments, the OOBE process allows for partial compliance, and the device is unlocked for a modified restricted use that allows access to applications and resources that are in accordance with partial compliance. Partial compliance is further described below with reference to FIG. 3 .
  • FIG. 2 illustrates an example of the interface presented during OOBE process 100 , with reference to FIGS. 1A and 1B , for providing and obtaining information from a user in compliance with COPPA after COPPA is determined by the international privacy law analysis module to be the applicable privacy law for the device, according to some embodiments.
  • Privacy disclosure 201 includes the information provided to a user with authority to consent to the privacy notice, such as a person of adult age.
  • Button 203 is provided to record a user's consent to privacy disclosure 201
  • button 205 is provided to record that a user has declined to agree with privacy disclosure 201 .
  • the system Upon receiving input at button 203 , the system begins a verification process for ensuring that the user has authority to consent under COPPA. For example, a user is requested to provide a valid credit card for charging with a temporary amount, such as $1, whereby access to a valid credit card is presumed to constitute reasonably reliable evidence that the user is an adult over required age. While the interface of FIG. 2 presents a system for using a credit card charge to verify authority to consent, other processes may be used in some embodiments to verify authority to consent without departing from the spirit of the invention.
  • the system Upon receiving input at button 205 indicating that the user declines to agree, the system follows a simple path OOBE for allowing operation of the device in restricted mode.
  • FIG. 3 is a flow diagram illustrating process 300 for complying with United States COPPA requirements, according to some embodiments.
  • a COPPA compliance procedure begins.
  • a COPPA privacy notice is provided for the user's review.
  • input is received that indicates whether a user agrees to accept the terms of the notice. If a user does not accept, at step 307 , the device does not proceed to operation in full mode, and steps similar to the simple path with reference to FIG. 1A may proceed. For example, at step 307 , device applications and resources are determined for the declined path.
  • Examples of device applications and resources that may be affected by the declined-path selection include media assets such as videos and music, application programs, internet connectivity permissions, and access to online purchasing of new content.
  • the device may include multiple operating modes, such as parent-mode or child-mode, where an input of a password is required to switch from one mode to another.
  • a temporary or default parent-mode password is provided to input authorization for switching between modes.
  • the declined OOBE path is completed and the device allows operation in a restricted configuration.
  • the authority to accept the terms is verified in proceeding steps. For example, according to some embodiments, at step 313 , a user is prompted to start a credit card charge for a temporary amount, such as $1.
  • the process proceeds with the declined path at steps 307 , 309 , and 311 , to allow operation of the device in restricted mode. If authorization is obtained, at step 317 , the device is unlocked for unrestricted full use.
  • the credit card authorization failure may be due to an error in the entry of the credit card information by a consenting parent.
  • step 315 if authorization for a credit card fails, the process proceeds to step 303 to restart the COPPA term acceptance process instead of defaulting to a simple path configuration, thereby allowing a user to correctly execute the COPPA compliance procedure before configuring the device to any mode of use.
  • the verification of parental status is performed separately from obtaining acceptance by a parent of the terms of the notice, and a parent may accept some terms of the notice, but not others, in partial compliance COPPA.
  • COPPA collection, use, and disclosure of personal information of a child requires notice to and consent of the child's parent if the child is under age 13.
  • personal information includes, for example, full name of the child, use of a persistent identifier to track a child's usage, and geolocation data, among other data.
  • a parent accepts and consents to the collection of certain personal information, and the process proceeds with steps 313 to verify the parental consent.
  • the device unlocks the applications and content that corresponds to the scope of the parent's consent for a modified-restricted configuration.
  • the device applies a configuration that corresponds to the extent to which the privacy policy requirements applicable to COPPA are met by the type of consent acquired via the privacy module interface.
  • FIG. 4 is a block diagram that illustrates an example of a computer system 400 upon which some embodiments may be implemented.
  • Computer system 400 includes a bus 402 or other communication mechanism for communicating information, and a processor 404 coupled with bus 402 for processing information.
  • Computer system 400 also includes a main memory 406 , such as a random access memory (RAM) or other dynamic storage device, coupled to bus 402 for storing information and instructions to be executed by processor 404 .
  • Main memory 406 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 404 .
  • Computer system 400 further includes a read only memory (ROM) 408 or other static storage device coupled to bus 402 for storing static information and instructions for processor 404 .
  • a storage device 410 such as a magnetic disk, optical disk, or a flash memory device, is provided and coupled to bus 402 for storing information and instructions.
  • Computer system 400 may be coupled via bus 402 to a display 412 , such as a cathode ray tube (CRT) or liquid crystal display (LCD) or other display device, for displaying information to a computer user.
  • a display 412 such as a cathode ray tube (CRT) or liquid crystal display (LCD) or other display device
  • An input device 414 is coupled to bus 402 for communicating information and command selections to processor 404 .
  • cursor control 416 is Another type of user input device, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 404 and for controlling cursor movement on display 412 .
  • This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
  • input device 414 is integrated into display 412 , such as a touchscreen display for communication command selection to processor 404 .
  • Another type of input device includes a video camera, a depth camera, or a 4D camera.
  • Another type of input device includes a voice command input device, such as a microphone operatively coupled to speech interpretation module for communication command selection to processor 404 .
  • Some embodiments are related to the use of computer system 400 for implementing the techniques described herein. According to some embodiments, those techniques are performed by computer system 400 in response to processor 404 executing one or more sequences of one or more instructions contained in main memory 406 . Such instructions may be read into main memory 406 from another machine-readable medium, such as storage device 410 . Execution of the sequences of instructions contained in main memory 406 causes processor 404 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments are not limited to any specific combination of hardware circuitry and software. In further embodiments, multiple computer systems 400 are operatively coupled to implement the embodiments in a distributed system.
  • machine-readable medium refers to any medium that participates in providing data that causes a machine to operate in a specific fashion.
  • various machine-readable media are involved, for example, in providing instructions to processor 404 for execution.
  • Such a medium may take many forms, including but not limited to storage media and transmission media.
  • Storage media includes both non-volatile media and volatile media.
  • Non-volatile media includes, for example, optical disks, magnetic disks, or flash memory devices, such as storage device 410 .
  • Volatile media includes dynamic memory, such as main memory 406 .
  • Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 402 .
  • Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications. All such media must be tangible to enable the instructions carried by the media to be detected by a physical mechanism that reads the instructions into a machine.
  • Machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, flash memory device, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
  • Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 404 for execution.
  • the instructions may initially be carried on a magnetic disk of a remote computer.
  • the remote computer can load the instructions into its dynamic memory and send the instructions over a data transmission line using a modem.
  • a modem local to computer system 400 can receive the data on the data transmission line and use an infra-red transmitter to convert the data to an infra-red signal.
  • An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 402 .
  • Bus 402 carries the data to main memory 406 , from which processor 404 retrieves and executes the instructions.
  • the instructions received by main memory 406 may optionally be stored on storage device 410 either before or after execution by processor 404 .
  • Computer system 400 also includes a communication interface 418 coupled to bus 402 .
  • Communication interface 418 provides a two-way data communication coupling to a network link 420 that is connected to a local network 422 .
  • communication interface 418 may be an integrated services digital network (ISDN) card or other internet connection device, or a modem to provide a data communication connection to a corresponding type of data transmission line.
  • ISDN integrated services digital network
  • communication interface 418 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless network links may also be implemented.
  • communication interface 418 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • Network link 420 typically provides data communication through one or more networks to other data devices.
  • network link 420 may provide a connection through local network 422 to a host computer 424 or to data equipment operated by an Internet Service Provider (ISP) 426 .
  • ISP 426 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the Internet 428 .
  • Local network 422 and Internet 428 both use electrical, electromagnetic or optical signals that carry digital data streams.
  • the signals through the various networks and the signals on network link 420 and through communication interface 418 which carry the digital data to and from computer system 400 , are exemplary forms of carrier waves transporting the information.
  • Computer system 400 can send and receive messages and data, including program code, through the network(s), network link 420 and communication interface 418 .
  • a server 430 might transmit a requested code for an application program through Internet 428 , ISP 426 , local network 422 and communication interface 418 .
  • the received code may be executed by processor 404 as it is received, and/or stored in storage device 410 , or other non-volatile storage for later execution. In this manner, computer system 400 may obtain application code in the form of a carrier wave.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

A system and method for device configuration and activation with automated privacy law compliance is disclosed. According to one embodiment, a selection for a configuration path for a device is received during device initialization. The configuration path is either a simple path or a full path. In response to the selection for the simple path, a restricted device configuration is applied to allow restricted access to device applications and resources of the device. In response to the user selection for the full path, a privacy policy requirement is determined that is applicable to the device based on location information of the device.

Description

    CROSS REFERENCES
  • This application is continuation of U.S. application Ser. No. 14/046,893, filed on Oct. 4, 2013, entitled “SYSTEMS AND METHODS FOR DEVICE CONFIGURATION AND ACTIVATION WITH AUTOMATED PRIVACY LAW COMPLIANCE,” the disclosure of which is hereby incorporated by reference in its entirety.
  • FIELD
  • The inventions relate generally to the field of device configuration and, more particularly, but not by way of limitation, to initial device configuration and activation with automated privacy policy localization and acceptance confirmation.
  • BACKGROUND
  • The experience that a user has when preparing a first use of a new product is the user's out-of-box experience (OOBE). Traditionally, computer equipment and systems were difficult to configure for first use. Technical operations were often required, including correct input of data parameter values into particular forms, or to provide selections for technical configuration options, in order to set up user accounts and profiles, system passwords, networking, user preferences and privacy controls. Further, the input interfaces available for configuration often reside within device control panels or other settings interfaces that are intimidating to users who do not have prior technical knowledge. A user manual or a README file were typically tools provided to guide a user to prepare the product or device for first use.
  • Approaches for improving OOBE for computing devices or equipment include using guided setups that are launched when a new device is powered-up by a user for the first time. Guided setups include using setup assistants or wizards that provide a user with an ordered path to input the required information and perform the required selections. Using such setup assistants or wizards, the device linearly navigates the user through a series of interfaces which prompt the user for the required information, and may provide instructions for selecting available configuration options. It is desirable to provide an OOBE that further improves on the basic setup for a device.
  • SUMMARY
  • A system and method for device configuration and activation with automated privacy law compliance is disclosed. According to one embodiment, a selection for a configuration path for a device is received during device initialization. The configuration path is either a simple path or a full path. In response to the selection for the simple path, a restricted device configuration is applied to allow restricted access to device applications and resources of the device. In response to the user selection for the full path, a privacy policy requirement is determined that is applicable to the device based on location information of the device.
  • Various embodiments may incorporate one or more of these and other features described herein while remaining within the spirit and scope of the invention. Further features of the system or method for initial device configuration and activation with privacy protection, its nature, and various advantages and embodiments will be more apparent by reference to the accompanying drawings and the following detailed description.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Preferred embodiments of the present invention are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which like reference numerals refer to similar elements and in which:
  • FIGS. 1A and 1B are a flow diagram illustrating a dual-path out-of-box experience, according to some embodiments.
  • FIG. 2 is an example of an interface provided within the out-of-box experience for complying with COPPA, according to some embodiments.
  • FIG. 3 is a flow diagram illustrating a method within the out-of-box experience for complying with COPPA, according to some embodiments.
  • FIG. 4 is a block diagram that illustrates a computer system upon which some embodiments may be implemented.
  • DETAILED DESCRIPTION
  • In the following description, numerous specific details have been set forth to provide a more thorough understanding of some embodiments of the present invention. However, it will be appreciated by those skilled in the art that embodiments of the invention may be practiced without such specific details or with different implementations for such details. Additionally some well known structures have not been shown in detail to avoid unnecessarily obscuring the present invention.
  • FIGS. 1A and 1B are a flow diagram in two parts illustrating a computer-device-executed process 100 for providing a dual-path out-of-box experience (OOBE), according to some embodiments. At step 101, a dual-path OOBE is launched at device initialization. In some embodiments, at step 101, device initialization occurs during the device's first power-on by a user after the device is newly configured from the factory. In some embodiments, device initialization occurs during the device's first power-on after the device is reset to factory settings. In some embodiments, the dual-path OOBE is manually launched after receiving a user's launch command. At step 103, a mode selected by a user is detected. Examples of OOBE paths include a simple path that provides restricted access to a pre-determined set of device applications and resources, or a full path that provides full access to all device resources.
  • In some embodiments, the dual-path is implemented by use of settings parameters, such that a simple path comprises a set of parameter values providing access to a limited set of device applications and resources, and a full path comprises a set of parameter values providing access to an unrestricted set of device applications and resources.
  • If a simple path is determined to have been selected at step 103, at step 105, device applications and resources are determined by the device for the simple path. Examples of device applications and resources that may be affected by the simple-path selection include media assets such as videos and music, application programs, internet connectivity permissions, and access to online purchasing of new content. According to some embodiments, the device may include multiple operating modes, such as parent-mode or child-mode, wherein an input of a valid password is required to switch from one mode to another. In such embodiments, at step 107, a temporary or default parent-mode password is provided to input authorization for switching between modes. A temporary password may include a hard-coded password or a factory-set password that is disclosed to a parent during set-up that is intended to be replaced by a user-provided password. At step 109, the simple path is completed and the device allows operation in a restricted mode.
  • Returning to step 103, if a full path is determined to have been selected, at step 111, one or more prompts are provided to request input from the user for setting up accounts and settings on the device, including, for example, one or more of billing data, parent mode username and password, user information, including parent information and child information for some embodiments, warranty registration, and internet connectivity selections, including WiFi network selection. The requests for information may occur in any particular order on various interface configurations.
  • At step 113, an international privacy law analysis module is invoked. Continuing to FIG. 1B, at step 115, based on user location information, the module determines which, if any, privacy policies are applicable under laws, regulations, and/or other requirements relevant to use of the device within one or more legal, corporate, or other jurisdictions encompassing the location of use as reflected in the user location information. In exemplary embodiments, the international privacy law analysis module determines the applicable privacy policy by accessing a database or other store of information correlating potential locations of use with corresponding privacy policies preferably conforming with laws, regulations, and/or other requirements applicable to use of the device in each potential location of use. User location information may be accepted from a user at step 111. Alternatively, user location information is automatically determined based on location detection methods. For example, the device may detect current device location by Global Positioning System (GPS) technology in the device and/or an associated IP address location or other location service on the device if internet or other required network connectivity is available during the OOBE process. In some embodiments, the use GPS technology may be restricted by privacy laws and is therefore not available for the OOBE process. In some embodiments, user location information is set based on the firmware property file on a device, which may be read by the system without user input. User location information may be obtained by the device by other methods without departing from the spirit of the invention.
  • Once the applicable privacy policy is determined, at step 117, the required privacy information is provided to the user, and required user input is requested and acquired from the user, for compliance with the particular applicable policy. Information provided to a user includes privacy notices and disclosures, and information requested and acquired includes obtaining a user's agreement with the terms of the privacy notice, in compliance with the applicable privacy law. Additionally, verification of the user's authority to agree with the privacy policy under applicable privacy law is also obtained if necessary. At step 119, upon compliance with the applicable privacy policy, the device is unlocked for unrestricted use. In some embodiments, the OOBE process allows for partial compliance, and the device is unlocked for a modified restricted use that allows access to applications and resources that are in accordance with partial compliance. Partial compliance is further described below with reference to FIG. 3.
  • While the steps in process 100 are presented in a particular order, it is understood that the acquisition and provision of the necessary information may occur in another order without departing from the spirit of the invention.
  • FIG. 2 illustrates an example of the interface presented during OOBE process 100, with reference to FIGS. 1A and 1B, for providing and obtaining information from a user in compliance with COPPA after COPPA is determined by the international privacy law analysis module to be the applicable privacy law for the device, according to some embodiments. Privacy disclosure 201 includes the information provided to a user with authority to consent to the privacy notice, such as a person of adult age. Button 203 is provided to record a user's consent to privacy disclosure 201, and button 205 is provided to record that a user has declined to agree with privacy disclosure 201.
  • Upon receiving input at button 203, the system begins a verification process for ensuring that the user has authority to consent under COPPA. For example, a user is requested to provide a valid credit card for charging with a temporary amount, such as $1, whereby access to a valid credit card is presumed to constitute reasonably reliable evidence that the user is an adult over required age. While the interface of FIG. 2 presents a system for using a credit card charge to verify authority to consent, other processes may be used in some embodiments to verify authority to consent without departing from the spirit of the invention.
  • Upon receiving input at button 205 indicating that the user declines to agree, the system follows a simple path OOBE for allowing operation of the device in restricted mode.
  • FIG. 3 is a flow diagram illustrating process 300 for complying with United States COPPA requirements, according to some embodiments. At step 301, after COPPA is determined to be the applicable privacy policy for the device, a COPPA compliance procedure begins. At step 303, a COPPA privacy notice is provided for the user's review. At step 305, input is received that indicates whether a user agrees to accept the terms of the notice. If a user does not accept, at step 307, the device does not proceed to operation in full mode, and steps similar to the simple path with reference to FIG. 1A may proceed. For example, at step 307, device applications and resources are determined for the declined path. Examples of device applications and resources that may be affected by the declined-path selection include media assets such as videos and music, application programs, internet connectivity permissions, and access to online purchasing of new content. According to some embodiments, the device may include multiple operating modes, such as parent-mode or child-mode, where an input of a password is required to switch from one mode to another. In such embodiments, at step 309, a temporary or default parent-mode password is provided to input authorization for switching between modes. At step 311, the declined OOBE path is completed and the device allows operation in a restricted configuration.
  • Alternatively, if at step 305, the user agrees to accept terms, the authority to accept the terms is verified in proceeding steps. For example, according to some embodiments, at step 313, a user is prompted to start a credit card charge for a temporary amount, such as $1. At step 315, if authorization for the credit card fails, the process proceeds with the declined path at steps 307, 309, and 311, to allow operation of the device in restricted mode. If authorization is obtained, at step 317, the device is unlocked for unrestricted full use. The credit card authorization failure may be due to an error in the entry of the credit card information by a consenting parent. Accordingly, at step 315, if authorization for a credit card fails, the process proceeds to step 303 to restart the COPPA term acceptance process instead of defaulting to a simple path configuration, thereby allowing a user to correctly execute the COPPA compliance procedure before configuring the device to any mode of use.
  • In some embodiments, the verification of parental status is performed separately from obtaining acceptance by a parent of the terms of the notice, and a parent may accept some terms of the notice, but not others, in partial compliance COPPA. Under COPPA, collection, use, and disclosure of personal information of a child requires notice to and consent of the child's parent if the child is under age 13. Personal information includes, for example, full name of the child, use of a persistent identifier to track a child's usage, and geolocation data, among other data. In some embodiments, at step 305, a parent accepts and consents to the collection of certain personal information, and the process proceeds with steps 313 to verify the parental consent. At step 317, the device unlocks the applications and content that corresponds to the scope of the parent's consent for a modified-restricted configuration. In other words, the device applies a configuration that corresponds to the extent to which the privacy policy requirements applicable to COPPA are met by the type of consent acquired via the privacy module interface.
  • FIG. 4 is a block diagram that illustrates an example of a computer system 400 upon which some embodiments may be implemented. Computer system 400 includes a bus 402 or other communication mechanism for communicating information, and a processor 404 coupled with bus 402 for processing information. Computer system 400 also includes a main memory 406, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 402 for storing information and instructions to be executed by processor 404. Main memory 406 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 404. Computer system 400 further includes a read only memory (ROM) 408 or other static storage device coupled to bus 402 for storing static information and instructions for processor 404. A storage device 410, such as a magnetic disk, optical disk, or a flash memory device, is provided and coupled to bus 402 for storing information and instructions.
  • Computer system 400 may be coupled via bus 402 to a display 412, such as a cathode ray tube (CRT) or liquid crystal display (LCD) or other display device, for displaying information to a computer user. An input device 414, including alphanumeric and other keys, is coupled to bus 402 for communicating information and command selections to processor 404. Another type of user input device is cursor control 416, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 404 and for controlling cursor movement on display 412. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane. In some embodiments, input device 414 is integrated into display 412, such as a touchscreen display for communication command selection to processor 404. Another type of input device includes a video camera, a depth camera, or a 4D camera. Another type of input device includes a voice command input device, such as a microphone operatively coupled to speech interpretation module for communication command selection to processor 404.
  • Some embodiments are related to the use of computer system 400 for implementing the techniques described herein. According to some embodiments, those techniques are performed by computer system 400 in response to processor 404 executing one or more sequences of one or more instructions contained in main memory 406. Such instructions may be read into main memory 406 from another machine-readable medium, such as storage device 410. Execution of the sequences of instructions contained in main memory 406 causes processor 404 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments are not limited to any specific combination of hardware circuitry and software. In further embodiments, multiple computer systems 400 are operatively coupled to implement the embodiments in a distributed system.
  • The terms “machine-readable medium” as used herein refer to any medium that participates in providing data that causes a machine to operate in a specific fashion. In an embodiment implemented using computer system 400, various machine-readable media are involved, for example, in providing instructions to processor 404 for execution. Such a medium may take many forms, including but not limited to storage media and transmission media. Storage media includes both non-volatile media and volatile media. Non-volatile media includes, for example, optical disks, magnetic disks, or flash memory devices, such as storage device 410. Volatile media includes dynamic memory, such as main memory 406. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 402. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications. All such media must be tangible to enable the instructions carried by the media to be detected by a physical mechanism that reads the instructions into a machine.
  • Common forms of machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, flash memory device, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
  • Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 404 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a data transmission line using a modem. A modem local to computer system 400 can receive the data on the data transmission line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 402. Bus 402 carries the data to main memory 406, from which processor 404 retrieves and executes the instructions. The instructions received by main memory 406 may optionally be stored on storage device 410 either before or after execution by processor 404.
  • Computer system 400 also includes a communication interface 418 coupled to bus 402. Communication interface 418 provides a two-way data communication coupling to a network link 420 that is connected to a local network 422. For example, communication interface 418 may be an integrated services digital network (ISDN) card or other internet connection device, or a modem to provide a data communication connection to a corresponding type of data transmission line. As another example, communication interface 418 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless network links may also be implemented. In any such implementation, communication interface 418 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • Network link 420 typically provides data communication through one or more networks to other data devices. For example, network link 420 may provide a connection through local network 422 to a host computer 424 or to data equipment operated by an Internet Service Provider (ISP) 426. ISP 426 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the Internet 428. Local network 422 and Internet 428 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 420 and through communication interface 418, which carry the digital data to and from computer system 400, are exemplary forms of carrier waves transporting the information.
  • Computer system 400 can send and receive messages and data, including program code, through the network(s), network link 420 and communication interface 418. In the Internet example, a server 430 might transmit a requested code for an application program through Internet 428, ISP 426, local network 422 and communication interface 418.
  • The received code may be executed by processor 404 as it is received, and/or stored in storage device 410, or other non-volatile storage for later execution. In this manner, computer system 400 may obtain application code in the form of a carrier wave.
  • Other features, aspects and objects of the invention can be obtained from a review of the figures and the claims. It is to be understood that other embodiments of the invention can be developed and fall within the spirit and scope of the invention and claims.
  • The foregoing description of preferred embodiments of the present invention has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise forms disclosed. Various additions, deletions and modifications are contemplated as being within its scope. The scope of the invention is, therefore, indicated by the appended claims rather than the foregoing description. Further, all changes which may fall within the meaning and range of equivalency of the claims and elements and features thereof are to be embraced within their scope.

Claims (22)

What is claimed is:
1. A computer-implemented method for providing privacy law compliance comprising:
receiving a selection for a configuration path for a device during device initialization, wherein the configuration path is either a simple path or a full path;
in response to the selection for the simple path, applying a restricted device configuration to allow restricted access to device applications and resources of the device;
in response to the user selection for the full path, determining location information of the device and determining a privacy policy requirement applicable to the device based on the location information.
2. The computer-implemented method of claim 1, further comprising:
providing a privacy policy disclosure on a privacy module interface of the device based on the privacy policy requirement; and
acquiring via the privacy module interface compliance information with the privacy policy requirement.
3. The computer-implemented method of claim 2, further comprising:
confirming whether the compliance information acquired via the privacy module interface meets the privacy policy requirement; and
applying an unrestricted device configuration to allow unrestricted access to the device applications and the resources of the device based on a confirmation that the compliance information meets the privacy policy requirement.
4. The computer-implemented method of claim 1, further comprising defaulting to the simple path in the absence of a valid authorization for the full path.
5. The computer-implemented method of claim 1, further comprising verifying authorization for configuring the device.
6. The computer-implemented method of claim 5, further comprising receiving a credit card number that corresponds to a valid credit card account as the authorization to record a monetary transaction on the valid credit card account.
7. The computer-implemented method of claim 1, further comprising determining a physical location of the device using a global positioning system (GPS) receiver as the location information of the device.
8. The computer-implemented method of claim 1, further comprising receiving the location information via a user interface.
9. The computer-implemented method of claim 1, further comprising determining that one or more provisions of the United States' Children's Online Privacy Protection Act (COPPA) apply to use of the device if the location information indicates a location in the United States.
10. The computer-implemented method of claim 9, further comprising providing COPPA-compliant privacy policy disclosures on the privacy module interface.
11. The computer-implemented method of claim 10, further comprising receiving a COPPA-compliant consent to one or more of collection, use, or disclosure of personal information regarding a minor user of the device.
12. The computer-implemented method of claim 1, further comprising, in response to determining that the information acquired via the privacy module interface does not meet the privacy policy requirement, determining the configuration path to be the simple path.
13. A computer-implemented method for providing privacy law compliance comprising:
receiving a selection for a configuration path for configuring a device during device initialization;
determining location information of the device;
determining a privacy policy requirement applicable to the device based on the location information;
providing a privacy policy disclosure on a privacy module interface of the device based on the privacy policy requirement;
acquiring via the privacy module interface compliance information with the privacy policy requirement;
confirming whether the compliance information acquired via the privacy module interface meets the privacy policy requirement; and
applying an unrestricted device configuration to allow unrestricted access to the device applications and the resources of the device based on the confirmation that the compliance information meets the privacy policy requirement.
14. A computer-implemented method of claim 13, further comprising receiving a credit card number that corresponds to a valid credit card account as the authorization to record a monetary transaction on the valid credit card account.
15. The computer-implemented method of claim 13, further comprising determining a physical location of the device using a global positioning system (GPS) receiver as the location information of the device.
16. The computer-implemented method of claim 13, further comprising determining that one or more provisions of the United States' Children's Online Privacy Protection Act (COPPA) apply to use of the device if the location information indicates a location in the United States.
17. The computer-implemented method of claim 13, further comprising, in response to determining that the information acquired via the privacy module interface does not meet the privacy policy requirement, configuring the device in a simple path and applying a restricted device configuration to allow restricted access to device applications and resources of the device.
18. A device comprising:
a display configured to provide a user interface for configuring the device and a privacy module interface;
a processor;
a memory storing device applications and resources;
a privacy law analysis module; and
a device configuration module,
wherein the user interface provides a simple path and a full path as a configuration path for the device,
wherein in response to a selection for the simple path via the user interface, the device configuration module applies a restricted device configuration to the device to allow restricted access to device applications and resources stored on the memory,
wherein in response to a selection for the full path via the user interface, the device configuration module determines location information of the device, and
wherein the privacy module interface further determines a privacy policy requirement applicable to the device based on the location information.
19. The device of claim 18, wherein the privacy module interface further provides a privacy policy disclosure based on the privacy policy requirement and acquires via the privacy module interface compliance information with the privacy policy requirement.
20. The device of claim 19, wherein the device configuration module confirms whether the compliance information acquired via the privacy module interface meets the privacy policy requirement;
and applies an unrestricted device configuration to allow unrestricted access to the device applications and the resources stored in the memory.
21. The device of claim 18, wherein the device configuration module defaults the configuration path to the simple path in the absence of authorization for the full path.
22. The device of claim 18, further comprises a global positioning system (GPS) receiver to determine the location information of the device.
US14/629,407 2013-10-04 2015-02-23 Systems and methods for device configuration and activation with automated privacy law compliance Abandoned US20150172296A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/629,407 US20150172296A1 (en) 2013-10-04 2015-02-23 Systems and methods for device configuration and activation with automated privacy law compliance

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/046,893 US9015796B1 (en) 2013-10-04 2013-10-04 Systems and methods for device configuration and activation with automated privacy law compliance
US14/629,407 US20150172296A1 (en) 2013-10-04 2015-02-23 Systems and methods for device configuration and activation with automated privacy law compliance

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/046,893 Continuation US9015796B1 (en) 2013-10-04 2013-10-04 Systems and methods for device configuration and activation with automated privacy law compliance

Publications (1)

Publication Number Publication Date
US20150172296A1 true US20150172296A1 (en) 2015-06-18

Family

ID=52778052

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/046,893 Expired - Fee Related US9015796B1 (en) 2013-10-04 2013-10-04 Systems and methods for device configuration and activation with automated privacy law compliance
US14/629,407 Abandoned US20150172296A1 (en) 2013-10-04 2015-02-23 Systems and methods for device configuration and activation with automated privacy law compliance

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/046,893 Expired - Fee Related US9015796B1 (en) 2013-10-04 2013-10-04 Systems and methods for device configuration and activation with automated privacy law compliance

Country Status (3)

Country Link
US (2) US9015796B1 (en)
TW (1) TW201531883A (en)
WO (1) WO2015051286A1 (en)

Cited By (116)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10963591B2 (en) 2018-09-07 2021-03-30 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US10972509B2 (en) 2016-06-10 2021-04-06 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US10970371B2 (en) 2016-06-10 2021-04-06 OneTrust, LLC Consent receipt management systems and related methods
US10970675B2 (en) 2016-06-10 2021-04-06 OneTrust, LLC Data processing systems for generating and populating a data inventory
US10984132B2 (en) 2016-06-10 2021-04-20 OneTrust, LLC Data processing systems and methods for populating and maintaining a centralized database of personal data
US10997318B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US10997315B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10997542B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Privacy management systems and methods
US11004125B2 (en) 2016-04-01 2021-05-11 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11023616B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11025675B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11023842B2 (en) * 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11030327B2 (en) 2016-06-10 2021-06-08 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11030563B2 (en) 2016-06-10 2021-06-08 OneTrust, LLC Privacy management systems and methods
US11030274B2 (en) 2016-06-10 2021-06-08 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11038925B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11036771B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11036882B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11036674B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for processing data subject access requests
US11057356B2 (en) 2016-06-10 2021-07-06 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11062051B2 (en) 2016-06-10 2021-07-13 OneTrust, LLC Consent receipt management systems and related methods
US11068618B2 (en) 2016-06-10 2021-07-20 OneTrust, LLC Data processing systems for central consent repository and related methods
US11070593B2 (en) 2016-06-10 2021-07-20 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11074367B2 (en) 2016-06-10 2021-07-27 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11087260B2 (en) 2016-06-10 2021-08-10 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11100445B2 (en) 2016-06-10 2021-08-24 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US11100444B2 (en) 2016-06-10 2021-08-24 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US11113416B2 (en) 2016-06-10 2021-09-07 OneTrust, LLC Application privacy scanning systems and related methods
US11122011B2 (en) 2016-06-10 2021-09-14 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11120161B2 (en) 2016-06-10 2021-09-14 OneTrust, LLC Data subject access request processing systems and related methods
US11120162B2 (en) 2016-06-10 2021-09-14 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US11126748B2 (en) 2016-06-10 2021-09-21 OneTrust, LLC Data processing consent management systems and related methods
US11134086B2 (en) 2016-06-10 2021-09-28 OneTrust, LLC Consent conversion optimization systems and related methods
US11138336B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11138299B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11138242B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11138318B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11144670B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US11144675B2 (en) 2018-09-07 2021-10-12 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US11146566B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11144622B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Privacy management systems and methods
US11151233B2 (en) 2016-06-10 2021-10-19 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11157600B2 (en) 2016-06-10 2021-10-26 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11182501B2 (en) 2016-06-10 2021-11-23 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11188862B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Privacy management systems and methods
US11188615B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Data processing consent capture systems and related methods
US11195134B2 (en) 2016-06-10 2021-12-07 OneTrust, LLC Privacy management systems and methods
US11200341B2 (en) 2016-06-10 2021-12-14 OneTrust, LLC Consent receipt management systems and related methods
US11210420B2 (en) 2016-06-10 2021-12-28 OneTrust, LLC Data subject access request processing systems and related methods
US11222309B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11222142B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for validating authorization for personal data collection, storage, and processing
US11222139B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems and methods for automatic discovery and assessment of mobile software development kits
US11227247B2 (en) * 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11228620B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11238390B2 (en) 2016-06-10 2022-02-01 OneTrust, LLC Privacy management systems and methods
US11244367B2 (en) 2016-04-01 2022-02-08 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11244071B2 (en) 2016-06-10 2022-02-08 OneTrust, LLC Data processing systems for use in automatically generating, populating, and submitting data subject access requests
US11277448B2 (en) 2016-06-10 2022-03-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11294939B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11295316B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11301796B2 (en) 2016-06-10 2022-04-12 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11301589B2 (en) 2016-06-10 2022-04-12 OneTrust, LLC Consent receipt management systems and related methods
US11308435B2 (en) 2016-06-10 2022-04-19 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11328092B2 (en) 2016-06-10 2022-05-10 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11336697B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11343284B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11341447B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Privacy management systems and methods
US11354435B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US11354434B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11366786B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing systems for processing data subject access requests
US11366909B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11373007B2 (en) 2017-06-16 2022-06-28 OneTrust, LLC Data processing systems for identifying whether cookies contain personally identifying information
US11392720B2 (en) 2016-06-10 2022-07-19 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11397819B2 (en) 2020-11-06 2022-07-26 OneTrust, LLC Systems and methods for identifying data processing activities based on data discovery results
US11403377B2 (en) 2016-06-10 2022-08-02 OneTrust, LLC Privacy management systems and methods
US11416798B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US11418492B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11416589B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11416109B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11416590B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11416634B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Consent receipt management systems and related methods
US11436373B2 (en) 2020-09-15 2022-09-06 OneTrust, LLC Data processing systems and methods for detecting tools for the automatic blocking of consent requests
US11438386B2 (en) 2016-06-10 2022-09-06 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11444976B2 (en) 2020-07-28 2022-09-13 OneTrust, LLC Systems and methods for automatically blocking the use of tracking tools
US11442906B2 (en) 2021-02-04 2022-09-13 OneTrust, LLC Managing custom attributes for domain objects defined within microservices
US11461500B2 (en) 2016-06-10 2022-10-04 OneTrust, LLC Data processing systems for cookie compliance testing with website scanning and related methods
US11475165B2 (en) 2020-08-06 2022-10-18 OneTrust, LLC Data processing systems and methods for automatically redacting unstructured data from a data subject access request
US11475136B2 (en) 2016-06-10 2022-10-18 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11481710B2 (en) 2016-06-10 2022-10-25 OneTrust, LLC Privacy management systems and methods
US11494515B2 (en) 2021-02-08 2022-11-08 OneTrust, LLC Data processing systems and methods for anonymizing data samples in classification analysis
US11520928B2 (en) 2016-06-10 2022-12-06 OneTrust, LLC Data processing systems for generating personal data receipts and related methods
US11526624B2 (en) 2020-09-21 2022-12-13 OneTrust, LLC Data processing systems and methods for automatically detecting target data transfers and target data processing
US11533315B2 (en) 2021-03-08 2022-12-20 OneTrust, LLC Data transfer discovery and analysis systems and related methods
US11544667B2 (en) 2016-06-10 2023-01-03 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11544409B2 (en) 2018-09-07 2023-01-03 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US11546661B2 (en) 2021-02-18 2023-01-03 OneTrust, LLC Selective redaction of media content
US11562078B2 (en) 2021-04-16 2023-01-24 OneTrust, LLC Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
US11562097B2 (en) 2016-06-10 2023-01-24 OneTrust, LLC Data processing systems for central consent repository and related methods
US11586762B2 (en) 2016-06-10 2023-02-21 OneTrust, LLC Data processing systems and methods for auditing data request compliance
US11586700B2 (en) 2016-06-10 2023-02-21 OneTrust, LLC Data processing systems and methods for automatically blocking the use of tracking tools
US11601464B2 (en) 2021-02-10 2023-03-07 OneTrust, LLC Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system
US11620142B1 (en) 2022-06-03 2023-04-04 OneTrust, LLC Generating and customizing user interfaces for demonstrating functions of interactive user environments
US11625502B2 (en) 2016-06-10 2023-04-11 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US11636171B2 (en) 2016-06-10 2023-04-25 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11645688B2 (en) * 2018-08-02 2023-05-09 T-Mobile Usa, Inc. User-behavior-based predictive product and service provisioning
US11651402B2 (en) 2016-04-01 2023-05-16 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of risk assessments
US11651106B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11651104B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Consent receipt management systems and related methods
US11675929B2 (en) 2016-06-10 2023-06-13 OneTrust, LLC Data processing consent sharing systems and related methods
US11687528B2 (en) 2021-01-25 2023-06-27 OneTrust, LLC Systems and methods for discovery, classification, and indexing of data in a native computing system
US11727141B2 (en) 2016-06-10 2023-08-15 OneTrust, LLC Data processing systems and methods for synching privacy-related user consent across multiple computing devices
US11775348B2 (en) 2021-02-17 2023-10-03 OneTrust, LLC Managing custom workflows for domain objects defined within microservices
US11797528B2 (en) 2020-07-08 2023-10-24 OneTrust, LLC Systems and methods for targeted data discovery
US12045266B2 (en) 2016-06-10 2024-07-23 OneTrust, LLC Data processing systems for generating and populating a data inventory
US12052289B2 (en) 2016-06-10 2024-07-30 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US12118121B2 (en) 2016-06-10 2024-10-15 OneTrust, LLC Data subject access request processing systems and related methods

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150073998A1 (en) 2013-09-09 2015-03-12 Apple Inc. Use of a Biometric Image in Online Commerce
US20150220931A1 (en) * 2014-01-31 2015-08-06 Apple Inc. Use of a Biometric Image for Authorization
US9477488B2 (en) * 2014-06-12 2016-10-25 David Milman Systems and methods for managing distributed sales, service and repair operations
US9980165B2 (en) * 2016-02-10 2018-05-22 Airwatch Llc Visual privacy systems for enterprise mobility management
US11410106B2 (en) 2016-06-10 2022-08-09 OneTrust, LLC Privacy management systems and methods
JP2024115196A (en) * 2023-02-14 2024-08-26 トヨタ自動車株式会社 Information management device, information management method, and information management program
JP2024115197A (en) * 2023-02-14 2024-08-26 トヨタ自動車株式会社 Information management device, information management method, and information management program

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020087472A1 (en) * 2000-12-29 2002-07-04 Walter Joanne S. Data privacy encoding for consumer input media
US20040229199A1 (en) * 2003-04-16 2004-11-18 Measured Progress, Inc. Computer-based standardized test administration, scoring and analysis system
US20070013515A1 (en) * 2005-07-15 2007-01-18 Microsoft Corporation Parental controls for a media console
US20070210894A1 (en) * 2003-10-31 2007-09-13 Ae-Soon Park Method for Authenticating Subscriber Station, Method for Configuring Protocol Thereof, and Apparatus Thereof in Wireless Protable Internet System
US20080005778A1 (en) * 2006-07-03 2008-01-03 Weifeng Chen System and method for privacy protection using identifiability risk assessment
US20100146301A1 (en) * 2008-12-09 2010-06-10 Shevchenko Oleksiy Yu Privacy protection system
US20110307799A1 (en) * 2010-06-11 2011-12-15 Aronov Svetlana Scripting application with privacy mode coordination
US20120011594A1 (en) * 2010-07-12 2012-01-12 Bruce Nguyen System and method for coppa compliance for online education
US20120122525A1 (en) * 2009-08-05 2012-05-17 Ford Global Technologies, Llc System and method for controlling privacy mode operation in a vehicle
US20120246122A1 (en) * 2011-03-21 2012-09-27 Sap Ag Integrating data-handling policies into a workflow model
US20120284801A1 (en) * 2010-12-30 2012-11-08 Ensighten, Inc. Online Privacy Management
US20130212638A1 (en) * 2012-02-09 2013-08-15 Aol Inc. Systems and methods for testing online systems and content
US20130276136A1 (en) * 2010-12-30 2013-10-17 Ensighten, Inc. Online Privacy Management
US20140283100A1 (en) * 2013-03-15 2014-09-18 Edward R. Harrison Display privacy with dynamic configuration

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040010472A1 (en) 2002-07-12 2004-01-15 Hilby Robert T. System and method for verifying information
US8205093B2 (en) 2007-06-29 2012-06-19 At&T Intellectual Property I, L.P. Restricting access to information
US8509760B2 (en) 2007-10-26 2013-08-13 At&T Intellectual Property I, L.P. Standardized control of wireless devices
JP5190252B2 (en) 2007-11-27 2013-04-24 インターナショナル・ビジネス・マシーンズ・コーポレーション Preference matching system, method and program
US20090247836A1 (en) 2008-02-28 2009-10-01 Confidant Inc. Medical System and Method for Serving Users with a Chronic Disease or Health State
US20130254660A1 (en) 2008-03-13 2013-09-26 Robb Fujioka Tablet computer
US8505078B2 (en) 2008-12-28 2013-08-06 Qualcomm Incorporated Apparatus and methods for providing authorized device access
US20130035946A1 (en) 2011-08-03 2013-02-07 Suneel James Ratan Social networks for care coordination, management, and support and health information exchange
US9946887B2 (en) * 2012-06-04 2018-04-17 Nokia Technologies Oy Method and apparatus for determining privacy policy based on data and associated values

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020087472A1 (en) * 2000-12-29 2002-07-04 Walter Joanne S. Data privacy encoding for consumer input media
US20040229199A1 (en) * 2003-04-16 2004-11-18 Measured Progress, Inc. Computer-based standardized test administration, scoring and analysis system
US20070210894A1 (en) * 2003-10-31 2007-09-13 Ae-Soon Park Method for Authenticating Subscriber Station, Method for Configuring Protocol Thereof, and Apparatus Thereof in Wireless Protable Internet System
US20070013515A1 (en) * 2005-07-15 2007-01-18 Microsoft Corporation Parental controls for a media console
US20080005778A1 (en) * 2006-07-03 2008-01-03 Weifeng Chen System and method for privacy protection using identifiability risk assessment
US20100146301A1 (en) * 2008-12-09 2010-06-10 Shevchenko Oleksiy Yu Privacy protection system
US8266708B2 (en) * 2008-12-09 2012-09-11 Broadlands Technologies Llc Privacy protection system
US20120122525A1 (en) * 2009-08-05 2012-05-17 Ford Global Technologies, Llc System and method for controlling privacy mode operation in a vehicle
US20110307799A1 (en) * 2010-06-11 2011-12-15 Aronov Svetlana Scripting application with privacy mode coordination
US20120011594A1 (en) * 2010-07-12 2012-01-12 Bruce Nguyen System and method for coppa compliance for online education
US8613051B2 (en) * 2010-07-12 2013-12-17 Bruce Nguyen System and method for COPPA compliance for online education
US20120284801A1 (en) * 2010-12-30 2012-11-08 Ensighten, Inc. Online Privacy Management
US20130276136A1 (en) * 2010-12-30 2013-10-17 Ensighten, Inc. Online Privacy Management
US20120246122A1 (en) * 2011-03-21 2012-09-27 Sap Ag Integrating data-handling policies into a workflow model
US20130212638A1 (en) * 2012-02-09 2013-08-15 Aol Inc. Systems and methods for testing online systems and content
US20140283100A1 (en) * 2013-03-15 2014-09-18 Edward R. Harrison Display privacy with dynamic configuration

Cited By (155)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11004125B2 (en) 2016-04-01 2021-05-11 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11651402B2 (en) 2016-04-01 2023-05-16 OneTrust, LLC Data processing systems and communication systems and methods for the efficient generation of risk assessments
US11244367B2 (en) 2016-04-01 2022-02-08 OneTrust, LLC Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design
US11354434B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11244072B2 (en) 2016-06-10 2022-02-08 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US10997318B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US10997315B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10997542B2 (en) 2016-06-10 2021-05-04 OneTrust, LLC Privacy management systems and methods
US10970675B2 (en) 2016-06-10 2021-04-06 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11023616B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11025675B2 (en) 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11023842B2 (en) * 2016-06-10 2021-06-01 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11030327B2 (en) 2016-06-10 2021-06-08 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11030563B2 (en) 2016-06-10 2021-06-08 OneTrust, LLC Privacy management systems and methods
US11030274B2 (en) 2016-06-10 2021-06-08 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11038925B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11036771B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11036882B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11036674B2 (en) 2016-06-10 2021-06-15 OneTrust, LLC Data processing systems for processing data subject access requests
US11057356B2 (en) 2016-06-10 2021-07-06 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11062051B2 (en) 2016-06-10 2021-07-13 OneTrust, LLC Consent receipt management systems and related methods
US11068618B2 (en) 2016-06-10 2021-07-20 OneTrust, LLC Data processing systems for central consent repository and related methods
US11070593B2 (en) 2016-06-10 2021-07-20 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11074367B2 (en) 2016-06-10 2021-07-27 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11087260B2 (en) 2016-06-10 2021-08-10 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11100445B2 (en) 2016-06-10 2021-08-24 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US11100444B2 (en) 2016-06-10 2021-08-24 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US11113416B2 (en) 2016-06-10 2021-09-07 OneTrust, LLC Application privacy scanning systems and related methods
US11122011B2 (en) 2016-06-10 2021-09-14 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11120161B2 (en) 2016-06-10 2021-09-14 OneTrust, LLC Data subject access request processing systems and related methods
US11120162B2 (en) 2016-06-10 2021-09-14 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US11126748B2 (en) 2016-06-10 2021-09-21 OneTrust, LLC Data processing consent management systems and related methods
US11134086B2 (en) 2016-06-10 2021-09-28 OneTrust, LLC Consent conversion optimization systems and related methods
US11138336B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11138299B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11138242B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11138318B2 (en) 2016-06-10 2021-10-05 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11144670B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US12118121B2 (en) 2016-06-10 2024-10-15 OneTrust, LLC Data subject access request processing systems and related methods
US11146566B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11144622B2 (en) 2016-06-10 2021-10-12 OneTrust, LLC Privacy management systems and methods
US11151233B2 (en) 2016-06-10 2021-10-19 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11157600B2 (en) 2016-06-10 2021-10-26 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US12086748B2 (en) 2016-06-10 2024-09-10 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US11182501B2 (en) 2016-06-10 2021-11-23 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US11188862B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Privacy management systems and methods
US11188615B2 (en) 2016-06-10 2021-11-30 OneTrust, LLC Data processing consent capture systems and related methods
US11195134B2 (en) 2016-06-10 2021-12-07 OneTrust, LLC Privacy management systems and methods
US11200341B2 (en) 2016-06-10 2021-12-14 OneTrust, LLC Consent receipt management systems and related methods
US11210420B2 (en) 2016-06-10 2021-12-28 OneTrust, LLC Data subject access request processing systems and related methods
US11222309B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11222142B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems for validating authorization for personal data collection, storage, and processing
US11222139B2 (en) 2016-06-10 2022-01-11 OneTrust, LLC Data processing systems and methods for automatic discovery and assessment of mobile software development kits
US11227247B2 (en) * 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11228620B2 (en) 2016-06-10 2022-01-18 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11238390B2 (en) 2016-06-10 2022-02-01 OneTrust, LLC Privacy management systems and methods
US11240273B2 (en) 2016-06-10 2022-02-01 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US11366786B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing systems for processing data subject access requests
US10970371B2 (en) 2016-06-10 2021-04-06 OneTrust, LLC Consent receipt management systems and related methods
US11244071B2 (en) 2016-06-10 2022-02-08 OneTrust, LLC Data processing systems for use in automatically generating, populating, and submitting data subject access requests
US11256777B2 (en) 2016-06-10 2022-02-22 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11277448B2 (en) 2016-06-10 2022-03-15 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11294939B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11295316B2 (en) 2016-06-10 2022-04-05 OneTrust, LLC Data processing systems for identity validation for consumer rights requests and related methods
US11301796B2 (en) 2016-06-10 2022-04-12 OneTrust, LLC Data processing systems and methods for customizing privacy training
US11366909B2 (en) 2016-06-10 2022-06-21 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11308435B2 (en) 2016-06-10 2022-04-19 OneTrust, LLC Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques
US11328240B2 (en) 2016-06-10 2022-05-10 OneTrust, LLC Data processing systems for assessing readiness for responding to privacy-related incidents
US11328092B2 (en) 2016-06-10 2022-05-10 OneTrust, LLC Data processing systems for processing and managing data subject access in a distributed environment
US11334682B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Data subject access request processing systems and related methods
US11336697B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11334681B2 (en) 2016-06-10 2022-05-17 OneTrust, LLC Application privacy scanning systems and related meihods
US11343284B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance
US11341447B2 (en) 2016-06-10 2022-05-24 OneTrust, LLC Privacy management systems and methods
US11347889B2 (en) 2016-06-10 2022-05-31 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11354435B2 (en) 2016-06-10 2022-06-07 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US12052289B2 (en) 2016-06-10 2024-07-30 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11449633B2 (en) 2016-06-10 2022-09-20 OneTrust, LLC Data processing systems and methods for automatic discovery and assessment of mobile software development kits
US10984132B2 (en) 2016-06-10 2021-04-20 OneTrust, LLC Data processing systems and methods for populating and maintaining a centralized database of personal data
US11301589B2 (en) 2016-06-10 2022-04-12 OneTrust, LLC Consent receipt management systems and related methods
US12045266B2 (en) 2016-06-10 2024-07-23 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11392720B2 (en) 2016-06-10 2022-07-19 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US12026651B2 (en) 2016-06-10 2024-07-02 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US11403377B2 (en) 2016-06-10 2022-08-02 OneTrust, LLC Privacy management systems and methods
US11409908B2 (en) 2016-06-10 2022-08-09 OneTrust, LLC Data processing systems and methods for populating and maintaining a centralized database of personal data
US11416636B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing consent management systems and related methods
US11416798B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for providing training in a vendor procurement process
US11418492B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing systems and methods for using a data model to select a target data asset in a data migration
US11416589B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11416109B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Automated data processing systems and methods for automatically processing data subject access requests using a chatbot
US11416590B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11416634B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Consent receipt management systems and related methods
US11416576B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Data processing consent capture systems and related methods
US11418516B2 (en) 2016-06-10 2022-08-16 OneTrust, LLC Consent conversion optimization systems and related methods
US11960564B2 (en) 2016-06-10 2024-04-16 OneTrust, LLC Data processing systems and methods for automatically blocking the use of tracking tools
US11438386B2 (en) 2016-06-10 2022-09-06 OneTrust, LLC Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods
US11921894B2 (en) 2016-06-10 2024-03-05 OneTrust, LLC Data processing systems for generating and populating a data inventory for processing data access requests
US11868507B2 (en) 2016-06-10 2024-01-09 OneTrust, LLC Data processing systems for cookie compliance testing with website scanning and related methods
US11361057B2 (en) 2016-06-10 2022-06-14 OneTrust, LLC Consent receipt management systems and related methods
US11461500B2 (en) 2016-06-10 2022-10-04 OneTrust, LLC Data processing systems for cookie compliance testing with website scanning and related methods
US11461722B2 (en) 2016-06-10 2022-10-04 OneTrust, LLC Questionnaire response automation for compliance management
US11468386B2 (en) 2016-06-10 2022-10-11 OneTrust, LLC Data processing systems and methods for bundled privacy policies
US11468196B2 (en) 2016-06-10 2022-10-11 OneTrust, LLC Data processing systems for validating authorization for personal data collection, storage, and processing
US11847182B2 (en) 2016-06-10 2023-12-19 OneTrust, LLC Data processing consent capture systems and related methods
US11475136B2 (en) 2016-06-10 2022-10-18 OneTrust, LLC Data processing systems for data transfer risk identification and related methods
US11481710B2 (en) 2016-06-10 2022-10-25 OneTrust, LLC Privacy management systems and methods
US11488085B2 (en) 2016-06-10 2022-11-01 OneTrust, LLC Questionnaire response automation for compliance management
US11727141B2 (en) 2016-06-10 2023-08-15 OneTrust, LLC Data processing systems and methods for synching privacy-related user consent across multiple computing devices
US11520928B2 (en) 2016-06-10 2022-12-06 OneTrust, LLC Data processing systems for generating personal data receipts and related methods
US11675929B2 (en) 2016-06-10 2023-06-13 OneTrust, LLC Data processing consent sharing systems and related methods
US11651104B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Consent receipt management systems and related methods
US11544667B2 (en) 2016-06-10 2023-01-03 OneTrust, LLC Data processing systems for generating and populating a data inventory
US11651106B2 (en) 2016-06-10 2023-05-16 OneTrust, LLC Data processing systems for fulfilling data subject access requests and related methods
US10972509B2 (en) 2016-06-10 2021-04-06 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US11544405B2 (en) 2016-06-10 2023-01-03 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11550897B2 (en) 2016-06-10 2023-01-10 OneTrust, LLC Data processing and scanning systems for assessing vendor risk
US11551174B2 (en) 2016-06-10 2023-01-10 OneTrust, LLC Privacy management systems and methods
US11558429B2 (en) 2016-06-10 2023-01-17 OneTrust, LLC Data processing and scanning systems for generating and populating a data inventory
US11556672B2 (en) 2016-06-10 2023-01-17 OneTrust, LLC Data processing systems for verification of consent and notice processing and related methods
US11645418B2 (en) 2016-06-10 2023-05-09 OneTrust, LLC Data processing systems for data testing to confirm data deletion and related methods
US11562097B2 (en) 2016-06-10 2023-01-24 OneTrust, LLC Data processing systems for central consent repository and related methods
US11586762B2 (en) 2016-06-10 2023-02-21 OneTrust, LLC Data processing systems and methods for auditing data request compliance
US11586700B2 (en) 2016-06-10 2023-02-21 OneTrust, LLC Data processing systems and methods for automatically blocking the use of tracking tools
US11645353B2 (en) 2016-06-10 2023-05-09 OneTrust, LLC Data processing consent capture systems and related methods
US11636171B2 (en) 2016-06-10 2023-04-25 OneTrust, LLC Data processing user interface monitoring systems and related methods
US11609939B2 (en) 2016-06-10 2023-03-21 OneTrust, LLC Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software
US11625502B2 (en) 2016-06-10 2023-04-11 OneTrust, LLC Data processing systems for identifying and modifying processes that are subject to data subject access requests
US11373007B2 (en) 2017-06-16 2022-06-28 OneTrust, LLC Data processing systems for identifying whether cookies contain personally identifying information
US11663359B2 (en) 2017-06-16 2023-05-30 OneTrust, LLC Data processing systems for identifying whether cookies contain personally identifying information
US11645688B2 (en) * 2018-08-02 2023-05-09 T-Mobile Usa, Inc. User-behavior-based predictive product and service provisioning
US11593523B2 (en) 2018-09-07 2023-02-28 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US11144675B2 (en) 2018-09-07 2021-10-12 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US11157654B2 (en) 2018-09-07 2021-10-26 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US11544409B2 (en) 2018-09-07 2023-01-03 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US10963591B2 (en) 2018-09-07 2021-03-30 OneTrust, LLC Data processing systems for orphaned data identification and deletion and related methods
US11947708B2 (en) 2018-09-07 2024-04-02 OneTrust, LLC Data processing systems and methods for automatically protecting sensitive data within privacy management systems
US11797528B2 (en) 2020-07-08 2023-10-24 OneTrust, LLC Systems and methods for targeted data discovery
US11968229B2 (en) 2020-07-28 2024-04-23 OneTrust, LLC Systems and methods for automatically blocking the use of tracking tools
US11444976B2 (en) 2020-07-28 2022-09-13 OneTrust, LLC Systems and methods for automatically blocking the use of tracking tools
US11475165B2 (en) 2020-08-06 2022-10-18 OneTrust, LLC Data processing systems and methods for automatically redacting unstructured data from a data subject access request
US11704440B2 (en) 2020-09-15 2023-07-18 OneTrust, LLC Data processing systems and methods for preventing execution of an action documenting a consent rejection
US11436373B2 (en) 2020-09-15 2022-09-06 OneTrust, LLC Data processing systems and methods for detecting tools for the automatic blocking of consent requests
US11526624B2 (en) 2020-09-21 2022-12-13 OneTrust, LLC Data processing systems and methods for automatically detecting target data transfers and target data processing
US11615192B2 (en) 2020-11-06 2023-03-28 OneTrust, LLC Systems and methods for identifying data processing activities based on data discovery results
US11397819B2 (en) 2020-11-06 2022-07-26 OneTrust, LLC Systems and methods for identifying data processing activities based on data discovery results
US11687528B2 (en) 2021-01-25 2023-06-27 OneTrust, LLC Systems and methods for discovery, classification, and indexing of data in a native computing system
US11442906B2 (en) 2021-02-04 2022-09-13 OneTrust, LLC Managing custom attributes for domain objects defined within microservices
US11494515B2 (en) 2021-02-08 2022-11-08 OneTrust, LLC Data processing systems and methods for anonymizing data samples in classification analysis
US11601464B2 (en) 2021-02-10 2023-03-07 OneTrust, LLC Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system
US11775348B2 (en) 2021-02-17 2023-10-03 OneTrust, LLC Managing custom workflows for domain objects defined within microservices
US11546661B2 (en) 2021-02-18 2023-01-03 OneTrust, LLC Selective redaction of media content
US11533315B2 (en) 2021-03-08 2022-12-20 OneTrust, LLC Data transfer discovery and analysis systems and related methods
US11816224B2 (en) 2021-04-16 2023-11-14 OneTrust, LLC Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
US11562078B2 (en) 2021-04-16 2023-01-24 OneTrust, LLC Assessing and managing computational risk involved with integrating third party computing functionality within a computing system
US11620142B1 (en) 2022-06-03 2023-04-04 OneTrust, LLC Generating and customizing user interfaces for demonstrating functions of interactive user environments

Also Published As

Publication number Publication date
US20150101007A1 (en) 2015-04-09
US9015796B1 (en) 2015-04-21
WO2015051286A1 (en) 2015-04-09
TW201531883A (en) 2015-08-16

Similar Documents

Publication Publication Date Title
US9015796B1 (en) Systems and methods for device configuration and activation with automated privacy law compliance
US10171241B2 (en) Step-up authentication for single sign-on
US9787654B2 (en) Resolving authenticating issues with a second device
US11196752B2 (en) Multifactor authentication for secure management of data center assets from a mobile device
KR101468977B1 (en) Method and system for authentication using a mobile device
US7917641B2 (en) Apparatus and method for provisioning wireless data communication devices
US12058264B2 (en) Techniques for using signed nonces to secure cloud shells
WO2016062002A1 (en) Connection management method and apparatus, electrical device
US20220294788A1 (en) Customizing authentication and handling pre and post authentication in identity cloud service
US11818113B2 (en) Techniques for simultaneously accessing multiple isolated systems while maintaining security boundaries
EP1575239A1 (en) Method and apparatus for managing workflow in a single sign-on framework
CN106713321A (en) Authority management method and device for debugging function of point of sale
US9455972B1 (en) Provisioning a mobile device with a security application on the fly
CN116170234B (en) Single sign-on method and system based on virtual account authentication
US20240121233A1 (en) Automatic sign-in upon account signup
CN103176987A (en) Method and device for controlling database access
CN105656856A (en) Resource management method and device
KR20130113785A (en) Method and server for user certification using voice information
CN113852596A (en) Application authentication agent method and system based on Kubernetes
JP2024536240A (en) Compound authorizations for entities within a domain
CN117390605A (en) Access control method, device, equipment and storage medium
CN118364440A (en) Information authorization method, device, terminal equipment and storage medium

Legal Events

Date Code Title Description
AS Assignment

Owner name: FUHU, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FUJIOKA, ROBB;REEL/FRAME:035705/0431

Effective date: 20150522

AS Assignment

Owner name: OBSIDIAN AGENCY SERVICES, INC., CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNOR:FUHU, INC.;REEL/FRAME:035775/0173

Effective date: 20150527

AS Assignment

Owner name: MATTEL, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FUHU, INC.;REEL/FRAME:037917/0349

Effective date: 20160129

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION