The disclosed embodiments relate generally to the field of risk mitigation and more particularly, but not exclusively, to systems and methods for analyzing multiple authoritative sources of global privacy and data protection regulations to identify and mitigate risks.
Reading, analyzing and mapping authoritative text to common privacy and data protection domains, sub-domains, and control statements can present many challenges. The authoritative text is different among countries and other geographic regions and must be considered in view of other local requirements. In addition, the authoritative text may be provided only in a local language, which must be translated or read by an individual fluent in the local language.
In view of the foregoing, a need exists for an improved system and method for analyzing multiple authoritative sources of global privacy and data protection to identify and mitigate risks that overcome the aforementioned obstacles and deficiencies of currently-available systems and methods.
It should be noted that the figures are not drawn to scale and that elements of similar structures or functions are generally represented by like reference numerals for illustrative purposes throughout the figures. It also should be noted that the figures are only intended to facilitate the description of the preferred embodiments. The figures do not illustrate every aspect of the described embodiments and do not limit the scope of the present disclosure.
Since currently-available global privacy and data protection analysis systems and methods require analysis of different authoritative text written in different languages for multiple countries, a global privacy and data protection framework system and method for analyzing multiple authoritative sources of global privacy and data protection regulations can prove desirable and provide a basis for a wide range of applications, such as facilitating analysis of multiple authoritative sources of global privacy and data protection regulations to identify and mitigate risk. This result can be achieved, according to one embodiment disclosed herein, by a global privacy and data protection framework method 1000 as illustrated in
Turning to
A source library can be updated, at 1200, to include the received current source data. The updated source library with the received current source data, for example, can be stored as a new version of the source library. In other words, the received current source data, for example, can be stored as an initial version of the source library if the received current source data is associated with a new regulation; whereas, the received current source data associated with a changed regulation can be stored as an updated version of the source library. In selected embodiments, the source library can be updated to include a new version of the changed existing regulation while maintaining one or more older versions of the existing regulation.
The global privacy and data protection framework method 1000 advantageously can permit the user 210 to enter the received current source data and to interact with the generated reports that show the current and/or past versions of the source data. Database versioning and impact analysis reports, for example, can enable the user 210 to understand how a regulation changes over time and then drive insights necessary for a functional compliance program based on the available data. Stated somewhat differently, the global privacy and data protection framework method 1000 advantageously can support database versioning, impact analysis, source data mapping, and/or flexible hierarchy visualization of the current and/or past versions of the source data.
In selected embodiments, the external data source systems 300 upon which the user 210 relies for understanding compliance obligations may be static and/or may dynamically change over time. The global privacy and data protection framework method 1000 thereby can provide a control framework that is configured to group the external data source systems 300 to include the external data source systems 300 that are relevant to the user 210 and/or the compliance obligations of the user 210 at a given point in time. As the external data source systems 300 change, requirements contained in the control framework also can change. The user 210, for example, can manually modify the control framework over time, creating a new version of the control framework to understand the compliance obligations under a current state or conditions.
The global privacy and data protection framework method 1000 can be configured to store one or more versions of the control framework. The versions of the control framework include the compliance obligations of the user 210 are respective points in time. Thereby, if an existing regulation changes, the global privacy and data protection framework method 1000 can present current regulatory requirements and/or historic regulatory requirements at a given point in time for the user 210. Additionally and/or alternatively, the global privacy and data protection framework method 1000 can present a different between two versions of the regulatory requirements and/or the control framework.
At 1300, the global privacy and data protection framework method 1000 can generate one or more reports based upon the received current source data. Stated somewhat differently, the received current source data and/or the updated source library can percolate through the global privacy and data protection framework method 1000 and/or through the reports. The global privacy and data protection framework method 1000, for example, can generate at least one library dashboard and/or at least one regulation report via the control framework for enabling the user 210 to understand a current state of the source data, a current state of the regulation associated with the source data, and/or a current state of the control framework, without limitation.
Additionally and/or alternatively, the global privacy and data protection framework method 1000 can generate at least one library dashboard, at least one regulation report, at least one impact analysis and/or at least one history report via the control framework for permitting the user 210 to understand a historic (or prior) state of the source data, a historic (or prior) state of the regulation associated with the source data, and/or a historic (or prior) state of the control framework, without limitation. The global privacy and data protection framework method 1000 optionally can generate at least one impact analysis for enabling the user 210 to understand a first difference between a historic (or prior) state of the source data and a current state of the source data and/or a second difference between a historic (or prior) state of the regulation associated with the source data and a current state of the regulation associated with the source data, without limitation. One or more of the reports can comprise interactive reports for permitting the user 210 to interact with the reports to facilitate understanding.
In selected embodiments, the global privacy and data protection framework method 1000 can receive the source data, at 1100, via a single-step process or a multi-step workflow process 1110 as illustrated in
Turning to
The multi-step workflow process 1110 can create the work request associated with the new regulation, at 1120, in any suitable manner. An exemplary embodiment of creating the work request, at 1120, is illustrated in
Once the translation condition is met, the multi-step workflow process 1110 can determine whether a blocking condition exists for the work request, at 1120E. If a blocking condition exists, the work request can be flagged as being blocked, at 1120F. The work request cannot be further processed, at 1120G, via the multi-step workflow process 1110 until the blocking condition is resolved and/or the work request can be flagged as not being blocked. Upon resolution of any blocking condition, the multi-step workflow process 1110 can determine whether each required field and/or a checklist have been entered for the work request, at 1120H. At 1120I, the work request cannot be further processed via the multi-step workflow process 1110 if at least one required field and/or the checklist have been not entered. The multi-step workflow process 1110, for example, can permit additional metadata associated with the new regulation to be entered, at 1120B, as illustrated in
In the manner set forth above with reference to
Upon resolution of any blocking condition, the multi-step workflow process 1110 can determine whether any rework is needed for the work request, at 1130F. If the work request requires any reworking, the multi-step workflow process 1110 can flag the work request for rework, at 1130G, and return the work request to the step of creating a work request associated with a new regulation, at 1120. If the work request does not require any reworking, the multi-step workflow process 1110 can determine whether each required field and/or a checklist have been entered for the work request, at 1130H. In selected embodiments, the work request cannot be further processed via the multi-step workflow process 1110 if at least one required field and/or the checklist have been not entered in the manner set forth above with reference to
In selected embodiments, the multi-step workflow process 1110 can parse the work request, at 1140, in the manner shown in
The parsed work request cannot be further processed, at 1140E, via the multi-step workflow process 1110 until the blocking condition is resolved and/or the parsed work request can be flagged as not being blocked. Upon resolution of any blocking condition, the multi-step workflow process 1110 can determine whether each required field and/or a checklist have been entered for the parsed work request, at 1140F. In selected embodiments, the parsed work request cannot be further processed via the multi-step workflow process 1110 if at least one required field and/or the checklist have been not entered in the manner set forth above with reference to
In the manner set forth above with reference to
Upon resolution of any blocking condition, the multi-step workflow process 1110 can determine whether any rework is needed for the work request, at 1150F. If the work request requires any reworking, the multi-step workflow process 1110 can flag the work request for rework, at 1150G, and return the work request to the step of parsing a work request associated with a new regulation, at 1140. If the work request does not require any reworking, the multi-step workflow process 1110 can determine whether each required field and/or a checklist have been entered for the work request, at 1150H, in the manner discussed in more detail above with reference to
In selected embodiments, the multi-step workflow process 1110 can map the work request, at 1160, in the manner shown in
Once any parsing issues in the mapped work request have been resolved, the multi-step workflow process 1110 can determine whether a blocking condition exists for the work request, at 1160G. If a blocking condition exists, the work request can be flagged as being blocked, at 1160H. The work request cannot be further processed, at 11601, via the multi-step workflow process 1110 until the blocking condition is resolved and/or the work request can be flagged as not being blocked. Upon resolution of any blocking condition, the multi-step workflow process 1110 can determine whether each required field and/or a checklist have been entered for the parsed work request, at 1160J. In selected embodiments, the parsed work request cannot be further processed via the multi-step workflow process 1110 if at least one required field and/or the checklist have been not entered in the manner set forth above with reference to
If the mapped work request is to be reviewed, at 1170, the mapped work request can be reviewed in any suitable manner. An exemplary embodiment of reviewing the mapped work request, at 1170, is illustrated in
Once any parsing or mapping issues in the mapped work request have been resolved, the multi-step workflow process 1110 can determine whether a blocking condition exists for the work request, at 1170G. If a blocking condition exists, the work request can be flagged as being blocked, at 1170H. The work request cannot be further processed, at 11701, via the multi-step workflow process 1110 until the blocking condition is resolved and/or the work request can be flagged as not being blocked. Upon resolution of any blocking condition, the multi-step workflow process 1110 can determine whether each required field and/or a checklist have been entered for the parsed work request, at 11701 In selected embodiments, the parsed work request cannot be further processed via the multi-step workflow process 1110 if at least one required field and/or the checklist have been not entered in the manner set forth above with reference to
The global privacy and data protection framework method 1000 likewise can receive a query from the user 210 about the regulation. In response to the user query, the global privacy and data protection framework method 1000 can retrieve the stored source data and/or other information related to the regulation from the database system 122 and present the retrieved regulation information to the user 210. In selected embodiments, the global privacy and data protection framework method 1000, at 1300, can respond to the user query by generating one or more reports regarding the regulation based upon the stored source data for presentation to the user 210.
The global privacy and data protection framework method 1000, for example, can enable the user 210 to visualize the regulation, at 1300A. In selected embodiments, the regulation can be visualized, at 1300A, via at least one library dashboard, at least one regulation report, at least one impact analysis and/or at least one history report for permitting the user 210 to understand a historic (or prior) state of the source data, a historic (or prior) state of the regulation associated with the source data, and/or a historic (or prior) state of the control framework, without limitation. Stated somewhat differently, the regulation can be visualized, at 1300A, by generating one or more reports based upon the received current source data in the manner discussed in more detail with reference to
Additionally and/or alternatively, the global privacy and data protection framework method 1000 can retrieve the stored regulation information, at 1300B, and generate a framework report from the retrieved regulation information, at 1300C. The global privacy and data protection framework method 1000 optionally can perform an analysis of the stored regulation information, at 1300D, and/or perform a comparison between the stored regulation information associated with two or more versions of the regulation, at 1300E. In selected embodiments, the global privacy and data protection framework method 1000 advantageously can use the same system (or circuit) components for retrieving the regulation information and presenting the retrieved regulation information to the user 210.
Additionally and/or alternatively, the global privacy and data protection framework method 1000 can receive, at 1100 (shown in
Turning to
The workflow process 1180 can create the work request associated with the changed regulation, at 1182, in any suitable manner. An exemplary embodiment of creating the work request, at 1182, is illustrated in
In the manner set forth above with reference to
In selected embodiments, the workflow process 1180 can comprise a multi-step workflow process 1190 as illustrated in
The multi-step workflow process 1190 optionally can include reviewing the work request after being created, at 1184, parsed, at 1140, and/or mapped, at 1160.
Accordingly, the global privacy and data protection framework method 1000 can initially receive and process first source data associated with a predetermined regulation and subsequently receive and process second source data also associated with the predetermined regulation. The multi-step workflow process 1110, in other words, can govern how the source data is received, reviewed and/or edited, such as before the received source data is acceptable by the user 210 (shown in
An exemplary method for sequentially receiving the source data, at 1100, as the predetermined regulation changes over time is illustrated in
If the predetermined regulations changes, the global privacy and data protection framework method 1000 can create a second work request, at 11822, for second source data associated with the changed predetermined regulation in the manner discussed in more detail above with reference to
The global privacy and data protection framework method 1000 can continue to create additional work requests for subsequent source data associated with further changes to the predetermined regulation. For example, if the predetermined regulations further changes N times, the global privacy and data protection framework method 1000 can create an Nth work request, at 1182N, for the Nth source data associated with the further-changed predetermined regulation in the manner discussed in more detail above with reference to
In selected embodiments, the global privacy and data protection framework method 1000 can create and/or refresh the versions of the control framework if the source data and/or the regulation associated with the source data is updated or otherwise changes. The versions of the control framework can be updated automatically and/or manually. Stated somewhat differently, the global privacy and data protection framework method 1000 can include an automatic refresh mode and/or a manual refresh mode.
In the automatic refresh mode, the global privacy and data protection framework method 1000 can automatically create a new version of the control framework and/or refresh an existing version of the control framework upon detecting that the source data and/or the regulation associated with the source data has changed and/or in accordance with a predetermined time schedule, such as periodically. Alternatively, in the manual refresh mode, the global privacy and data protection framework method 1000 can the new version of the control framework can be created and/or the existing version of the control framework can be refreshed manually, such as by initiation by the user 210.
If an exemplary control framework comprises one hundred regulations and one of the regulations of the control framework changes, the global privacy and data protection framework method 1000 can create a new version of the control framework. The global privacy and data protection framework method 1000 can create a new version of the control framework automatically in the automatic refresh mode and/or manually in the manual refresh mode. Thereby, the global privacy and data protection framework method 1000 advantageously can be continuously updated with the latest regulatory requirements.
Turning to
If a second version of the first source data associated with a change to the first regulation becomes available, a second version of the control framework, at 1250C, can be created with the second version of the first source data associated with the first data source system 300. The second version of the control framework, at 1250C, can maintain the Nth version of the second source data since the second source data did not change in this example. A work request associated with the changed first regulation can be processed, at 1222, updating an existing source data entry for an existing data source system 300. The updated source data entry can be included as a second version of the control framework, at 1222A.
As shown in
In the manner discussed above with reference to
If the received source data indicates a change to the source data and/or a change to the regulation associated with the source data, the new version of the changed existing regulation can be stored with all details and related data as a snapshot with a specific version number defined in the database system 122. The records in the version object thereby can be used throughout the global privacy and data protection framework method 1000 to perform an impact analysis between two selected versions of the control framework, two selected versions of the source data and/or two selected versions of the regulation associated with the source data. The resultant impact analysis can present how the control framework, the source data and/or the regulation associated with the source data has changed over time. A flag in the versioning table of the database system 122 can track the status of each relevant regulation and/or the status of each relevant external data source system 300. The flag, for example, can indicate that a relevant regulation and/or external data source system 300 is active for new and/or changed regulations, that the relevant external data source system 300 is inactive for deactivated data source systems 300 and/or that the relevant external data source system 300 is deleted for deleted data source systems 300.
The database versioning can be performed in any suitable manner. An exemplary method for updating source library, at 1200, and otherwise performing database versioning is illustrated in
Storing the metadata information, at 1211, is shown in
As illustrated in
Storing the modification information, at 1215, can include, but is not limited to storing source identification information, modification type identification information, modification level justification information, referenced source identification information and/or source level justification information for the relevant source regulation. Storing the provision information, at 1216, for example, can include storing source identification information, provision identification information, provisional clause information and/or row number information, without limitation, for the relevant source regulation, and/or storing the provision control information, at 1217, can include, but is not limited to, storing provision control identification information, source identification information, provision identification information, control number information, deviation information and/or exception information for the relevant source regulation.
As shown in
The created, updated, deactivated, reactivated and/or deleted source data entry can be further processed prior to submission. At 1226, for example, the created source data entry can be filled in with new data source system information and/or the updated source data entry can be filled in with changed data source system information. The created, updated, deactivated, reactivated and/or deleted source data entry can be submitted, at 1227. The method 1200, at 1202, can include updating request data of the relevant data source system 300.
The current (or latest) source data for the data source system 300 associated with the work request can be stored, at 1230, in a work request table set. The work request table set, at 1230, preferably stores one record for each work request. As shown in
Storing the metadata request information, at 1231, is shown in
As illustrated in
Storing the modification request information, at 1235, can include, but is not limited to storing work request identification information, source identification information, modification type identification information, modification level justification information, referenced source identification information and/or source level justification information for the relevant work request. Storing the provision control request information, at 1236, can include storing work request identification information, provisional row number information, provisional clause information, control number information, deviation information, exception information, provision identification information and/or provision control identification information for the relevant work request, without limitation.
The relevant version of the source data for the selected data source systems 300 can be stored, at 1240, as a source version table set. The source version table set, at 1240, preferably stores one record for each of the selected data source systems 300. As shown in
Storing the metadata version information, at 1241, is shown in
As illustrated in
Storing the modification version information, at 1245, can include, but is not limited to storing source identification information, version number information, modification type identification information, modification level justification information, referenced source identification information and/or source level justification information for the selected data source system 300. Storing the provision version information, at 1246, for example, can include storing source identification information, version number information, provision identification information, provisional clause information and/or row number information, without limitation, for the selected data source system 300, and/or storing the provision control version information, at 1247, can include, but is not limited to, storing provision control identification information, source identification information, version number information, provision identification information, control number information, deviation information and/or exception information for the selected data source system 300.
A version number can be generated for the source data of each selected data source system 300 can be generated, at 1204D, and/or each selected data source system 300 can be checked against the related control framework, at 1204E. At 1204F, a source refreshed flag for each selected data source system 300 can be updated to a true state. As shown in
Additionally and/or alternatively, storing framework identification information, at 1250, can include setting a source refreshed flag for indicating whether the relevant control framework can be refreshed because one or more selected data source systems 300 associated with the control framework has been updated and/or setting an auto-refresh flag for indicating whether the control frame work can be automatically refreshed when downloaded and/or during a scheduled control framework refresh job. The source refreshed flag and the auto-refresh flag preferably default to an off or false value.
In selected embodiments, a framework refresh job can be scheduled for the relevant control framework, at 1205A. The framework refresh job, for example, can be scheduled to be performed once or repeatedly at a predetermined day and time. If the source refreshed flag is set, at 1205B, and the auto-refresh flag is set, at 12050, a framework filter selected at the moment that the relevant control framework was last updated can be retrieved, at 1205F. The relevant control framework optionally can be manually refreshed, at 1205D. If the source refreshed flag is set, at 1205E, the framework filter likewise selected at the moment that the relevant control framework was last updated can be retrieved, at 1205F.
The latest relevant source data of a selected data source system 300 can be matched, at 1205G. At 1205H, selected filter data can be inserted; whereas, at least one result of the selected filter data can be inserted, at 12051. The framework filter mapping for the relevant control framework can be updated, at 1205:1. At 1205K, the latest relevant source data of the selected data source system 300 associated with the relevant control framework can be retrieved.
As illustrated in
Additionally and/or alternatively, a new control framework can be created at 1205Q, and new filter identification information for the new control framework can be created, at 1205R. At 1205S, selected filter data can be inserted based upon the new filter identification information; whereas, at least one result of the selected filter data can be inserted, at 1205T. The framework filter mapping for the new control framework can be inserted, at 1205U. Stated somewhat differently, the control framework, at 1205U, can be associated with the new filter. At 1205K, the latest relevant source data of the selected data source system 300 associated with the new control framework can be retrieved.
Once the latest relevant source data of the selected data source system 300 has been retrieved, the control framework version can be inserted, at 1205V. The relevant data of the control framework version can be stored, at 1260, in a framework version table set. The framework version table set, at 1260, preferably stores a plurality of records for each control framework. Storing the relevant data of the control framework version, at 1260, can include, but is not limited to, storing meta framework version information, at 1261, and/or storing version information of one or more involved data source systems 300, at 1262.
The stored meta framework version information, at 1261, can comprise framework identification information, framework version number information, framework name information, engagement identification information, distribute by information, framework annotation information, file formal information, framework created by information, framework created time information, source catalog identification information, file identification information and/or filter identification information, without limitation, for the control framework version. At 1262 the version information can include framework identification information, framework version number information, source identification information, version number information and/or provisional control identification information for the involved data source systems 300, without limitation.
A mapping relationship between a selected control framework and a filter associated with the selected control framework can be stored, at 1270, in a framework filter mapping table. The framework filter mapping table, at 1270, preferably stores one record for each of the control frameworks. As shown in
Filter data selected by the user 210 (shown in
The control number selected information, at 1291, can comprise filter identification information and/or filter control number value information, without limitation. The domain selected information, at 1292, can include filter identification information and/or filter domain value information, without limitation, and/or the enforcement selected information, at 1293, can include filter identification information and/or filter enforcement source value information, without limitation. At 1294, the region selected information can include, but is not limited to, filter identification information and/or filter region value information; whereas, the subdomain selected information can include, but is not limited to, filter identification information and/or filter subdomain information, at 1285. The baseline selected information, at 1296, can include filter identification information and/or filter baseline value information, and/or the source category selected information, at 1297, can include filter identification information and/or filter user interface source category information, without limitation.
Additionally and/or alternatively, the deviation selected information, at 1298A, can include filter identification information and/or filter deviation value information, without limitation, and/or the domain-subdomain hierarchy selected information, at 1298B, can include filter identification information, filter domain value information and/or filter subdomain information, without limitation. The exception selected information, at 1298C, can comprise filter identification information and/or filter exception value information, without limitation. At 1298D, the region-source enforcement hierarchy selected information can include, but is not limited to, filter identification information, filter region value information, filter source value information, and/or filter enforcement source value information; whereas, the source type selected information can include, but is not limited to, filter identification information and/or filter authoritative type information, at 1298E.
The industry selected information, at 1298F, can include filter identification information and/or filter industry value information, without limitation. At 1298G, the tier selected information can include, but is not limited to, filter identification information and/or filter tier value information, and/or the source selected information can include, but is not limited to, filter identification information and/or filter source value information, at 1299. The source selected information, at 1299, can comprise an external data source system 300 that is selected by the user 210. In selected embodiments, the data source system 300 that is selected by the user 210 can be the only entry point for the framework refresh that is associated with the control framework from the data source system 300.
A result of the filter data selected by the user 210 can be stored, at 1270, in a framework filter show table set. As shown in
The source type selected result information, at 1281, can comprise filter identification information and/or filter authoritative type value information, without limitation. The business process selected result information, at 1282, can include filter identification information and/or filter business process value information, without limitation, and/or the deviation selected result information, at 1283, can include filter identification information and/or filter deviation show value information, without limitation. At 1284, the enforcement selected result information can include, but is not limited to, filter identification information and/or filter enforcement source show value information; whereas, the enforcement selected result information can include, but is not limited to, filter identification information and/or filter region source show value information, at 1285. The subdomain selected result information, at 1286, can include filter identification information and/or filter subdomain show value information, without limitation.
Additionally and/or alternatively, the baseline selected result information, at 1287, can include filter identification information and/or filter baseline value information, without limitation, and/or the control number selected result information, at 1288, can include filter identification information and/or filter control number show value information, without limitation. The domain selected result information, at 1289A, can comprise filter identification information and/or filter domain show value information, without limitation. At 1289B, the exception selected result information can include, but is not limited to, filter identification information and/or filter exception show value information; whereas, the source selected result information can include, but is not limited to, filter identification information and/or filter source show value information, at 1289C. The industry selected result information, at 1289D, can include filter identification information and/or filter tier value information. A filter list by data source system 300 can be retrieved, at 1206A; whereas, a framework list by filter can be retrieved, at 1206B.
In the manner discussed above with reference to
For example, the global privacy and data protection framework method 1000 can receive a query from the user 210 (shown in
The global privacy and data protection framework method 1000 can maintain the version of the database system 122 (shown in
For example, if the user query comprises a source level user query, the user query, at 1303, can include identification information for one or more data source systems 300, regional and other filter information and a comparison date range with a comparison start date and a comparison end date as shown in
At 1312, a first source version associated with the first version of the identified control framework can be retrieved from the framework version table system 1311; whereas, a second source version associated with the second version of the identified control framework can be separately retrieved from the framework version table system 1311. The first source version associated with the first version of the identified control framework can be designated as a first group of source versions, at 1313, and the second source version associated with the second version of the identified control framework can be designated as a second group of source versions, at 1314.
In selected embodiments, the database versioning and impact analysis method 1390 can include, at 1315, retrieving first control data from the source version table system 1305 for the first version of the identified control framework, and retrieving second control data from the source version table system 1305 for the second version of the identified control framework. The first control data from associated with the first version of the identified control framework can be designated as a first group of control data, at 1317, and the second control data from associated with the second version of the identified control framework can be designated as a second group of control data, at 1318.
The first and second groups of control data optionally can be checked for a control number, at 1319, 1321 and 1323. If a control number exists for both the first and second groups of control data, for example, the control data can be assigned a control status value associated with existing control data, at 1320. At 1322, the control data can be assigned a control status value associated with removed control data if a control number exists only for the first group of control data; whereas, the control data can be assigned a control status value associated with new control data if a control number exists only for the second group of control data, at 1324.
Returning to the first group of source versions, at 1306, the second group of source versions, at 1308, the first group of source versions, at 1313, and the second group of source versions, at 1314, the database versioning and impact analysis method 1390 can determine, at 1325, whether only the second group of source versions, at 1308, or the second group of source versions, at 1314, exist. If only the second group of source versions, at 1308, or the second group of source versions, at 1314, exist, the identified data source system 300 or the data source system 300 associated with the identified control framework can be designed at as a new data source system, at 1326, and can be added to the control framework and/or data source library. The provisions of the data source system 300 can be newly added to the control framework, at 1327, a status of any mapped controls for each provision can be based upon the assigned control status value, at 1328, and/or any deviation and/or exception value related to the mapped controls of each provision can be set to a new status, at 1329.
The database versioning and impact analysis method 1390 alternatively can determine, at 1330, whether only the first group of source versions, at 1306, or the first group of source versions, at 1313, exist. If only the first group of source versions, at 1306, or the first group of source versions, at 1313, exist, the identified data source system 300 or the data source system 300 associated with the identified control framework can be designed at as a removed data source system, at 1331, and can be removed from the control framework and/or data source library. The provisions of the data source system 300 can be removed from the control framework, at 1332, a status of any mapped controls for each provision can be based upon the assigned control status value, and/or any deviation and/or exception value related to the mapped controls of each provision can be set to a removed status, at 1334.
The identified data source system 300 or the data source system 300 associated with the identified control framework otherwise can be deemed, at 1335, to exist in both the first group of source versions, at 1306, or the first group of source versions, at 1313, and the second group of source versions, at 1308, or the second group of source versions, at 1314, as illustrated in
The database versioning and impact analysis method 1390, at 1337, can deem the data source system 300 to have unchanged if the first source version and the second source version are different. At 1338, the database versioning and impact analysis method 1390 can determine whether a first provision exists in the first group of source versions, at 1306, or the first group of source versions, at 1313, and whether a second provision exists in the second group of source versions, at 1308, or the second group of source versions, at 1314. If only the first provision exists, at 1339, a status of the first provision can be set to a removed status with removed control, at 1340, and/or a deviation and/or exception value can be set to a removed status, at 1341. A status of the first provision and a status of the second provision can be set to a new status with mapped control, at 1342, and/or a deviation and/or exception value can be set to a new status, at 1343. A status of any mapped controls for each provision can be based upon the assigned control status value, at 1344.
At 1345, the database versioning and impact analysis method 1390 can determine whether a control number has been new added to, and/or removed from, the first or second provision. Based upon a determination that the control number has been new added to the first or second provision, at 1346, a status of the first provision and a status of the second provision can be set to an existing status with new mapped control, at 1347, and/or a deviation and/or exception value can be set to a new status, at 1348. A status of the first provision and a status of the second provision can be set to an existing status with removed mapped control, at 1349, and/or a deviation and/or exception value can be set to a removed status, at 1350, based upon a determination that the control number has been new added to the first or second provision, at 1346. A status of any mapped controls for each provision can be based upon the assigned control status value, at 1351.
The database versioning and impact analysis method 1390 can determine, at 1352, whether the deviation and/or exception value for the control number associated with the first or second provision has changed. If the deviation and/or exception value for the control number associated with the first or second provision has changed, the first provision and the second provision can be assigned a control status value associated with existing control data, at 1353, and/or a deviation and/or exception can be added to, and/or removed from, the control number of the provision. The first or second provision been deemed as being unchanged, at 1354, if the deviation and/or exception value for the control number associated with the first or second provision has not changed.
As illustrated in row 521 of the table 500, a first version of the relevant control framework was created on September 1 and includes a first version of source data from a first data source system 300, a second version of source data from a fifth data source system 300 and a first version of source data from a seventh data source system 300. Row 522 of the table 500 shows that the relevant control framework was updated to include a third version of source data from the first data source system 300, the second version of source data from the fifth data source system 300 and a first version of source data from a ninth data source system 300 on October 1. On November 1, the relevant control framework was deleted as shown in row 523. At the time of deletion, the relevant control framework included the third version of source data from the first data source system 300, the second version of source data from the fifth data source system 300 and the first version of source data from the ninth data source system 300.
Turning to
A fifth date range between September 30 and October 30 is associated with column 616; whereas, a sixth date range between September 30 and November 30 is associated with column 617. Column 618 is shown as being associated with a seventh date range between October 30 and November 30, and column 619 is associated with the dates of November 30 and December 30. Row 622 shows comparisons of the relevant control framework versions for each of the respective dates and date ranges; whereas, row 623 shows comparisons of the data source versions comprising the relevant control framework versions for each of the respective dates and date ranges.
As set forth in column 613 of table 600, the version of the relevant control framework at an end of the second date range is compared with the version of the relevant control framework at a beginning of the second date range. In other words, the first version of the relevant control framework available on September 30 is compared with the version of the relevant control framework on July 30. Since table 1 shows that no version of the relevant control framework was available on July 30, the first version of the relevant control framework is shown as being a new control framework that comprises a first version of a new control frame work during the second date range and comprises the first version of source data from the first data source system 300, the second version of source data from the fifth data source system 300 and the first version of source data from the seventh data source system 300. Each of the source systems associated with the first version of the relevant control framework are deemed as comprising a new source system during the second date range since table 1 shows that no version of the relevant control framework was available on July 30.
Column 614 of table 600 shows a comparison of the second version of the relevant control framework available on October 30 with the version of the relevant control framework on July 30. The comparison of column 614 does not show the second version of the relevant control framework as comprising a new control framework due to the existence of the prior first version of the relevant control framework. Since table 1 shows that no version of the relevant control framework was available on July 30, the second version of the relevant control framework is shown as including the third version of source data from the first data source system 300, the second version of source data from the fifth data source system 300 and the first version of source data from the ninth data source system 300. Each of the source systems associated with the second version of the relevant control framework are deemed as comprising a new source system during the third date range since table 1 shows that no version of the relevant control framework was available on July 30.
Turning to column 615 of table 600, a comparison of the third version of the relevant control framework available on November 30 with the version of the relevant control framework on July 30 is illustrated. The comparison of column 615 does not show the third version of the relevant control framework as comprising a new control framework due to the existence of the prior first version of the relevant control framework but instead shows the third version of the relevant control framework as comprising a deleted control framework because the third version was deleted on November 1. Since table 1 shows that no version of the relevant control framework was available on July 30, the third version of the relevant control framework is shown as including the third version of source data from the first data source system 300, the second version of source data from the fifth data source system 300 and the first version of source data from the ninth data source system 300. Each of the source systems associated with the third version of the relevant control framework are deemed as comprising a removed source system during the third date range since the third version was deleted on November 1.
Column 616 of table 600 shows a comparison of the second version of the relevant control framework available on October 30 with the first version of the relevant control framework available on September 30. The comparison of column 616 does not show the second version of the relevant control framework as comprising a new control framework due to the existence of the first version of the relevant control framework. Relative to the first version of the relevant control framework, the second version of the relevant control framework added the first version of source data from the ninth data source system 300, changed from the first source data to the third source data of the first data source system 300, removed the first version of source data of the seventh data source system 300 and left the second version of source data from the fifth data source system 300 unchanged as set forth in column 616.
A comparison of the third version of the relevant control framework available on November 30 with the first version of the relevant control framework on September 30 is shown in column 617 of table 600. The comparison of column 617 illustrates that the third version of the relevant control framework comprises a deleted control framework because the third version was deleted on November 1. Relative to the first version of the relevant control framework, the third version of the relevant control framework is shown as including the third version of source data from the first data source system 300, the second version of source data from the fifth data source system 300 and the first version of source data from the ninth data source system 300, each of which is deemed to be removed when the third version of the relevant control framework was deleted on November 1 as set forth in table 500 of
As shown in column 618 of table 600, the third version of the relevant control framework available on November 30 is compared with the second version of the relevant control framework on October 30. The comparison of column 618 shows that the third version of the relevant control framework comprises a deleted control framework because the third version was deleted on November 1. Relative to the second version of the relevant control framework, the third version of the relevant control framework is shown as including the third version of source data from the first data source system 300, the second version of source data from the fifth data source system 300 and the first version of source data from the ninth data source system 300, each of which is deemed to be removed when the third version of the relevant control framework was deleted on November 1 as set forth in table 500 of
In the manner described in more detail above with reference to
The comparison can be adjusted to include source data from one or more predetermined data source systems 300, at 730. The predetermined data source systems 300 can include all available data source systems 300, at 730A, new data source systems 300, at 730B, modified data source systems 300, at 730C, removed data source systems 300, at 730C, and/or unchanged data source systems 300, at 730D, without limitation. One or more filters 710 can determine a scope and/or content of the results comprising the impact analysis report 700. Exemplary filters 710 can include, but are not limited to, region filter 710A, a country filter 710B, a territory filter 710C, a data source category filter 710D, a data source identification information filter 710E, a domain filter 710F, a sub-domain filter 710G, a data source system filter 710H, a control status filter 7101, a deviation status filter 7101 and/or an exception status filter 710K.
As shown in
Additionally and/or alternatively, the impact analysis report 700 can show a number and other summary information for one or more minor deviations, at 733. The summary information for the minor deviations can include a number of new minor deviations, at 733A, a number of removed minor deviations, at 733B, a number of changed minor deviations and/or a number of unchanged minor deviations, at 733C, without limitation. The impact analysis report 700, in selected embodiments, can include a number and other summary information for one or more exceptions, at 734. The summary information for the exceptions can include a number of new exceptions, at 734A, a number of removed exceptions, at 734B, a number of changed exceptions and/or a number of unchanged exceptions, at 734C, without limitation.
The impact analysis report 700 of
In selected embodiments, the global privacy and data protection framework method 1000 can enable the user 210 (shown in
The global privacy and data protection framework method 1000, for instance, can include a tagging method 1400 for creating the custom relationships between regulations in the manner shown in
Additionally and/or alternatively, the tagging method 1400 can be associated with a research system (or circuit) 1430 and/or a second process 1440 as illustrated in
The tagging method 1400 advantageously create one or more custom reports based on the tags 1460 in response to the user query about a regulation. In other words, the tags 1460 can form a foundation for creating unique and/or customizable perspectives on regulatory data via the research system 1430. Thereby, the tagging method 1400 can create one or more queryable datasets. Exemplary queryable datasets can comprise, but are not limited to, a list of regulations applicable to a topic area, such as the regulation.
The categories 1450 and/or subcategories 1455 can be created and managed in any suitable manner. An exemplary method 1402 for managing the categories 1450 and/or subcategories 1455 is shown in
Each category 1450 and/or subcategory 1455 can be associated with at least one tag 1460. As illustrated in
In selected embodiments, the method 1402 can enable the user 210 to interact with a suitable user interface system (not shown) for creating a new category 1450 and/or for creating a new subcategory 1455 under a relevant category 1450. The user interface system can include an icon, button or other interact mechanism that can be activated to create the new category 1450 and/or new subcategory 1455. Existing categories 1450 and/or subcategories 1455 similarly can be modified and/or removed via the user interface system. An existing subcategory 1455 under a first category 1450 optionally can be moved from the first category 1450 to a second category 1450. In selected embodiments, the existing subcategory 1455 can be dragged from the first category 1450 and dropped into the second category 1450 via the user interface system.
The user interface 1490 can enable the user 210 to associate the search results 1491 with at least one tag 1460 in any suitable manner. For example, the user interface 1490 can enable the user 210 to select at least one search result 1491A for tagging and to activate Find & Add Tags control indicia 1480. Activation of the Find & Add Tags control indicia 1480 can permit the user 210 to identify one or more relevant tags 1460 by filtering a listing of available tags 1460 by category 1450 and/or subcategory 1455. Additionally and/or alternatively, the user interface 1490 can include search indicia 1482 for initiating a search among the listing of available tags 1460 to identify the relevant tags 1460. Once identified, the relevant tags 1460 can be selected for association with the selected search result 1491A via activation of tag addition control indicia 1484.
As illustrated in
The global privacy and data protection framework method 1000 can be implemented in any suitable manner. For example, the global privacy and data protection framework method 1000 can comprise a computer-implemented method and/or can be provided as a computer program product being encoded on one or more non-transitory machine-readable storage media. An exemplary embodiment of a global privacy and data protection framework system (or circuit) 100 is illustrated in
The user management system 110 can comprise a forward proxy server for allowing multiple clients to route traffic to an external network of the global privacy and data protection framework system 100. For example, the user management system 110 can be configured to communicate with at least one data source system 300 and, in the manner discussed in more detail herein, to receive regulatory or other source data from the data source system 300. The source data, for example, can include current source data associated with a regulation and/or updated source data associated with any change to the regulation over time.
In selected embodiments, the user management system 110 can comprise an authentication solution that can support, for example, user registration, user login and other user management processes for the global privacy and data protection framework system 100. The user management system 110 thereby can permit communication with a user processing device 200 associated with the user 210. The user processing device 200 can comprise a computer server system, a personal computing system, laptop computing system, tablet computing system, mobile telephone system or any other conventional type of processing device for enabling the user 210 to communicate with the user management system 110. For example, the user 210 can enter a user query.
The data management system 120 can include a database system (or circuit) 122 and can handle management functions for the database system 122, which can store the received source data associated with the regulations and provide the stored source data upon request. For example, the data management system 120 can store data models and attend to related data model functions. In selected embodiments, the data management system 120 can comprise an object storage solution for the cloud and/or can store massive amounts of unstructured source data and other data. Additionally and/or alternatively, the data management system 120 can include a cache for storing static source data and other data to improve data retrieval efficiency. The data management system 120 optionally can send electronic mail (or email) messages, preferably without maintaining a separate email server.
In selected embodiments, the global privacy and data protection framework method 1000 can include an optional deployment system 130 and/or an optional report generation system 140 as illustrated in
The report generation system 140 can help facilitate analysis of the received source data and other data associated with the data protection framework system 100 and/or to provide related business intelligence. For example, the report generation system 140 can help visualize the received source data and other data associated with the data protection framework system 100 for facilitating data analysis and business intelligence.
As shown in
In selected embodiments, the front end system 150 can help the global privacy and data protection framework system 100 implement automatically refreshed scheduled tasks and/or advantageously can be used with any server system that can serve static files and can be used to display visualization in one or more components of the global privacy and data protection framework system 100. The front end system 150 optionally can enable the global privacy and data protection framework system 100 optionally can display flexible tables during source mapping as shown and described herein with reference to
The user tracking system 160 can track online visits to one or more websites and display reports on these visits for analysis. The displayed reports advantageously can provide insights into user behavior and access that inform development strategy and security for the global privacy and data protection framework system 100. Additionally and/or alternatively, the user tracking system 160 can provide a better understanding about how the user 210 interacts with specific components of the global privacy and data protection framework system 100 and inform development strategy for the global privacy and data protection framework system 100.
Additionally and/or alternatively, the backend system 170 create applications that can be run via the global privacy and data protection framework system 100 without dependencies and/or map Java objects to one or more database models. The backend system 170 optionally can enable the global privacy and data protection framework system 100 to generate and/or read selected files, such as files in a portable document format (or .pdf) and/or files in a Microsoft Excel format. In selected embodiments, the backend system 170 can provide a trace log. The backend system 170 of
In selected embodiments, the global privacy and data protection framework system 100 can enable the user 210 (shown in
Turning to
The data management system 120 of
The data management system 120 of
The optional deployment system 130 of
A JFrog system (or circuit) 136 is available from JFrog of Sunnyvale, Calif., and can help manage binaries and artifacts in the application development process. The JFrog system 136, for example, can automate the application development and/or release process. The deployment system 130 likewise is shown as comprising an Azure Kubernetes Services system (or circuit) 138. The Azure Kubernetes Services system 138 is available from Microsoft Corporation of Redmond, Wash., and can help leverage built-in code-to-cloud pipelines and guardrails to deploy the code local processing systems (or circuits) and/or the Github management tool system 132 to cloud infrastructure.
As shown in
The front end system 150, in selected embodiments, can include an Angular code platform and framework system (or circuit) 151. The Angular code platform and framework system 151 is available from the Angular team at Google LLC of Mountain View, Calif., and can help facilitate development of the global privacy and data protection framework system 100 in Hypertext Markup Language (or HTML) and/or TypeScript 152. TypeScript 152 is a superset of typed JavaScript that can be used to build and/or manage large-scale JavaScript projects and developed by Microsoft Corporation of Redmond, Wash. As shown in
A Cron template framework system (or circuit) 154 is a simple asynchronous template framework system for a node and is available from Cron Inc. of San Francisco, Calif. The Cron template framework system 154 can be included with the front end system 150 and can help the global privacy and data protection framework system 100 implement automatically refreshed scheduled tasks. Additionally and/or alternatively, the front end system 150 can comprise a Highcharts library system (or circuit) 155 as illustrated in
The Highcharts library system 155 is solely based on native browser technologies, and all core functionality runs in the browser. As front-end library, the Highcharts library system 155 advantageously can be used with any server system that can serve static files and can be used to display visualization in one or more components of the global privacy and data protection framework system 100. The front end system 150 optionally can include an AG Grid system (or circuit) 156, which is available from GitHub, Inc., of San Francisco, Calif. The AG Grid system 156 is a fully-featured and highly customizable JavaScript data grid and can be used to display flexible tables during source mapping as shown and described herein with reference to
The backend system 170 of
A schedule job system (or circuit) 175 optionally can be included in the backend system 170. The backend system 170 can comprise a Tika system (or circuit) 176. The Tika system 176 can be used to enable the global privacy and data protection framework system 100 to generate and/or read portable document format (or .pdf) files and is available from Apache Software Foundation in Forest Hill, Md. Additionally and/or alternatively, the backend system 170 can include an OWASP Enterprise Security API (or ESAPI) system (or circuit) 177 that is available from the OSWAP Foundation of Wakefield, Md., and can be used by the global privacy and data protection framework system 100 to provide a trace log. The backend system 170 of
In selected embodiments, one or more of the features disclosed herein can be provided as a computer program product being encoded on one or more non-transitory machine-readable storage media. As used herein, a phrase in the form of at least one of A, B, C and D herein is to be construed as meaning one or more of A, one or more of B, one or more of C and/or one or more of D. Likewise, a phrase in the form of A, B, C or D as used herein is to be construed as meaning A or B or C or D. For example, a phrase in the form of A, B, C or a combination thereof is to be construed as meaning A or B or C or any combination of A, B and/or C.
The disclosed embodiments are susceptible to various modifications and alternative forms, and specific examples thereof have been shown by way of example in the drawings and are herein described in detail. It should be understood, however, that the disclosed embodiments are not to be limited to the particular forms or methods disclosed, but to the contrary, the disclosed embodiments are to cover all modifications, equivalents, and alternatives.
This application claims the benefit of, and priority to, U.S. Provisional Application Ser. No. 63/254,951, filed Oct. 12, 2021, the disclosure of which is hereby incorporated herein by reference in its entirety and for all purposes.
Number | Date | Country | |
---|---|---|---|
63254951 | Oct 2021 | US |