Method and apparatus to define and justify policy requirements using a legal reference library

Information

  • Patent Grant
  • 8204869
  • Patent Number
    8,204,869
  • Date Filed
    Tuesday, September 30, 2008
    16 years ago
  • Date Issued
    Tuesday, June 19, 2012
    12 years ago
Abstract
A computer-implemented system and method for defining and justifying policy requirements includes: a hierarchical regional mapping (HRM) module provides a common language and a hierarchical model for geography and for jurisdictions; a legal references library (LRL) module contains applicable legal references; a legal references policy mapping (LRPM) module maps legal references to policies; and a requirements cross-checking (RCC) module cross-checks information in the legal references policy mapping module.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


This invention relates to methods and apparatus using software for governance of organization policies.


2. Prior Art


Previously, data for policy governance was usually maintained using spreadsheets, in which legal references relating to policies were by name and which quickly got out of date. More complete libraries of legal references were available but were focused only on managing those legal references and are not focused on policy development, policy cross references, or analysis. Also, they usually contain a large subset of all legal references applicable in a large jurisdiction, and are not tuned, formatted or tagged to reflect the need of corporations, but instead reflect the needs of the law services consulting companies that provide services to these corporations. Codification of jurisdictional coverage is often different between publishers of legal references and legal consultants. Organizations and companies are often left with their own resources to derive policies in an ad-hoc manner, which often results in partial, inefficient, or unreliable execution of legal processes. This puts an organization at greater risk of being unable to justify their policies when challenged so that they may incur fines, penalties, reprimands, or other public relationship embarrassments, all of which can seriously impact company business.


SUMMARY OF THE INVENTION

The present invention reduces the risk and costs associated with the definition, justification and defense of any company policies based on legal references provided by any law, rule, guideline, or other legal requirement. First, it enables a more thorough, quicker, and cheaper process to identify relevant legal references by matching related geographic areas of application. Second, it greatly simplifies the process of identifying potentially conflicting or disparate requirements from different legal references in order to facilitate the decision process regarding which requirements should be explicitly followed. Third, it provides more robust documentation and tracking of the decisions that were made, and can assist in preventing and detecting inconsistencies or human errors during that process. As a result, any organization taking advantage of the present invention will benefit from having a cheaper, faster, and more reliable process to define and maintain policies requirements, which in turn decrease exposure from non-compliance. The present invention also provides more consistent and defensible documentation for the justification for policies and significantly reduces risk in case of legal challenges to those policies.


The present invention provides a computer-implemented system and method for defining and justifying policy requirements. A hierarchical regional mapping (HRM) module provides a common language and a hierarchical model for geography and for jurisdictions. A legal references library (LRL) module contains applicable legal references. A legal references policy mapping (LRPM) module maps legal references to policies. A requirements cross-checking (RCC) module cross-checks information in the legal references policy mapping module.


According to various aspects of the invention, the legal references policy mapping (LRPM) module: provides for creating and maintaining a list of legal references that apply to a given policy; provides for identifying which type of requirement for a given policy is influenced by a given legal references; and provides which of the legal references are to be controlling for a given policy.


According to various other aspects of the invention, the requirements cross-checking (RCC) module provides for creating and maintaining a model of the dependencies and compatibility between structured parameters used to describe each category of requirements; provides, within each category of requirements, consolidation of all controlling requirements and comparison of them to a policy requirement using an understanding of the relationships between parameters and options; provides, within each category of requirements, consolidation of the sum of all requirements to allow easy review and evaluation of the compromises that were made between the policy requirement and the sum of all requirements that were applicable; and provides cross-checking of a geographic region and jurisdiction associated with a policy and its related legal references to detect inconsistency that would uncover human error.


According to various other aspects of the invention, the hierarchical regional mapping (HRM) module provides representation of the different jurisdictions and sub-jurisdictions that an organization operates in and representation of regulatory or governing bodies within the different jurisdictions; and provides an explicit naming/referencing scheme in which nodes are specified by a hierarchical path.


According to various other aspects of the invention, the legal references library (LRL) module provides for each legal reference a geographic region or jurisdiction that the reference applies to as defined by one or more nodes within a hierarchy defined by the HRM module; and provides for each reference a classification tag that reflects the source of a requirement and the domain of application of the requirements within the organization.


According to various other aspects of the invention the domain of application includes one or more of the following: preservation requirements, retention, data privacy, or security designations.





BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention:



FIG. 1 is an overall system diagram illustrating a system for defining and justifying policy requirements using a legal reference library.



FIG. 2 is a diagram illustrating a hierarchical regional mapping module (HRM) and its interaction with a module for a common language and a model for geography and jurisdictions.



FIG. 3 is a diagram illustrating a legal reference library module (LRL) and its interaction with a legal reference module.



FIG. 4 is a diagram illustrating a legal reference to policy mapping module (LRPM) and its interaction with a module for mapping of legal references to policies.



FIG. 5 is a diagram illustrating a requirement cross check module (RCC) and it interaction with the module for mapping of legal references to policies.





DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

Reference is now made in detail to preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention is described in conjunction with the preferred embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims.


In the current global economy, any organization, enterprise, public agency, etc.—herein after referred to as “the company”—must define, justify, implement and insure compliance with a broad range of policies. Depending on its size, its scope of activity, and the different jurisdictions that it operates in, the company may need to define thousands, if not tens of thousands, of different instances of policies. Some of these policies are likely to be challenged by other parties, either regulators, government agencies, shareholders, current and past employees, or other third parties. It is in the best interest of the company to use a precise, efficient, and defensible process to define and justify its policies. This process should fulfill several needs. One need is to document those legal references that are used as references or sources for justifying a policy. Note that in this context, “legal reference” is used as a generic term to encompass any law texts, opinions on law texts, other internal company protocols or practices, or any other reference used to justify some or all aspects of a policy. The process should help to quickly identify which legal references are relevant to a specific policy. The process should document which aspect of a policy is governed by specific related legal references. The process should document which specific legal references that the company selects as governing in those cases where the requirements of different legal references are conflicting or open to various interpretations. The process should proactively detect potential inconsistencies or other human errors when compiling legal requirements into policy requirements. The present invention provides a process and a computer-implemented software tool for enabling and supporting the efficient and reliable execution of this process.



FIG. 1 shows an overview of a system 10 and a process for defining and justifying policy requirements. The system 10 and process has four different data units that represent data created by four modules. A common language/jurisdiction data unit 12 provides information to a legal references library data unit 14 and to a policies data unit 16. A mapping data unit 18 maps legal references to policies. The common language/jurisdiction data unit 12 provides for the creation and maintenance of a common language and also provides a model to describe geographical areas of application for legal references and policies.


The four modules includes a hierarchical region mapping module (HRM) 20 defines a common hierarchy of jurisdiction or other geographic areas that are used to define the scope of application of all legal references and policies. A legal reference library module (LRL) 22 captures, manages, and maintains the definitions of all legal references that the company may need to refer to in order to define and justify its policies. A legal reference to policy mapping module (LRPM) 24 is used to define the relationship between any policy and its related legal references. A requirement cross check module (RCC) 26 performs cross check validation of the requirements defined in all related legal references against the requirements defined in the policy that they are related to, with the purpose of detecting inconsistency and minimizing errors. Some of the validations are performed automatically, others are assisted by the tool but may require human judgment to complete the validation. Validation includes change management and analytics as well as audits.


Laws and regulations apply only within the jurisdiction of the agency or governing body that has defined them, for example, all countries of the European Union, a specific country, or a specific U.S. state. Similarly, policies usually apply only within a specific geographical region, country, state, or some arbitrary region defined by the company, such as, for example, “North East Asia”. To insure that policies and legal references are properly defined and to insure that proper legal references are used to justify their matching policies, it is very important to make sure their geographical regions of application are consistent. It is difficult to do that if the scopes of application are defined using different terminology. The hierarchical region mapping module (HRM) 20 unifies them into a single hierarchy of all applicable “geographic” regions, either jurisdiction-based or geography-based, in the common language/jurisdiction data unit 12. The hierarchical region mapping module (HRM) makes comparisons and validation easy and reliable.


The legal references library LRL module 22 provides creation, management, and maintenance of a legal reference data library 14, or of a list of legal references, that contains all applicable legal references. This library allows user to define and track the legal references and some of the key properties of those legal references. One property is the geographic area of application, based on a defined model. Another property is the use of structured definitions of legal reference requirements. In this context, a structured definition is used in the sense of a definition whose semantic meaning can be understood by a software application as the sum of fields, numeric values, options, and other codified semantic information that can be compared, ordered, or otherwise automatically processed by a software application. This is in contrast to a human readable description, such as, for example, free form text using English sentences, which are easily understood by a person but have no meaning for a software application. Links are provided to other related legal references that define similar requirements in the same or related geographic area of application.


The Legal References Policy Mapping (LRPM) module 24 defines, manages, and maintains a mapping between legal references and policies in the mapping and legal references data unit 18, while tracking specific properties. One property includes geographic areas of application of the policies, based on the above defined model. Another property is the definition of the applicable requirements such that a related legal reference may define a broad set of requirements, but when applied to a specific policy, only certain of these requirements will truly apply in the context of that policy. Another property is the definition of the governing requirements, also called “trumping legal references.” Out of all the applicable requirements defined by the combined related legal references, some may conflict and some may be judged as being too constraining or less applicable. Consequently the policy requirement are based on only a subset of all applicable requirements called the governing requirements of the governing legal references, while the other requirements are tracked for reference, but are trumped, so to speak, by the governing requirements.


The Requirement Cross Check (RCC) module 26 provides for cross-checking and validation of all applicable and governing requirements from related legal references against the requirement of their matching policy, to insure consistency and detect any human errors. This module also provides for change control throughout the process to deal with changes. These changes include a number of aspects, including: creation or removal of legal references, from either the library, the policies, or the process; replacing an existing legal reference by a new legal reference; changes to the definition of a legal reference, including any requirement or its geographic area of application; changes to a geographic area of policy application, including any refinement or further breakdown of existing policy in more specific geographic areas of application, such as, for example, breakdown down of U.S. federal policy into U.S. states policies; and changes to the trumping legal references.


Hierarchical Region Mapping Module (HRM)


With reference to FIG. 2, the hierarchical region mapping module (HRM) 20 provides the ability to create and maintain a single common hierarchy of geographies and jurisdictions using a create/edit function 20a. The HRM module 20 also includes a browse and search function 20b. The HRM module 20 represents all of the different jurisdictions 32 in which the company operates, including, but not limited to, countries, sub-region within countries (like US states), sub-regions within the sub-region (like US counties), any further sub level as appropriate (sub-sub-sub-region, etc.), or any level of macro-jurisdiction as federation of countries (like the European Union) based on international treaties. The HRM module 20 represents all regulatory or governing body or agencies 34 that control laws or regulations in those jurisdictions.


The HRM module 20 provides the semantics of jurisdiction inheritance that makes it possible to determine a list of all jurisdictions within which the laws for that jurisdiction apply. For example, laws published by a European EU agency are defined in the jurisdiction of the EU, and consequently apply (under the proper treaty) in any EU country and any sub-jurisdiction within any of those countries. As another example, U.S. federal laws by default apply to all U.S. states and to all U.S. counties.


The HRM module 20 represents any arbitrary geographic region 38 defined as the union of multiple existing geographic regions or jurisdictions, or a sub-region of an existing geographic region or jurisdiction. These geographic regions are typically be specific to the business of the company and reflect the fundamental organization of the activity of the company, in different sales regions, or any other business driven geography. For example, the company may have divided their US sales into a few regions like: “East Coast,” “West Coast” and “Central”. Such regions are typically defined as a specific list of U.S. states. As another example, the company may have divided its worldwide sales activity into regions, one of them being “North East Asia,” defined as a list of countries in North East Asia, such as, for example, Japan, South Korea, and Taiwan. The company may not track jurisdiction at a granularity smaller than the state of California, but it may have different branches or sales organization in 3 sub-division of California such as “South”, “Central”, and “North”.


The HRM module 20 provides an explicit naming/referencing scheme so that each node in the hierarchy is named or referenced as a unique node by specifying a complete hierarchical path, starting with a country, or a geographical region or jurisdiction equivalent to the union of multiple countries.


The HRM module 20 insures that all other modules are able to describe where policies and their justifications apply in a fully consistent manner, worldwide, for any type of policy that is either driven by external governing agencies or that is driven by internal company business drivers.


Legal Reference Library Module (LRL)


With reference to FIG. 3, the legal reference library 14 provides a central common repository for all legal references that may be relevant to define, support, relate to, or justify any company policy, process, or practice. The LRL module 22 tracks the various properties for each legal reference. One property includes the geographic region or jurisdiction that a legal reference applies to, where the geographic region or jurisdiction is defined as one node or multiple nodes within the hierarchy defined by the HRM module 20. By leveraging the unified hierarchy provided by the HRM 20, the LRL 22 makes it easy to identify any applicable legal references for any given region or jurisdiction without any of the usual confusion or uncertainty encountered with usual systems where legal references are kept in different repository, using a different geographic hierarchy. The residence of the data or individual can be used to determine the geography and therefore an applicable legal reference and policy.


Classification tags are provided that reflects different fundamental aspects of a legal reference and that include: the category for the source of a requirement, including but not limited to laws or regulations from regulatory or governing bodies and agencies; opinions that are interpretation of laws or regulations from legal experts based on case law or other legal analysis; and internal protocols, or internal requirements defined within the company itself, that behaves as internal laws of the company.


While in common cases legal reference usually belong only to a single category of sources of requirements because they are usually mutually exclusive, legal references can sometimes belong to multiple categories.


The domain of application of the requirements within the company, includes, but is not limited to the following: preservation in the context of legal holds related to E-Discovery; retention both in term of regulatory requirements and internal business requirements; and data privacy, or personal data protection, security, or enforcement of confidentiality and security regulation, or business driven confidentiality and security requirements such as trade secrets. Note that a legal reference can very well define requirements for multiple domains of application.


The level of risk is associated with non compliance. While some regulations have existed for a long time, they may never have been enforced in practice. Other regulations are regularly and aggressively enforced, with certain agencies being especially proactive with regard to using the full extent of the law and with generating strong negative public relations (PR) for violators.


Other classifications arise that are related to the originator of the requirements, or the requirements themselves and provide useful context in their use within the company. These other classifications may be specific to the business of the company, for example: A large government contractor may pay special attention to government contractor regulations and be interested in culling out all legal references related to this topic Classification tags make it much easier and simpler for end users to narrow down their search when looking for applicable requirements within a certain context. They help simplify and humanize often complex legal numbering schemas and languages. They can also be used to perform consistency checks and to automatically flag potential errors.


Requirement definitions, broken down in specific categories, include but are not limited to: Retention rules include any rules related to when and under which condition the relevant information should be disposed of, or how long and under which condition it should be maintained. Such retention rules may vary based on the type of document considered, in the sense of official records, versus draft or courtesy copy.


Disposal protocols specify how the information should be disposed of when its retention period expires, includes the means for and the thoroughness of a destruction process, details process steps in the case of a multi-step disposal process, security, audit and confidentiality requirement in the handling of the disposal process, etc. Handling protocols specify who can access or use the information for what purpose, using an Access Control List or other access control processes, or Security Level Classifications, etc. Storage protocols specify any restrictions on where and how the information should be stored, encryption requirements, etc. Transport protocols specify any process requirements on how to move or copy the data between different storage systems.


It is to the benefit of the company to codify these protocols into a small number of reference protocols, and describe them by reference to a codified version versus including a full description of the protocol potentially different for every legal reference or policy. This codification makes it much easier to interpret the semantic meaning of the requirement automatically and to provide automatic cross-checking and detection of inconsistencies. Codification improves readability for non legal experts. Codification makes it easier to summarize multiple requirements for a single system or class of information. Codification makes it easier to changes the details of one of these protocols consistently independently of which legal references use it. Examples of such codification include retention rules and disposal protocols. Retention rules are defined as sets of a generic rule selected from a list of options (like “permanent”, “Fixed time”, “Trigger event+fixed time”) combined with various parameters as needed (like duration, trigger event). Disposal protocols are defined as a choice form a codified list of applicable options (for example: “Trash”, “Shredding”, “Shred and burn”, etc.).


Related legal references are often defined in the law text themselves. Capturing those related legal references in the LRL module enables: easier and faster cross reference during research; simplification of cross-referencing and cross-inclusion of legal references (with related legal references) when applicable; insuring that all applicable legal references are indeed tracked within the LRL; determination of trumping legal references.


The LRL module 22 also provides full search capabilities leveraging all of the detailed information and context on each legal reference to make it easy for an end user to identify relevant legal references in any given context. Details of the search capabilities correspond to the data model captured above, and leveraging the capability of the HRM module to identify all applicable jurisdictions upstream or downstream from a specific geography, such as, for example, any laws that can apply to any part of Germany, or all laws applying to a specific sub-region of Germany.


Legal Reference to Policy Mapping Module (LRPM)


With reference to FIG. 4, the legal reference to policy mapping module (LRPM) 24 provides several capabilities.


One capability of the LRPM 22 is creation and maintenance 50 of the list of legal references 52 that apply to any given policy 54. In order to identify which legal references may be relevant to which policy, the user will typically leverage multiple sources, including but not limited to: known relevant legal references already attached to similar policy, or same policy as globally defined within a larger jurisdiction (like a global policy for the US, compared to a local policy for just California); potentially relevant policy identified as the result of research using the full search capability of the LRL module, as described above; and legal references related to legal references already attached to a policy, as defined by the LRL module.


Another capability of the LRPM 22 is to identify 56 which type of requirement for a given policy may be influenced by a given legal reference. This is directly aligned with the requirement categorization used by the LRL module, including but not limited to: retention rules; disposal protocols; handling protocols; storage protocols; and transport protocols. This type of mapping is established in different ways, including but not limited to the following: Automatic mapping that is based on which requirements were defined or not defined in the LRL module for that legal reference. Automatic mapping that is based on which classification tags 58 were defined for that legal reference in the LRL module (a retention tagged legal reference should impact retention rules; a privacy tagged legal reference should impact handling and storage protocols, etc.); Explicit mapping by the user, who will designate which of the requirement categories of the policy will be impacted by the given legal reference, including the ability to overwrite the automated mapping described above.


Another capability of the LRPM 22 is to define which of the legal references and optionally, which of their requirements, are considered “controlling” for that policy. This sets the expectation that the requirements defined in the policy should be guided by the controlling legal references, even if some of the other applicable requirements may be even stricter or not really compatible with them. This is especially useful as while policymaker wants to keep track of all legal references that could apply to a given policy, they will often need to make some compromise on how they interpret the sum of these requirements. For example, this is the case where requirements: are stricter than should reasonably need to be followed; apply within a geography or jurisdiction where the activity (and consequently the exposure) of the company is very limited; have never been enforced by their governing body or agency in the past; or are conflicting with other requirements for which the risk is much greater.


By aggregating in a highly structured form a clear definition of the relationships and priorities of the different requirements of different legal references, as they apply to a given policy, the LRPM module 24 provides the very foundation that will enable the RCC module to perform its function; enables the policy makers to clearly document the decisions and compromises made during the process of determining the policy requirements; makes it much easier to defend that process if challenged later; and makes it much easier to maintain that process accurately as legal references and business context continue to evolve over time.


Requirement Cross Check Module (RCC)


With reference to FIG. 5, the requirement cross check module (RCC) module 26 includes a requirement parameter cross-check function 26a, a trumping requirements cross-check function 26b, a requirement consolidation and audit function 26c, and a geographic and cross-check function 26d. The requirement cross check (RCC) module 26 provides several capabilities.


One capability is to create and maintain a model of the dependencies and compatibility between the structured parameters 44 used to describe each category of requirements. An illustrative examples of this includes the disposal protocol requirements for ESI (Electronically Stored Information) may specify 3 options, including simple deletion; digital shredding; and physical destruction of the storage medium. The 3 options can clearly be ordered by increasing levels of enforcement, in the sense that any requirement for simple deletion or digital shredding would be implicitly fulfilled through physical destruction of the storage medium. The ability to represent and understand this order of prevalence between options is key for the RCC module to process the semantic meaning of the requirements, and insure consistency and compliance.


Another capability, as described above, is that a retention rule may be defined as sets of a generic rule selected from a list of options (like “permanent”, “Fixed time”, “Trigger event+fixed time”) combined with various parameters as needed (like duration, trigger event). The ability to understand any implication or inclusion between trigger events (in the sense that occurrence of event A implies that event B already occurred), ability to compared different periods and how to combine those and compare them based on which generic rule applies, would allow the RCC module to compare different retention rules from various legal references and conclude if they appear indeed compatible or not with the resulting policy retention rules.


Within each category of requirements, the RCC module 26 consolidates all controlling requirements 60 and compares them to the policy requirement, using the above defined understanding of relationship between the parameters and options. This may be done in a fully automated way (when full semantic interpretation of the requirement description can be performed, like comparing different retention periods) or in a semi-automated way. For example, the RCC module may compare the trigger events of retention rules and may not be able to compare them to the policy trigger event. In such case, the RCC module may trigger a workflow for an authorized user to review the conflicting requirement parameters and provide legal interpretation, to close the cross-check on trigger further corrective action.


Within each category of requirement, the RCC module 26 also consolidates 54 the sum of all requirements (not just the controlling ones) to allow easy review and evaluation of the compromise that were made between the policy requirement and the sum of all requirements that were applicable in that context.


Cross-check the geographic region and jurisdiction 52 associated to the policy and its related legal references to detect inconsistency that could uncover human errors.


The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.

Claims
  • 1. A computer-implemented system for defining and justifying policy requirements, comprising: a hierarchical regional mapping (HRM) module that provides: a common language, common among geography and different jurisdictions, and a hierarchical model applied to both said geography and different jurisdictions,representation of the different jurisdictions and sub-jurisdictions thereof that an organization operates in and representation of regulatory or governing bodies within the different jurisdictions, andan explicit naming/referencing scheme in which nodes are specified by a hierarchical path of said hierarchical model, wherein each node is named or referenced as a unique node by specifying a complete hierarchical path that starts with a country, or a geographical region or jurisdiction equivalent to a union of multiple countries;a legal references library (LRL) module that contains applicable legal references;a legal references policy mapping (LRPM) module that maps legal references to policies; anda requirements cross-checking (RCC) module that cross-checks information in the legal references policy mapping module.
  • 2. The system of claim 1 wherein the legal references policy mapping (LRPM) module provides for creating and maintaining a list of legal references that apply to a given policy.
  • 3. The system of claim 1 wherein the legal references policy mapping (LRPM) module provides for identifying which type of requirement for a given policy is influenced by a given legal references.
  • 4. The system of claim 1 wherein the legal references policy mapping (LRPM) module provides which of the legal references are to be controlling for a given policy.
  • 5. The system of claim 1 wherein the requirements cross-checking (RCC) module provides for creating and maintaining a model of the dependencies and compatibility between structured parameters used to describe each category of requirements.
  • 6. The system of claim 1 wherein the requirements cross-checking (RCC) module provides, within each category of requirements, consolidation of controlling requirements and comparison of said controlling requirements to a policy requirement using an understanding of the relationships between parameters and options.
  • 7. The system of claim 1 wherein the requirements cross-checking (RCC) module provides, within each category of requirements, consolidation of the sum of all requirements to allow easy review and evaluation of the compromises that were made between the policy requirement and the sum of all requirements that were applicable.
  • 8. The system of claim 1 wherein the requirements cross-checking (RCC) module provides cross-checking of a geographic region and jurisdiction associated with a policy and its related legal references to detect inconsistency that would uncover human error.
  • 9. The system of claim 1 wherein the legal references library (LRL) module provides for each legal reference a geographic region or jurisdiction that the reference applies to as defined by one or more nodes within a hierarchy defined by the HRM module.
  • 10. The system of claim 9 wherein the legal references library (LRL) module provides for each reference a classification tag that reflects the source of a requirement and the domain of application of the requirements within the organization.
  • 11. The system of claim 10 wherein the domain of application includes one or more of the following: preservation requirements, retention, data privacy or security designations.
  • 12. The system of claim 10 wherein the domain of application includes a level of risk associated with non-compliance.
  • 13. The system of claim 10 wherein a requirements definition includes one or more of the following: retention rules, disposal protocols, handling protocols, storage protocols, and transport protocols.
  • 14. The system of claim 9 wherein the legal references library (LRL) module includes referral to related legal references.
  • 15. The system of claim 1 wherein the legal references library (LRL) module is provided with full search capability.
  • 16. A computer-implemented method for defining and justifying policy requirements, comprising the steps of: mapping in a hierarchical regional mapping (HRM) module wherein said HRM provides: a common language, common among geography and different jurisdictions, and a hierarchical model applied to both said geography and different jurisdictions,representation of the different jurisdictions and sub-jurisdictions thereof that an organization operates in and representation of regulatory or governing bodies within the different jurisdictions, andan explicit naming/referencing scheme in which nodes are specified by a hierarchical path of said hierarchical model, wherein each node is named or referenced as a unique node by specifying a complete hierarchical path that starts with a country, or a geographical region or jurisdiction equivalent to a union of multiple countries;providing legal references library (LRL) module that contains applicable legal references;mapping legal references to policies in a legal references policy mapping (LRPM) module; andcross-checking in a requirements cross-checking (RCC) module information in the legal references policy mapping module.
US Referenced Citations (159)
Number Name Date Kind
5355497 Cohen-Levy Oct 1994 A
5608865 Midgely et al. Mar 1997 A
5701472 Koerber et al. Dec 1997 A
5903879 Mitchell May 1999 A
6115642 Brown et al. Sep 2000 A
6128620 Pissanos et al. Oct 2000 A
6151031 Atkins et al. Nov 2000 A
6173270 Cristofich et al. Jan 2001 B1
6330572 Sitka Dec 2001 B1
6332125 Callen et al. Dec 2001 B1
6343287 Kumar et al. Jan 2002 B1
6401079 Kahn et al. Jun 2002 B1
6425764 Lamson Jul 2002 B1
6539379 Vora et al. Mar 2003 B1
6607389 Genevie Aug 2003 B2
6622128 Bedell et al. Sep 2003 B1
6738760 Krachman May 2004 B1
6805351 Nelson Oct 2004 B2
6832205 Aragones et al. Dec 2004 B1
6839682 Blume et al. Jan 2005 B1
6944597 Callen et al. Sep 2005 B2
6976083 Baskey et al. Dec 2005 B1
7076439 Jaggi Jul 2006 B1
7103602 Black et al. Sep 2006 B2
7104416 Gasco et al. Sep 2006 B2
7107416 Stuart et al. Sep 2006 B2
7127470 Takeya Oct 2006 B2
7162427 Myrick et al. Jan 2007 B1
7197716 Newell Mar 2007 B2
7225249 Barry et al. May 2007 B1
7281084 Todd et al. Oct 2007 B1
7283985 Schauerte et al. Oct 2007 B2
7284985 Genevie Oct 2007 B2
7333989 Sameshima et al. Feb 2008 B1
7386468 Calderaro et al. Jun 2008 B2
7433832 Bezos et al. Oct 2008 B1
7478096 Margolus et al. Jan 2009 B2
7502891 Shachor Mar 2009 B2
7512636 Verma et al. Mar 2009 B2
7558853 Alcorn et al. Jul 2009 B2
7580961 Todd et al. Aug 2009 B2
7594082 Kilday et al. Sep 2009 B1
7596541 deVries et al. Sep 2009 B2
7653893 Neumann et al. Jan 2010 B2
7720825 Pelletier et al. May 2010 B2
7730148 Mace et al. Jun 2010 B1
7895229 Paknad Feb 2011 B1
20010053967 Gordon et al. Dec 2001 A1
20020007333 Scolnik et al. Jan 2002 A1
20020010708 McIntosh Jan 2002 A1
20020022982 Cooperstone et al. Feb 2002 A1
20020035480 Gordon et al. Mar 2002 A1
20020083090 Jeffrey et al. Jun 2002 A1
20020091553 Callen et al. Jul 2002 A1
20020095416 Schwols Jul 2002 A1
20020103680 Newman Aug 2002 A1
20020108104 Song et al. Aug 2002 A1
20020119433 Callender Aug 2002 A1
20020120859 Lipkin et al. Aug 2002 A1
20020123902 Lenore et al. Sep 2002 A1
20020143595 Frank et al. Oct 2002 A1
20020143735 Ayi et al. Oct 2002 A1
20020147801 Gullotta et al. Oct 2002 A1
20020162053 Os Oct 2002 A1
20020178138 Ender et al. Nov 2002 A1
20020184068 Krishnan et al. Dec 2002 A1
20020184148 Kahn et al. Dec 2002 A1
20030004985 Kagimasa et al. Jan 2003 A1
20030014386 Jurado Jan 2003 A1
20030018520 Rosenfeld et al. Jan 2003 A1
20030031991 Genevie Feb 2003 A1
20030033295 Adler et al. Feb 2003 A1
20030036994 Witzig et al. Feb 2003 A1
20030046287 Joe Mar 2003 A1
20030051144 Williams Mar 2003 A1
20030069839 Whittington et al. Apr 2003 A1
20030074354 Lee et al. Apr 2003 A1
20030097342 Whittingtom May 2003 A1
20030110228 Xu et al. Jun 2003 A1
20030139827 Phelps Jul 2003 A1
20030229522 Thompson et al. Dec 2003 A1
20040002044 Genevie Jan 2004 A1
20040019496 Angle et al. Jan 2004 A1
20040034659 Steger Feb 2004 A1
20040060063 Russ et al. Mar 2004 A1
20040068432 Meyerkopf et al. Apr 2004 A1
20040088283 Lissar et al. May 2004 A1
20040088332 Lee et al. May 2004 A1
20040088729 Petrovic et al. May 2004 A1
20040103284 Barker May 2004 A1
20040133573 Miloushev et al. Jul 2004 A1
20040138903 Zuniga Jul 2004 A1
20040143444 Opsitnick et al. Jul 2004 A1
20040187164 Kandasamy et al. Sep 2004 A1
20040193703 Loewy et al. Sep 2004 A1
20040204947 Li et al. Oct 2004 A1
20040215619 Rabold Oct 2004 A1
20040260569 Bell et al. Dec 2004 A1
20050060175 Farber et al. Mar 2005 A1
20050071251 Linden et al. Mar 2005 A1
20050074734 Randhawa Apr 2005 A1
20050091076 McGovern Apr 2005 A1
20050114241 Hirsch et al. May 2005 A1
20050144114 Ruggieri et al. Jun 2005 A1
20050165734 Vicars et al. Jul 2005 A1
20050187813 Genevie Aug 2005 A1
20050203821 Petersen et al. Sep 2005 A1
20060036464 Cahoy et al. Feb 2006 A1
20060036649 Simske et al. Feb 2006 A1
20060074793 Hibbert et al. Apr 2006 A1
20060095421 Nagai et al. May 2006 A1
20060126657 Beisiegel et al. Jun 2006 A1
20060136435 Nguyen et al. Jun 2006 A1
20060143248 Nakano et al. Jun 2006 A1
20060149735 DeBie et al. Jul 2006 A1
20060156381 Motoyama Jul 2006 A1
20060167704 Nicholls et al. Jul 2006 A1
20060174320 Maru et al. Aug 2006 A1
20060184718 Sinclair Aug 2006 A1
20060229999 Dodell et al. Oct 2006 A1
20060230044 Utiger Oct 2006 A1
20070016546 De Vorchik et al. Jan 2007 A1
20070048720 Billauer Mar 2007 A1
20070061156 Fry et al. Mar 2007 A1
20070061157 Fry et al. Mar 2007 A1
20070078900 Donahue Apr 2007 A1
20070099162 Sekhar May 2007 A1
20070100857 DeGrande et al. May 2007 A1
20070112783 McCreight et al. May 2007 A1
20070156418 Richter et al. Jul 2007 A1
20070162417 Cozianu et al. Jul 2007 A1
20070208690 Schneider et al. Sep 2007 A1
20070219844 Santorine et al. Sep 2007 A1
20070220435 Sriprakash et al. Sep 2007 A1
20070271517 Finkelman et al. Nov 2007 A1
20070282652 Childress et al. Dec 2007 A1
20070288659 Zakarian et al. Dec 2007 A1
20080033904 Ghielmetti et al. Feb 2008 A1
20080034003 Stakutis et al. Feb 2008 A1
20080059265 Biazetti et al. Mar 2008 A1
20080059543 Engel Mar 2008 A1
20080070206 Perilli Mar 2008 A1
20080148346 Gill et al. Jun 2008 A1
20080195597 Rosenfeld et al. Aug 2008 A1
20080229037 Bunte et al. Sep 2008 A1
20080294674 Reztlaff et al. Nov 2008 A1
20080301207 Demarest et al. Dec 2008 A1
20080319958 Bhattacharya et al. Dec 2008 A1
20080319984 Proscia et al. Dec 2008 A1
20090037376 Archer et al. Feb 2009 A1
20090043625 Yao Feb 2009 A1
20090106815 Brodie et al. Apr 2009 A1
20090119677 Stefansson et al. May 2009 A1
20090150866 Schmidt Jun 2009 A1
20090150906 Schmidt et al. Jun 2009 A1
20090193210 Hewett et al. Jul 2009 A1
20090307743 Azagury et al. Dec 2009 A1
20100070315 Lu et al. Mar 2010 A1
20100094766 Li et al. Apr 2010 A1
Related Publications (1)
Number Date Country
20100082676 A1 Apr 2010 US