1. Field of the Invention
This invention relates to methods and apparatus using software for governance of organization policies.
2. Prior Art
Previously, data for policy governance was usually maintained using spreadsheets, in which legal references relating to policies were by name and which quickly got out of date. More complete libraries of legal references were available but were focused only on managing those legal references and are not focused on policy development, policy cross references, or analysis. Also, they usually contain a large subset of all legal references applicable in a large jurisdiction, and are not tuned, formatted or tagged to reflect the need of corporations, but instead reflect the needs of the law services consulting companies that provide services to these corporations. Codification of jurisdictional coverage is often different between publishers of legal references and legal consultants. Organizations and companies are often left with their own resources to derive policies in an ad-hoc manner, which often results in partial, inefficient, or unreliable execution of legal processes. This puts an organization at greater risk of being unable to justify their policies when challenged so that they may incur fines, penalties, reprimands, or other public relationship embarrassments, all of which can seriously impact company business.
The present invention reduces the risk and costs associated with the definition, justification and defense of any company policies based on legal references provided by any law, rule, guideline, or other legal requirement. First, it enables a more thorough, quicker, and cheaper process to identify relevant legal references by matching related geographic areas of application. Second, it greatly simplifies the process of identifying potentially conflicting or disparate requirements from different legal references in order to facilitate the decision process regarding which requirements should be explicitly followed. Third, it provides more robust documentation and tracking of the decisions that were made, and can assist in preventing and detecting inconsistencies or human errors during that process. As a result, any organization taking advantage of the present invention will benefit from having a cheaper, faster, and more reliable process to define and maintain policies requirements, which in turn decrease exposure from non-compliance. The present invention also provides more consistent and defensible documentation for the justification for policies and significantly reduces risk in case of legal challenges to those policies.
The present invention provides a computer-implemented system and method for defining and justifying policy requirements. A hierarchical regional mapping (HRM) module provides a common language and a hierarchical model for geography and for jurisdictions. A legal references library (LRL) module contains applicable legal references. A legal references policy mapping (LRPM) module maps legal references to policies. A requirements cross-checking (RCC) module cross-checks information in the legal references policy mapping module.
According to various aspects of the invention, the legal references policy mapping (LRPM) module: provides for creating and maintaining a list of legal references that apply to a given policy; provides for identifying which type of requirement for a given policy is influenced by a given legal references; and provides which of the legal references are to be controlling for a given policy.
According to various other aspects of the invention, the requirements cross-checking (RCC) module provides for creating and maintaining a model of the dependencies and compatibility between structured parameters used to describe each category of requirements; provides, within each category of requirements, consolidation of all controlling requirements and comparison of them to a policy requirement using an understanding of the relationships between parameters and options; provides, within each category of requirements, consolidation of the sum of all requirements to allow easy review and evaluation of the compromises that were made between the policy requirement and the sum of all requirements that were applicable; and provides cross-checking of a geographic region and jurisdiction associated with a policy and its related legal references to detect inconsistency that would uncover human error.
According to various other aspects of the invention, the hierarchical regional mapping (HRM) module provides representation of the different jurisdictions and sub-jurisdictions that an organization operates in and representation of regulatory or governing bodies within the different jurisdictions; and provides an explicit naming/referencing scheme in which nodes are specified by a hierarchical path.
According to various other aspects of the invention, the legal references library (LRL) module provides for each legal reference a geographic region or jurisdiction that the reference applies to as defined by one or more nodes within a hierarchy defined by the HRM module; and provides for each reference a classification tag that reflects the source of a requirement and the domain of application of the requirements within the organization.
According to various other aspects of the invention the domain of application includes one or more of the following: preservation requirements, retention, data privacy, or security designations.
The accompanying drawings, which are incorporated in and form a part of this specification, illustrate embodiments of the invention and, together with the description, serve to explain the principles of the invention:
Reference is now made in detail to preferred embodiments of the invention, examples of which are illustrated in the accompanying drawings. While the invention is described in conjunction with the preferred embodiments, it will be understood that they are not intended to limit the invention to these embodiments. On the contrary, the invention is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the invention as defined by the appended claims.
In the current global economy, any organization, enterprise, public agency, etc.—herein after referred to as “the company”—must define, justify, implement and insure compliance with a broad range of policies. Depending on its size, its scope of activity, and the different jurisdictions that it operates in, the company may need to define thousands, if not tens of thousands, of different instances of policies. Some of these policies are likely to be challenged by other parties, either regulators, government agencies, shareholders, current and past employees, or other third parties. It is in the best interest of the company to use a precise, efficient, and defensible process to define and justify its policies. This process should fulfill several needs. One need is to document those legal references that are used as references or sources for justifying a policy. Note that in this context, “legal reference” is used as a generic term to encompass any law texts, opinions on law texts, other internal company protocols or practices, or any other reference used to justify some or all aspects of a policy. The process should help to quickly identify which legal references are relevant to a specific policy. The process should document which aspect of a policy is governed by specific related legal references. The process should document which specific legal references that the company selects as governing in those cases where the requirements of different legal references are conflicting or open to various interpretations. The process should proactively detect potential inconsistencies or other human errors when compiling legal requirements into policy requirements. The present invention provides a process and a computer-implemented software tool for enabling and supporting the efficient and reliable execution of this process.
The four modules includes a hierarchical region mapping module (HRM) 20 defines a common hierarchy of jurisdiction or other geographic areas that are used to define the scope of application of all legal references and policies. A legal reference library module (LRL) 22 captures, manages, and maintains the definitions of all legal references that the company may need to refer to in order to define and justify its policies. A legal reference to policy mapping module (LRPM) 24 is used to define the relationship between any policy and its related legal references. A requirement cross check module (RCC) 26 performs cross check validation of the requirements defined in all related legal references against the requirements defined in the policy that they are related to, with the purpose of detecting inconsistency and minimizing errors. Some of the validations are performed automatically, others are assisted by the tool but may require human judgment to complete the validation. Validation includes change management and analytics as well as audits.
Laws and regulations apply only within the jurisdiction of the agency or governing body that has defined them, for example, all countries of the European Union, a specific country, or a specific U.S. state. Similarly, policies usually apply only within a specific geographical region, country, state, or some arbitrary region defined by the company, such as, for example, “North East Asia”. To insure that policies and legal references are properly defined and to insure that proper legal references are used to justify their matching policies, it is very important to make sure their geographical regions of application are consistent. It is difficult to do that if the scopes of application are defined using different terminology. The hierarchical region mapping module (HRM) 20 unifies them into a single hierarchy of all applicable “geographic” regions, either jurisdiction-based or geography-based, in the common language/jurisdiction data unit 12. The hierarchical region mapping module (HRM) makes comparisons and validation easy and reliable.
The legal references library LRL module 22 provides creation, management, and maintenance of a legal reference data library 14, or of a list of legal references, that contains all applicable legal references. This library allows user to define and track the legal references and some of the key properties of those legal references. One property is the geographic area of application, based on a defined model. Another property is the use of structured definitions of legal reference requirements. In this context, a structured definition is used in the sense of a definition whose semantic meaning can be understood by a software application as the sum of fields, numeric values, options, and other codified semantic information that can be compared, ordered, or otherwise automatically processed by a software application. This is in contrast to a human readable description, such as, for example, free form text using English sentences, which are easily understood by a person but have no meaning for a software application. Links are provided to other related legal references that define similar requirements in the same or related geographic area of application.
The Legal References Policy Mapping (LRPM) module 24 defines, manages, and maintains a mapping between legal references and policies in the mapping and legal references data unit 18, while tracking specific properties. One property includes geographic areas of application of the policies, based on the above defined model. Another property is the definition of the applicable requirements such that a related legal reference may define a broad set of requirements, but when applied to a specific policy, only certain of these requirements will truly apply in the context of that policy. Another property is the definition of the governing requirements, also called “trumping legal references.” Out of all the applicable requirements defined by the combined related legal references, some may conflict and some may be judged as being too constraining or less applicable. Consequently the policy requirement are based on only a subset of all applicable requirements called the governing requirements of the governing legal references, while the other requirements are tracked for reference, but are trumped, so to speak, by the governing requirements.
The Requirement Cross Check (RCC) module 26 provides for cross-checking and validation of all applicable and governing requirements from related legal references against the requirement of their matching policy, to insure consistency and detect any human errors. This module also provides for change control throughout the process to deal with changes. These changes include a number of aspects, including: creation or removal of legal references, from either the library, the policies, or the process; replacing an existing legal reference by a new legal reference; changes to the definition of a legal reference, including any requirement or its geographic area of application; changes to a geographic area of policy application, including any refinement or further breakdown of existing policy in more specific geographic areas of application, such as, for example, breakdown down of U.S. federal policy into U.S. states policies; and changes to the trumping legal references.
Hierarchical Region Mapping Module (HRM)
With reference to
The HRM module 20 provides the semantics of jurisdiction inheritance that makes it possible to determine a list of all jurisdictions within which the laws for that jurisdiction apply. For example, laws published by a European EU agency are defined in the jurisdiction of the EU, and consequently apply (under the proper treaty) in any EU country and any sub-jurisdiction within any of those countries. As another example, U.S. federal laws by default apply to all U.S. states and to all U.S. counties.
The HRM module 20 represents any arbitrary geographic region 38 defined as the union of multiple existing geographic regions or jurisdictions, or a sub-region of an existing geographic region or jurisdiction. These geographic regions are typically be specific to the business of the company and reflect the fundamental organization of the activity of the company, in different sales regions, or any other business driven geography. For example, the company may have divided their US sales into a few regions like: “East Coast,” “West Coast” and “Central”. Such regions are typically defined as a specific list of U.S. states. As another example, the company may have divided its worldwide sales activity into regions, one of them being “North East Asia,” defined as a list of countries in North East Asia, such as, for example, Japan, South Korea, and Taiwan. The company may not track jurisdiction at a granularity smaller than the state of California, but it may have different branches or sales organization in 3 sub-division of California such as “South”, “Central”, and “North”.
The HRM module 20 provides an explicit naming/referencing scheme so that each node in the hierarchy is named or referenced as a unique node by specifying a complete hierarchical path, starting with a country, or a geographical region or jurisdiction equivalent to the union of multiple countries.
The HRM module 20 insures that all other modules are able to describe where policies and their justifications apply in a fully consistent manner, worldwide, for any type of policy that is either driven by external governing agencies or that is driven by internal company business drivers.
Legal Reference Library Module (LRL)
With reference to
Classification tags are provided that reflects different fundamental aspects of a legal reference and that include: the category for the source of a requirement, including but not limited to laws or regulations from regulatory or governing bodies and agencies; opinions that are interpretation of laws or regulations from legal experts based on case law or other legal analysis; and internal protocols, or internal requirements defined within the company itself, that behaves as internal laws of the company.
While in common cases legal reference usually belong only to a single category of sources of requirements because they are usually mutually exclusive, legal references can sometimes belong to multiple categories.
The domain of application of the requirements within the company, includes, but is not limited to the following: preservation in the context of legal holds related to E-Discovery; retention both in term of regulatory requirements and internal business requirements; and data privacy, or personal data protection, security, or enforcement of confidentiality and security regulation, or business driven confidentiality and security requirements such as trade secrets. Note that a legal reference can very well define requirements for multiple domains of application.
The level of risk is associated with non compliance. While some regulations have existed for a long time, they may never have been enforced in practice. Other regulations are regularly and aggressively enforced, with certain agencies being especially proactive with regard to using the full extent of the law and with generating strong negative public relations (PR) for violators.
Other classifications arise that are related to the originator of the requirements, or the requirements themselves and provide useful context in their use within the company. These other classifications may be specific to the business of the company, for example: A large government contractor may pay special attention to government contractor regulations and be interested in culling out all legal references related to this topic Classification tags make it much easier and simpler for end users to narrow down their search when looking for applicable requirements within a certain context. They help simplify and humanize often complex legal numbering schemas and languages. They can also be used to perform consistency checks and to automatically flag potential errors.
Requirement definitions, broken down in specific categories, include but are not limited to: Retention rules include any rules related to when and under which condition the relevant information should be disposed of, or how long and under which condition it should be maintained. Such retention rules may vary based on the type of document considered, in the sense of official records, versus draft or courtesy copy.
Disposal protocols specify how the information should be disposed of when its retention period expires, includes the means for and the thoroughness of a destruction process, details process steps in the case of a multi-step disposal process, security, audit and confidentiality requirement in the handling of the disposal process, etc. Handling protocols specify who can access or use the information for what purpose, using an Access Control List or other access control processes, or Security Level Classifications, etc. Storage protocols specify any restrictions on where and how the information should be stored, encryption requirements, etc. Transport protocols specify any process requirements on how to move or copy the data between different storage systems.
It is to the benefit of the company to codify these protocols into a small number of reference protocols, and describe them by reference to a codified version versus including a full description of the protocol potentially different for every legal reference or policy. This codification makes it much easier to interpret the semantic meaning of the requirement automatically and to provide automatic cross-checking and detection of inconsistencies. Codification improves readability for non legal experts. Codification makes it easier to summarize multiple requirements for a single system or class of information. Codification makes it easier to changes the details of one of these protocols consistently independently of which legal references use it. Examples of such codification include retention rules and disposal protocols. Retention rules are defined as sets of a generic rule selected from a list of options (like “permanent”, “Fixed time”, “Trigger event+fixed time”) combined with various parameters as needed (like duration, trigger event). Disposal protocols are defined as a choice form a codified list of applicable options (for example: “Trash”, “Shredding”, “Shred and burn”, etc.).
Related legal references are often defined in the law text themselves. Capturing those related legal references in the LRL module enables: easier and faster cross reference during research; simplification of cross-referencing and cross-inclusion of legal references (with related legal references) when applicable; insuring that all applicable legal references are indeed tracked within the LRL; determination of trumping legal references.
The LRL module 22 also provides full search capabilities leveraging all of the detailed information and context on each legal reference to make it easy for an end user to identify relevant legal references in any given context. Details of the search capabilities correspond to the data model captured above, and leveraging the capability of the HRM module to identify all applicable jurisdictions upstream or downstream from a specific geography, such as, for example, any laws that can apply to any part of Germany, or all laws applying to a specific sub-region of Germany.
Legal Reference to Policy Mapping Module (LRPM)
With reference to
One capability of the LRPM 22 is creation and maintenance 50 of the list of legal references 52 that apply to any given policy 54. In order to identify which legal references may be relevant to which policy, the user will typically leverage multiple sources, including but not limited to: known relevant legal references already attached to similar policy, or same policy as globally defined within a larger jurisdiction (like a global policy for the US, compared to a local policy for just California); potentially relevant policy identified as the result of research using the full search capability of the LRL module, as described above; and legal references related to legal references already attached to a policy, as defined by the LRL module.
Another capability of the LRPM 22 is to identify 56 which type of requirement for a given policy may be influenced by a given legal reference. This is directly aligned with the requirement categorization used by the LRL module, including but not limited to: retention rules; disposal protocols; handling protocols; storage protocols; and transport protocols. This type of mapping is established in different ways, including but not limited to the following: Automatic mapping that is based on which requirements were defined or not defined in the LRL module for that legal reference. Automatic mapping that is based on which classification tags 58 were defined for that legal reference in the LRL module (a retention tagged legal reference should impact retention rules; a privacy tagged legal reference should impact handling and storage protocols, etc.); Explicit mapping by the user, who will designate which of the requirement categories of the policy will be impacted by the given legal reference, including the ability to overwrite the automated mapping described above.
Another capability of the LRPM 22 is to define which of the legal references and optionally, which of their requirements, are considered “controlling” for that policy. This sets the expectation that the requirements defined in the policy should be guided by the controlling legal references, even if some of the other applicable requirements may be even stricter or not really compatible with them. This is especially useful as while policymaker wants to keep track of all legal references that could apply to a given policy, they will often need to make some compromise on how they interpret the sum of these requirements. For example, this is the case where requirements: are stricter than should reasonably need to be followed; apply within a geography or jurisdiction where the activity (and consequently the exposure) of the company is very limited; have never been enforced by their governing body or agency in the past; or are conflicting with other requirements for which the risk is much greater.
By aggregating in a highly structured form a clear definition of the relationships and priorities of the different requirements of different legal references, as they apply to a given policy, the LRPM module 24 provides the very foundation that will enable the RCC module to perform its function; enables the policy makers to clearly document the decisions and compromises made during the process of determining the policy requirements; makes it much easier to defend that process if challenged later; and makes it much easier to maintain that process accurately as legal references and business context continue to evolve over time.
Requirement Cross Check Module (RCC)
With reference to
One capability is to create and maintain a model of the dependencies and compatibility between the structured parameters 44 used to describe each category of requirements. An illustrative examples of this includes the disposal protocol requirements for ESI (Electronically Stored Information) may specify 3 options, including simple deletion; digital shredding; and physical destruction of the storage medium. The 3 options can clearly be ordered by increasing levels of enforcement, in the sense that any requirement for simple deletion or digital shredding would be implicitly fulfilled through physical destruction of the storage medium. The ability to represent and understand this order of prevalence between options is key for the RCC module to process the semantic meaning of the requirements, and insure consistency and compliance.
Another capability, as described above, is that a retention rule may be defined as sets of a generic rule selected from a list of options (like “permanent”, “Fixed time”, “Trigger event+fixed time”) combined with various parameters as needed (like duration, trigger event). The ability to understand any implication or inclusion between trigger events (in the sense that occurrence of event A implies that event B already occurred), ability to compared different periods and how to combine those and compare them based on which generic rule applies, would allow the RCC module to compare different retention rules from various legal references and conclude if they appear indeed compatible or not with the resulting policy retention rules.
Within each category of requirements, the RCC module 26 consolidates all controlling requirements 60 and compares them to the policy requirement, using the above defined understanding of relationship between the parameters and options. This may be done in a fully automated way (when full semantic interpretation of the requirement description can be performed, like comparing different retention periods) or in a semi-automated way. For example, the RCC module may compare the trigger events of retention rules and may not be able to compare them to the policy trigger event. In such case, the RCC module may trigger a workflow for an authorized user to review the conflicting requirement parameters and provide legal interpretation, to close the cross-check on trigger further corrective action.
Within each category of requirement, the RCC module 26 also consolidates 54 the sum of all requirements (not just the controlling ones) to allow easy review and evaluation of the compromise that were made between the policy requirement and the sum of all requirements that were applicable in that context.
Cross-check the geographic region and jurisdiction 52 associated to the policy and its related legal references to detect inconsistency that could uncover human errors.
The foregoing descriptions of specific embodiments of the present invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and its practical application, to thereby enable others skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the particular use contemplated. It is intended that the scope of the invention be defined by the Claims appended hereto and their equivalents.
Number | Name | Date | Kind |
---|---|---|---|
5355497 | Cohen-Levy | Oct 1994 | A |
5608865 | Midgely et al. | Mar 1997 | A |
5701472 | Koerber et al. | Dec 1997 | A |
5903879 | Mitchell | May 1999 | A |
6115642 | Brown et al. | Sep 2000 | A |
6128620 | Pissanos et al. | Oct 2000 | A |
6151031 | Atkins et al. | Nov 2000 | A |
6173270 | Cristofich et al. | Jan 2001 | B1 |
6330572 | Sitka | Dec 2001 | B1 |
6332125 | Callen et al. | Dec 2001 | B1 |
6343287 | Kumar et al. | Jan 2002 | B1 |
6401079 | Kahn et al. | Jun 2002 | B1 |
6425764 | Lamson | Jul 2002 | B1 |
6539379 | Vora et al. | Mar 2003 | B1 |
6607389 | Genevie | Aug 2003 | B2 |
6622128 | Bedell et al. | Sep 2003 | B1 |
6738760 | Krachman | May 2004 | B1 |
6805351 | Nelson | Oct 2004 | B2 |
6832205 | Aragones et al. | Dec 2004 | B1 |
6839682 | Blume et al. | Jan 2005 | B1 |
6944597 | Callen et al. | Sep 2005 | B2 |
6976083 | Baskey et al. | Dec 2005 | B1 |
7076439 | Jaggi | Jul 2006 | B1 |
7103602 | Black et al. | Sep 2006 | B2 |
7104416 | Gasco et al. | Sep 2006 | B2 |
7107416 | Stuart et al. | Sep 2006 | B2 |
7127470 | Takeya | Oct 2006 | B2 |
7162427 | Myrick et al. | Jan 2007 | B1 |
7197716 | Newell | Mar 2007 | B2 |
7225249 | Barry et al. | May 2007 | B1 |
7281084 | Todd et al. | Oct 2007 | B1 |
7283985 | Schauerte et al. | Oct 2007 | B2 |
7284985 | Genevie | Oct 2007 | B2 |
7333989 | Sameshima et al. | Feb 2008 | B1 |
7386468 | Calderaro et al. | Jun 2008 | B2 |
7433832 | Bezos et al. | Oct 2008 | B1 |
7478096 | Margolus et al. | Jan 2009 | B2 |
7502891 | Shachor | Mar 2009 | B2 |
7512636 | Verma et al. | Mar 2009 | B2 |
7558853 | Alcorn et al. | Jul 2009 | B2 |
7580961 | Todd et al. | Aug 2009 | B2 |
7594082 | Kilday et al. | Sep 2009 | B1 |
7596541 | deVries et al. | Sep 2009 | B2 |
7653893 | Neumann et al. | Jan 2010 | B2 |
7720825 | Pelletier et al. | May 2010 | B2 |
7730148 | Mace et al. | Jun 2010 | B1 |
7895229 | Paknad | Feb 2011 | B1 |
20010053967 | Gordon et al. | Dec 2001 | A1 |
20020007333 | Scolnik et al. | Jan 2002 | A1 |
20020010708 | McIntosh | Jan 2002 | A1 |
20020022982 | Cooperstone et al. | Feb 2002 | A1 |
20020035480 | Gordon et al. | Mar 2002 | A1 |
20020083090 | Jeffrey et al. | Jun 2002 | A1 |
20020091553 | Callen et al. | Jul 2002 | A1 |
20020095416 | Schwols | Jul 2002 | A1 |
20020103680 | Newman | Aug 2002 | A1 |
20020108104 | Song et al. | Aug 2002 | A1 |
20020119433 | Callender | Aug 2002 | A1 |
20020120859 | Lipkin et al. | Aug 2002 | A1 |
20020123902 | Lenore et al. | Sep 2002 | A1 |
20020143595 | Frank et al. | Oct 2002 | A1 |
20020143735 | Ayi et al. | Oct 2002 | A1 |
20020147801 | Gullotta et al. | Oct 2002 | A1 |
20020162053 | Os | Oct 2002 | A1 |
20020178138 | Ender et al. | Nov 2002 | A1 |
20020184068 | Krishnan et al. | Dec 2002 | A1 |
20020184148 | Kahn et al. | Dec 2002 | A1 |
20030004985 | Kagimasa et al. | Jan 2003 | A1 |
20030014386 | Jurado | Jan 2003 | A1 |
20030018520 | Rosenfeld et al. | Jan 2003 | A1 |
20030031991 | Genevie | Feb 2003 | A1 |
20030033295 | Adler et al. | Feb 2003 | A1 |
20030036994 | Witzig et al. | Feb 2003 | A1 |
20030046287 | Joe | Mar 2003 | A1 |
20030051144 | Williams | Mar 2003 | A1 |
20030069839 | Whittington et al. | Apr 2003 | A1 |
20030074354 | Lee et al. | Apr 2003 | A1 |
20030097342 | Whittingtom | May 2003 | A1 |
20030110228 | Xu et al. | Jun 2003 | A1 |
20030139827 | Phelps | Jul 2003 | A1 |
20030229522 | Thompson et al. | Dec 2003 | A1 |
20040002044 | Genevie | Jan 2004 | A1 |
20040019496 | Angle et al. | Jan 2004 | A1 |
20040034659 | Steger | Feb 2004 | A1 |
20040060063 | Russ et al. | Mar 2004 | A1 |
20040068432 | Meyerkopf et al. | Apr 2004 | A1 |
20040088283 | Lissar et al. | May 2004 | A1 |
20040088332 | Lee et al. | May 2004 | A1 |
20040088729 | Petrovic et al. | May 2004 | A1 |
20040103284 | Barker | May 2004 | A1 |
20040133573 | Miloushev et al. | Jul 2004 | A1 |
20040138903 | Zuniga | Jul 2004 | A1 |
20040143444 | Opsitnick et al. | Jul 2004 | A1 |
20040187164 | Kandasamy et al. | Sep 2004 | A1 |
20040193703 | Loewy et al. | Sep 2004 | A1 |
20040204947 | Li et al. | Oct 2004 | A1 |
20040215619 | Rabold | Oct 2004 | A1 |
20040260569 | Bell et al. | Dec 2004 | A1 |
20050060175 | Farber et al. | Mar 2005 | A1 |
20050071251 | Linden et al. | Mar 2005 | A1 |
20050074734 | Randhawa | Apr 2005 | A1 |
20050091076 | McGovern | Apr 2005 | A1 |
20050114241 | Hirsch et al. | May 2005 | A1 |
20050144114 | Ruggieri et al. | Jun 2005 | A1 |
20050165734 | Vicars et al. | Jul 2005 | A1 |
20050187813 | Genevie | Aug 2005 | A1 |
20050203821 | Petersen et al. | Sep 2005 | A1 |
20060036464 | Cahoy et al. | Feb 2006 | A1 |
20060036649 | Simske et al. | Feb 2006 | A1 |
20060074793 | Hibbert et al. | Apr 2006 | A1 |
20060095421 | Nagai et al. | May 2006 | A1 |
20060126657 | Beisiegel et al. | Jun 2006 | A1 |
20060136435 | Nguyen et al. | Jun 2006 | A1 |
20060143248 | Nakano et al. | Jun 2006 | A1 |
20060149735 | DeBie et al. | Jul 2006 | A1 |
20060156381 | Motoyama | Jul 2006 | A1 |
20060167704 | Nicholls et al. | Jul 2006 | A1 |
20060174320 | Maru et al. | Aug 2006 | A1 |
20060184718 | Sinclair | Aug 2006 | A1 |
20060229999 | Dodell et al. | Oct 2006 | A1 |
20060230044 | Utiger | Oct 2006 | A1 |
20070016546 | De Vorchik et al. | Jan 2007 | A1 |
20070048720 | Billauer | Mar 2007 | A1 |
20070061156 | Fry et al. | Mar 2007 | A1 |
20070061157 | Fry et al. | Mar 2007 | A1 |
20070078900 | Donahue | Apr 2007 | A1 |
20070099162 | Sekhar | May 2007 | A1 |
20070100857 | DeGrande et al. | May 2007 | A1 |
20070112783 | McCreight et al. | May 2007 | A1 |
20070156418 | Richter et al. | Jul 2007 | A1 |
20070162417 | Cozianu et al. | Jul 2007 | A1 |
20070208690 | Schneider et al. | Sep 2007 | A1 |
20070219844 | Santorine et al. | Sep 2007 | A1 |
20070220435 | Sriprakash et al. | Sep 2007 | A1 |
20070271517 | Finkelman et al. | Nov 2007 | A1 |
20070282652 | Childress et al. | Dec 2007 | A1 |
20070288659 | Zakarian et al. | Dec 2007 | A1 |
20080033904 | Ghielmetti et al. | Feb 2008 | A1 |
20080034003 | Stakutis et al. | Feb 2008 | A1 |
20080059265 | Biazetti et al. | Mar 2008 | A1 |
20080059543 | Engel | Mar 2008 | A1 |
20080070206 | Perilli | Mar 2008 | A1 |
20080148346 | Gill et al. | Jun 2008 | A1 |
20080195597 | Rosenfeld et al. | Aug 2008 | A1 |
20080229037 | Bunte et al. | Sep 2008 | A1 |
20080294674 | Reztlaff et al. | Nov 2008 | A1 |
20080301207 | Demarest et al. | Dec 2008 | A1 |
20080319958 | Bhattacharya et al. | Dec 2008 | A1 |
20080319984 | Proscia et al. | Dec 2008 | A1 |
20090037376 | Archer et al. | Feb 2009 | A1 |
20090043625 | Yao | Feb 2009 | A1 |
20090106815 | Brodie et al. | Apr 2009 | A1 |
20090119677 | Stefansson et al. | May 2009 | A1 |
20090150866 | Schmidt | Jun 2009 | A1 |
20090150906 | Schmidt et al. | Jun 2009 | A1 |
20090193210 | Hewett et al. | Jul 2009 | A1 |
20090307743 | Azagury et al. | Dec 2009 | A1 |
20100070315 | Lu et al. | Mar 2010 | A1 |
20100094766 | Li et al. | Apr 2010 | A1 |
Number | Date | Country | |
---|---|---|---|
20100082676 A1 | Apr 2010 | US |