User privacy has become an important aspect of social life. Governments around the world have passed regulations to safeguard user privacy. These regulations often require corporates to obtain a formal acceptance or consent for their privacy agreement with the consumers before collecting their privacy information. Unfortunately, the acceptance of this agreement is not legally verifiable as it may be directly collected by the corporations through their websites. At any point of time the user or the corporate can deny this acceptance or the agreement terms as no third party is involved to attest this acceptance. Therefore, an unbiased middle entity can be used to improve this process by attesting and verifying the privacy agreement acceptance between the user and the corporation.
In one aspect, a digitized solution for an unbiased entity attests or certifies an acceptance of policy agreement between a corporate entity and their customers or users.
Optionally, the policy agreement includes a privacy policy such as a GDPR-based privacy policy, a CCPA-based privacy policy, a custom corporate privacy policy or other privacy policies. The digitized solution provides a website accessible via a computer network, wherein the website comprises a set of interactive web pages, and wherein the website is maintained by a corporate entity. With at least one of the interactive web pages, the digitized solution displays a privacy policy agreement to users using the website, and enables an unbiased entity to receive the user acceptance.
In another aspect, a digitized solution for implementing a user acceptance of specified policies or agreements created by a corporate entity with an unbiased middle entity comprising enabling an authorized personnel to setup a specified policies or agreement filter with an unbiased middle entity.
In yet another aspect, digitized solution for implementing an automated audit systems to periodically verify the user acceptance details with the corporate entity and how such acceptance are enforced by the corporate entity.
The figures described above are a representative set, and are not an exhaustive with respect to embodying the invention.
Disclosed are a system, method, and article of an unbiased middle entity to legally verify and manage consumer consent or acceptance. The following description is presented to enable a person of ordinary skill in the art to make and use the various embodiments. Descriptions of specific devices, techniques, and applications are provided only as examples. Various modifications to the examples described herein can be readily apparent to those of ordinary skill in the art, and the general principles defined herein may be applied to other examples and applications without departing from the spirit and scope of the various embodiments.
Reference throughout this specification to “one embodiment,” “an embodiment,” ‘one example,’ or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in one embodiment,” “in an embodiment,” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
Furthermore, the described features, structures, or characteristics of the invention may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided, such as examples of programming, software modules, user selections, network transactions, database queries, database structures, hardware modules, hardware circuits, hardware chips, etc., to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art can recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, materials, and so forth. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
The schematic flow chart diagrams included herein are generally set forth as logical flow chart diagrams. As such, the depicted order and labeled steps are indicative of one embodiment of the presented method. Other steps and methods may be conceived that are equivalent in function, logic, or effect to one or more steps, or portions thereof, of the illustrated method. Additionally, the format and symbols employed are provided to explain the logical steps of the method and are understood not to limit the scope of the method. Although various arrow types and line types may be employed in the flow chart diagrams, and they are understood not to limit the scope of the corresponding method. Indeed, some arrows or other connectors may be used to indicate only the logical flow of the method. For instance, an arrow may indicate a waiting or monitoring period of unspecified duration between enumerated steps of the depicted method. Additionally, the order in which a particular method occurs may or may not strictly adhere to the order of the corresponding steps shown.
Example definitions for some embodiments are now provided.
Application programming interface (API) can specify how software components of various systems interact with each other.
Cloud computing can involve deploying groups of remote servers and/or software networks that allow centralized data storage and online access to computer services or resources. These groups of remote serves and/or software networks can be a collection of remote computing services.
California Consumer Privacy Act (CCPA) is a bill that enhances privacy rights and consumer protection for residents of California, United States. The bill was passed by the California State Legislature and signed into law by Jerry Brown, Governor of California, on Jun. 28, 2018, to amend Part 4 of Division 3 of the California Civil Code.
HTTP cookie (e.g. a cookie) is a small piece of data sent from a website and stored on the user's computer by the user's web browser while the user is browsing. Cookies can be used by a websites as a mechanism to remember stateful information (e.g. as items added in the shopping cart in an online store) and/or to record the user's browsing activity (e.g. clicking specified buttons, logging in, recording visited in the past, etc.).
General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA). It also addresses the transfer of personal data outside the EU and EEA areas. The GDPR aims primarily to give control to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU.
Children's Online Privacy Protection Act of 1998 (COPPA) is a United States federal law that applies to the online collection of personal information by persons or entities under U.S. jurisdiction about children under 13 years of age including children outside the U.S., if the company is U.S.-based. It details what a website operator must include in a privacy policy, when and how to seek verifiable consent from a parent or guardian, and what responsibilities an operator has to protect children's privacy and safety online including restrictions on the marketing of those under 13.
Webpages may collect private user information. Websites can request that the users provide various permissions with respect to the collected private user information. Additionally, governmental entities may require various website actions with respect to private user data as well. Examples include, inter alia: GDPR, CCPA, etc. Example methods provided herein provide an unbiased and trusted middle entity to manage user privacy states and settings. Entities (e.g. corporations, education institutions, etc.) can access the middle entity to obtain the user privacy states and settings. Based on these user privacy states and settings, entities can collect various information about the user's behavior on a website. Additional example methods provided herein can be used to manage the lifecycle of a user's data with proper privacy filters.
Unbiased Middle Entity to Safeguard the Approval Process
Privacy policies can be based on GRPR, CCPA, COPRA, etc. Furthermore step 102 can also include other policies and agreements such as but not limited to purchase agreement, website usage agreement, refund policy, subscription policy, return policy.
In step 104, the logged in or anonymous user can agree or disagree to a shown policy before using their website, buying a product, using their service or other online activity in their website. In step 104, user's consent or acceptance for a shown policy can be captured along with other data such as location, IP address, device information, time of occurrence.
In step 106, this user acceptance and/or data relevant to the event and/or the shown policy can be digitally signed by the middle entity and stored for reference. At a later point, the user and/or corporate entity can access and/or download this digitally signed agreement.
In step 108, the unbiased middle entity can authorize the corporate entity to enforce the accepted policy id user has agreed. If the user has disagreed the middle entity will inform the corporate entity not to enforce such a policy
In step 110, user can, at any time, access the middle entity's website and view all the agreed/disagreed policies along with all the policy information and corporate details. This operation can be done using an interactive tool.
User can update/revoke the agreed/disagreed policies. Accordingly, in step 112, user at any time can revoke or disagree to an earlier accepted policy.
More specifically,
Although the present embodiments have been described with reference to specific example embodiments, various modifications and changes can be made to these embodiments without departing from the broader spirit and scope of the various embodiments. For example, the various devices, modules, etc. described herein can be enabled and operated using hardware circuitry, firmware, software or any combination of hardware, firmware, and software (e.g., embodied in a machine-readable medium).
In addition, it can be appreciated that the various operations, processes, and methods disclosed herein can be embodied in a machine-readable medium and/or a machine accessible medium compatible with a data processing system (e.g., a computer system), and can be performed in any order (e.g., including using means for achieving the various operations). Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. In some embodiments, the machine-readable medium can be a non-transitory form of machine-readable medium.