US 12,086,275 B2
Intelligent privacy data governance system
Trisha Goswami, West Bengal (IN); Ashraf AlZanoun, Chicago, IL (US); Lisa Suzanne Wilson, Chicago, IL (US); Tegbir Singh Harika, Plano, TX (US); Arun Ravindran, Bangalore (IN); and Jayanti Vemulapati, Gopanpally (IN)
Assigned to Accenture Global Solutions Limited, Dublin (IE)
Filed by Accenture Global Solutions Limited, Dublin (IE)
Filed on Aug. 27, 2021, as Appl. No. 17/459,332.
Claims priority of provisional application 63/122,713, filed on Dec. 8, 2020.
Prior Publication US 2022/0179979 A1, Jun. 9, 2022
Int. Cl. H04L 29/00 (2006.01); G06F 11/14 (2006.01); G06F 16/245 (2019.01); G06F 21/60 (2013.01); G06F 40/40 (2020.01)
CPC G06F 21/604 (2013.01) [G06F 11/1451 (2013.01); G06F 16/245 (2019.01); G06F 40/40 (2020.01); G06F 2201/82 (2013.01); G06F 2221/2107 (2013.01); G06F 2221/2111 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method for governing user privacy data, comprising:
scanning, by a processor circuitry, a data ecosystem according to a predetermined scan time interval to identify a newly added data source in the data ecosystem, the data ecosystem comprising a plurality of data sources storing user privacy data, the newly added data source comprising a plurality of datasets;
determining, by the processor circuitry, the newly added data source as a dark data source in response to it being unknown whether user privacy data is stored in the newly added data source;
identifying, by the processor circuitry, user information and relationship from the data ecosystem according to a lineage of the plurality of datasets;
scanning, with the processor circuitry, the dark data source by executing a natural language processing engine to identify existence of and content of user privacy data in the dark data source based on the user information and relationship;
selecting, by the processor circuitry, a target user privacy data compliance policy from a plurality of user privacy data compliance policies based on a geographical region associated with the dark data source;
detecting, by the processor circuitry, non-compliance in protecting user privacy data in the dark data source based on the target user privacy data compliance policy; and
in response to the non-compliance, processing, by the processor circuitry, the user privacy data in the dark data source to eliminate the non-compliance.