Patent Issued for Data processing and scanning systems for assessing vendor risk (USPTO 11366909): OneTrust LLC - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
July 13, 2022 Newswires
Share
Share
Post
Email

Patent Issued for Data processing and scanning systems for assessing vendor risk (USPTO 11366909): OneTrust LLC

Insurance Daily News

2022 JUL 13 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- According to news reporting originating from Alexandria, Virginia, by NewsRx journalists, a patent by the inventors Brannon, Jonathan Blake (Smyrna, GA, US), filed on June 8, 2021, was published online on June 21, 2022.

The assignee for this patent, patent number 11366909, is OneTrust LLC (Atlanta, Georgia, United States).

Reporters obtained the following quote from the background information supplied by the inventors: “Over the past years, privacy and security policies, and related operations have become increasingly important. Breaches in security, leading to the unauthorized access of personal data (which may include sensitive personal data) have become more frequent among companies and other organizations of all sizes. Such personal data may include, but is not limited to, personally identifiable information (PII), which may be information that directly (or indirectly) identifies an individual or entity. Examples of PII include names, addresses, dates of birth, social security numbers, and biometric identifiers such as a person’s fingerprints or picture. Other personal data may include, for example, customers’ Internet browsing habits, purchase history, or even their preferences (e.g., likes and dislikes, as provided or obtained through social media).

“Many organizations that obtain, use, and transfer personal data, including sensitive personal data, have begun to address these privacy and security issues. To manage personal data, many companies have attempted to implement operational policies and processes that comply with legal requirements, such as Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) or the U.S.’s Health Insurance Portability and Accountability Act (HIPPA) protecting a patient’s medical information. Many regulators recommend conducting privacy impact assessments, or data protection risk assessments along with data inventory mapping. For example, the GDPR requires data protection impact assessments. Additionally, the United Kingdom ICO’s office provides guidance around privacy impact assessments. The OPC in Canada recommends certain personal information inventory practices, and the Singapore PDPA specifically mentions personal data inventory mapping.

“Many organizations have also begun to track the compliance of their vendors with privacy laws, regulations, and/or standards. This can be expensive and time consuming using traditional methods. Accordingly, there is a need for improved systems and methods for efficiently tracking the compliance of vendors with privacy laws, regulations, and/or standards, and for assessing the risk associated with doing business with a particular vendor.”

In addition to obtaining background information on this patent, NewsRx editors also obtained the inventors’ summary information for this patent: “A method according to various embodiments, may include: executing, by computing hardware, a download of a software application from a computer system associated with a vendor; identifying, by the computing hardware and based on the download of the software application, a plurality of vendor attributes, wherein the plurality of vendor attributes comprises a privacy disclaimer associated with the software application; determining, by the computing hardware, factors for the plurality of vendor attributes, wherein determining the factors for the plurality of vendor attributes comprises determining a privacy disclaimer factor for the privacy disclaimer by: analyzing the privacy disclaimer to determine whether the privacy disclaimer comprises language associated with at least one of a legal requirement or an industry requirement; and determining the privacy disclaimer factor based on whether the privacy disclaimer comprises the language associated with the at least one of the legal requirement or the industry requirement; determining, by the computing hardware, a vendor risk rating based on the factors for the plurality of vendor attributes; generating, by the computing hardware and based on the vendor risk rating, a graphical user interface by configuring a navigation element on the graphical user interface and excluding a display element from the graphical user interface, wherein: the navigation element is configured for initiating a responsive action based on the vendor risk rating, and the display element is configured for presenting the vendor risk rating; transmitting, by the computing hardware, an instruction to a user device to present the graphical user interface on the user device; detecting, by the computing hardware, selection of the navigation element; and responsive to detecting the selection of the navigation element, initiating, by the computing hardware, the responsive action.

“In particular embodiments, the responsive action comprises: generating a second graphical user interface comprising an indication of the vendor risk rating and transmitting a second instruction to a third-party computing device to present the second graphical user interface on the third-party computing device. In particular embodiments, the second graphical user interface further comprises an indication of the software application. In particular embodiments, the responsive action comprises: generating an electronic communication comprising an indication of the vendor risk rating and transmitting the electronic communication to a third-party computing device. In particular embodiments, the factors for the plurality of vendor attributes comprise a security certification factor; and the method further comprises: analyzing computer code associated with the vendor to identify an indication of a security certification associated with the vendor; and determining the security certification factor based on the security certification. In particular embodiments, the factors for the plurality of vendor attributes comprise a security certification factor; and the method further comprises: scanning a website associated with the vendor to identify an image associated with a security certification associated with the vendor; and determining the security certification factor based on the security certification. In particular embodiments, determining the security certification factor based on the security certification comprises: accessing a database of security certifications to determine whether the vendor holds the security certification; and determining the security certification factor based on whether the vendor holds the security certification.

“A system, according to various embodiments, may include: a non-transitory computer-readable medium storing instructions; and a processing device communicatively coupled to the non-transitory computer-readable medium, wherein the processing device is configured to execute the instructions and thereby perform operations comprising: downloading a software application from a computer system associated with a vendor; identifying a privacy disclaimer associated with the software application; determining a privacy disclaimer factor for the privacy disclaimer based on whether the privacy disclaimer comprises language associated with at least one of a legal requirement or an industry requirement; determining a vendor risk rating based on the privacy disclaimer factor; determining that the vendor risk rating meets a threshold risk rating; generating a graphical user interface based on determining that the vendor risk rating meets the threshold risk rating by configuring a first navigation element on the graphical user interface and excluding a second navigation element from the graphical user interface, wherein: the first navigation element is configured for initiating a responsive action based on the vendor risk rating meeting the threshold risk rating, and the second navigation element is configured for navigating to a display element that presents an indication that the vendor risk rating does not meet the threshold risk rating; transmitting an instruction to a user device to present the graphical user interface on the user device; detecting a selection of the first navigation element; and responsive to detecting the selection of the first navigation element, initiating the responsive action.

“In particular embodiments, identifying the privacy disclaimer associated with the software application comprises identifying the privacy disclaimer on a webpage provided by the vendor for downloading the software application. In particular embodiments, the vendor risk rating is further based on a public information factor; and the method further comprises determining the public information factor based on public information associated with the vendor. In particular embodiments, the public information comprises social networking website content. In particular embodiments, the public information comprises at least one of an employee title, an employee role, or an available job post. In particular embodiments, the public information comprises an indication of a contract between the vendor and a government entity. In particular embodiments, the vendor risk rating is further based on a third-party processor factor; and the method further comprises determining the third-party processor factor based on a webpage provided by the vendor for downloading the software application.

“A non-transitory computer-readable medium according to various embodiments, may store computer-executable instructions that, when executed by processing hardware, configure the processing hardware to perform operations comprising: downloading a software application from a computer system associated with a vendor; identifying a privacy disclaimer associated with the software application; determining a privacy disclaimer factor for the privacy disclaimer based on whether the privacy disclaimer comprises language associated with at least one of a legal requirement or an industry requirement; determining a vendor risk rating based on the privacy disclaimer factor; generating a graphical user interface based on determining that the vendor risk rating does not meet a threshold risk rating by configuring a first navigation element on the graphical user interface and excluding a second navigation element from the graphical user interface, wherein: the first navigation element is configured for initiating a responsive action based on the vendor risk rating not meeting the threshold risk rating, and the second navigation element is configured for initiating a second responsive action based on the vendor risk rating meeting the threshold risk rating; transmitting an instruction to a user device to present the graphical user interface on the user device; detecting a selection of the first navigation element; and responsive to detecting the selection of the first navigation element, initiating the first responsive action.”

The claims supplied by the inventors are:

“1. A method comprising: scanning, by computing hardware, a webpage associated with a vendor to identify a security certification, wherein the security certification is associated with a certifying authority and indicates that the vendor is in compliance with security certification requirements of the certifying authority; calculating, by the computing hardware, a vendor risk rating based on the security certification; generating, by the computing hardware and based on the vendor risk rating, a graphical user interface comprising a menu for managing a computerized workflow related to the vendor, the menu comprising a navigation element and a display element from the graphical user interface, wherein: the navigation element is configured for initiating a responsive action based on the vendor risk rating, and the display element is configured for presenting the vendor risk rating; transmitting, by the computing hardware, an instruction to a user computing device to present the graphical user interface on the user computing device; detecting, by the computing hardware, selection of the navigation element; and responsive to detecting the selection of the navigation element, initiating, by the computing hardware, the responsive action.

“2. The method of claim 1, wherein scanning the webpage comprises scanning the webpage for content indicating receipt of the security certification by the vendor.

“3. The method of claim 1, wherein scanning the webpage comprises scanning the webpage for an image indicating receipt of the security certification by the vendor.

“4. The method of claim 1, wherein scanning the webpage comprises scanning computer code associated with the webpage to identify an indication of the security certification.

“5. The method of claim 1, wherein the responsive action comprises: generating a second graphical user interface comprising an indication of the vendor risk rating, and transmitting a second instruction to a third-party computing device to present the second graphical user interface on the third-party computing device.

“6. The method of claim 1, wherein the responsive action comprises: generating an electronic communication comprising an indication of the vendor risk rating, and transmitting the electronic communication to a third-party computing device.

“7. A system comprising: a non-transitory computer-readable medium storing instructions; and a processing device communicatively coupled to the non-transitory computer-readable medium, wherein the processing device is configured to execute the instructions and thereby perform operations comprising: scanning a webpage associated with a vendor to identify a security certification, wherein the security certification is associated with a certifying authority and indicates that the vendor is in compliance with security certification requirements of the certifying authority; determining a vendor risk rating based on the security certification; determining that the vendor risk rating meets a threshold risk rating; generating, by the computing hardware and based on the vendor risk rating, a graphical user interface comprising a menu for managing a computerized workflow related to the vendor, the menu comprising a navigation element and a display element from the graphical user interface, wherein: the navigation element is configured for initiating a responsive action based on the vendor risk rating, and the display element is configured for presenting the vendor risk rating; transmitting an instruction to a user computing device to present the graphical user interface on the user device; detecting a selection of the first navigation element; and responsive to detecting the selection of the first navigation element, initiating the responsive action.

“8. The system of claim 7, wherein scanning the webpage comprises at least one of scanning the webpage for content indicating receipt of the security certification by the vendor, scanning the webpage for an image indicating receipt of the security certification by the vendor, or scanning computer code associated with the webpage to identify an indication of the security certification.

“9. The system of claim 7, wherein the responsive action comprises: generating a second graphical user interface comprising an indication of the vendor risk rating, and transmitting a second instruction to a third-party computing device to present the second graphical user interface on the third-party computing device.

“10. The system of claim 7, wherein the responsive action comprises: generating an electronic communication comprising an indication of the vendor risk rating, and transmitting the electronic communication to a third-party computing device.

“11. The system of claim 7, wherein the operations further comprise: determining a public information factor based on public information associated with the vendor and the vendor risk rating is further based on the public information factor.

“12. The system of claim 7, wherein the operations further comprise: determining a presence of a suitable privacy notice on the website, and the vendor risk rating is further based on the presence of the suitable privacy notice.

“13. The system of claim 7, wherein the operations further comprise: determining a presence of a control center on the website that enables a visitor to the website to allow collection of certain data, and the vendor risk rating is further based on the presence of the control center.

“14. A non-transitory computer-readable medium storing computer-executable instructions that, when executed by processing hardware, causes the processing hardware to perform operations comprising: scanning a webpage associated with a vendor to identify a security certification, wherein the security certification is associated with a certifying authority and indicates that the vendor is in compliance with security certification requirements of the certifying authority; accessing a database of security certifications to determine that the vendor actually holds the security certification; determining a vendor risk rating based on the security certification; generating, by the computing hardware and based on the vendor risk rating, a graphical user interface comprising a menu for managing a computerized workflow related to the vendor, the menu comprising a navigation element and a display element from the graphical user interface, wherein: the navigation element is configured for initiating a responsive action based on the vendor risk rating, and the display element is configured for presenting the vendor risk rating; detecting a selection of the first navigation element; and responsive to detecting the selection of the first navigation element, initiating the first responsive action.

“15. The non-transitory computer-readable medium of claim 14, wherein the first responsive action comprises transferring the vendor risk rating to a current or potential customer of the vendor for use in assessing a risk of doing business with the vendor.

“16. The non-transitory computer-readable medium of claim 14, wherein the second responsive action comprises navigating to a display element that presents an indication that the vendor risk rating does meet the threshold risk rating.

“17. The non-transitory computer-readable medium of claim 14, wherein the second responsive action comprises: generating an electronic communication comprising an indication of the vendor risk rating does meet the threshold risk rating, and transmitting the electronic communication to a third-party computing device.

“18. The non-transitory computer-readable medium of claim 14, wherein scanning the webpage comprises at least one of scanning the webpage for content indicating receipt of the security certification by the vendor, scanning the webpage for an image indicating receipt of the security certification by the vendor, or scanning computer code associated with the webpage to identify an indication of the security certification.

“19. The non-transitory computer-readable medium of claim 14, wherein the operations further comprise: determining a presence of a suitable privacy notice on the website, and the vendor risk rating is further based on the presence of the suitable privacy notice.

“20. The non-transitory computer-readable medium of claim 14, wherein the operations further comprise: determining a presence of a control center on the website that enables a visitor to the website to allow collection of certain data, and the vendor risk rating is further based on the presence of the control center.”

For more information, see this patent: Brannon, Jonathan Blake. Data processing and scanning systems for assessing vendor risk. U.S. Patent Number 11366909, filed June 8, 2021, and published online on June 21, 2022. Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=11366909.PN.&OS=PN/11366909RS=PN/11366909

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Patent Issued for Senior living engagement and care support platforms (USPTO 11367527): State Farm Mutual Automobile Insurance Company

Newer

Australian National University Researchers Describe Research in Risk Management (Air Pollution and Mortality Impacts): Insurance – Risk Management

Advisor News

  • Health insurance premium tax bill advancing
  • The Medi-Cal money pit
  • The untapped potential of Qualified Longevity Annuity Contracts
  • NYC's fiscal outlook on downslide over budget gaps
  • Health insurance premium tax bill moving in Iowa House
More Advisor News

Annuity News

  • An Application for the Trademark “GREAT-WEST LIFE & ANNUITY INSURANCE COMPANY” Has Been Filed by Great-West Life & Annuity Insurance Company: Great-West Life & Annuity Insurance Company
  • The forces shaping life and annuities in 2026
  • Variable annuity sales surge as market confidence remains high, Wink finds
  • New Allianz Life Annuity Offers Added Flexibility in Income Benefits
  • How to elevate annuity discussions during tax season
More Annuity News

Health/Employee Benefits News

  • From $500 to $1.5K: Marylanders feel financial impact of expired ACA tax credits
  • The politics behind America's new health insurance shock
  • Health insurance premium tax bill advancing
  • Families oppose bill locking in Iowa Medicaid privatization
  • The Medi-Cal money pit
More Health/Employee Benefits News

Life Insurance News

  • Hulse, Murray
  • Murray Giles Hulse
  • Oaktree grabs control of Atlantic Coast Life Co. in blockbuster A-Cap deal
  • AM Best Removes From Under Review With Developing Implications and Downgrades Credit Ratings of Banner Life Insurance Company and William Penn Life Insurance Company of New York
  • The forces shaping life and annuities in 2026
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

Your Cap. Your Term. Locked.
Oceanview CapLock™. One locked cap. No annual re-declarations. Clear expectations from day one.

Ready to make your client presentations more engaging?
EnsightTM marketing stories, available with select Allianz Life Insurance Company of North America FIAs.

Press Releases

  • RFP #T02226
  • YourMedPlan Appoints Kevin Mercier as Executive Vice President of Business Development
  • ICMG Golf Event Raises $43,000 for Charity During Annual Industry Gathering
  • RFP #T25521
  • ICMG Announces 2026 Don Kampe Lifetime Achievement Award Recipient
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet