US20140278539A1 - Graphical representations of time-ordered data - Google Patents
Graphical representations of time-ordered data Download PDFInfo
- Publication number
- US20140278539A1 US20140278539A1 US13/860,030 US201313860030A US2014278539A1 US 20140278539 A1 US20140278539 A1 US 20140278539A1 US 201313860030 A US201313860030 A US 201313860030A US 2014278539 A1 US2014278539 A1 US 2014278539A1
- Authority
- US
- United States
- Prior art keywords
- gui
- peripheral
- party
- node
- time period
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G06Q50/24—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04842—Selection of displayed objects or displayed text elements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/04847—Interaction techniques to control parameter settings, e.g. interaction with sliders or dials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/10—Tax strategies
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16H—HEALTHCARE INFORMATICS, i.e. INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR THE HANDLING OR PROCESSING OF MEDICAL OR HEALTHCARE DATA
- G16H10/00—ICT specially adapted for the handling or processing of patient-related medical or healthcare data
- G16H10/60—ICT specially adapted for the handling or processing of patient-related medical or healthcare data for patient-specific data, e.g. for electronic patient records
Definitions
- HIPAA Health Insurance Portability and Accountability Act
- institutions In order to comply with laws governing information security, such as the Health Insurance Portability and Accountability Act (HIPAA), certain institutions must maintain audit logs that track how often customer electronic records are accessed, the reasons for accessing the records (e.g., documentation, modification, etc.), and the identities of users who are accessing the electronic records. Examples of institutions include healthcare facilities, financial institutions, educational institutions, and the like.
- time-ordered audit events may represent instances where customer electronic records have been accessed by a party-of-interest during a specified time frame.
- the electronic records may include financial records, educational records, health records, insurance records, and the like.
- the party-of-interest is a clinician and the audit events represent instances where the clinician has accessed patient electronic medical records (EMRs).
- EMRs patient electronic medical records
- a healthcare facility may become suspicious of the activities of the clinician, or a patient may have filed a complaint alleging some sort of privacy breach.
- the healthcare facility may wish to view an audit log of EMR accesses during a specified time frame and details associated with each access.
- An intuitive and easy-to-use graphical user interface (GUI) is needed to facilitate this process.
- the present invention provides for a GUI that utilizes, in one aspect, timelines that enable a user to select a desired time frame, a central node representing the party-of-interest, and one or more peripheral nodes representing parties having electronic records that have been accessed by the party-of-interest during the selected time frame.
- the term “party-of-interest” refers to a person employed or associated with a facility maintaining an audit log and who has access rights to electronic records kept by the facility.
- parties-of-interest include clinicians, bank officers, teachers, administrators, and the like.
- the term “party” refers to an entity who receives services provided by the facility. As such, the party may refer to a customer, a patient, a student, and the like.
- the size of the peripheral nodes provides an indication of how frequently the electronic records were accessed.
- both the central node and the peripheral nodes are actionable allowing a user to quickly gather information regarding, for example, the identity of the party-of-interest, the parties, and/or options for viewing additional information regarding the electronic record access.
- the present invention provides for a GUI that utilizes one or more timelines configured to enable a user to select a time frame, a central node representing a party (e.g., a patient who is alleging a privacy breach), and one or more peripheral nodes representing parties-of-interest who have accessed the party's electronic records during the specified time frame.
- the size of the peripheral nodes indicates how frequently the party's electronic record was accessed by the node's respective party-of-interest
- both the central node and the peripheral nodes are actionable allowing a user to access information regarding, for example, the identity of the parties-of-interest, the party, and/or options for viewing additional information regarding the electronic record access.
- the present invention provides for a GUI that utilizes one or more timelines configured to enable a user to select a desired time frame, a display area providing an indication of a party and a party-of-interest, and a clockwise timeline having one or more icons overlaid at different points in time; the bounds of the clockwise timeline correspond to the specified time frame.
- the icons represent different types of audit events associated with the party and the party-of-interest. For instance, using healthcare as an example, one audit event may be the clinician accessing the patient's EMR to order a medication, while another audit event may be the clinician accessing the patient's EMR to document a clinical note.
- the icons are actionable, and interaction with an icon can initiate the presentation of a summary of the associated audit event.
- FIG. 1 is a block diagram of an exemplary computing environment suitable to implement embodiments of the present invention
- FIG. 2 is a block diagram of an exemplary system for visually representing time-ordered data related to a party-of-interest suitable to implement embodiments of the present invention
- FIG. 3 is an exemplary graphical user interface having a central node representing a party-of-interest and one or more peripheral nodes representing parties having electronic records accessed by the party-of-interest during a specified time frame in accordance with an embodiment of the present invention
- FIG. 4 is an exemplary graphical user interface having a central node representing a party and one or more peripheral nodes representing parties-of-interest who have accessed electronic records associated with the party during a specified time frame in accordance with an embodiment of the present invention
- FIG. 5 is an exemplary graphical user interface having a clockwise timeline with icons overlaying points in time corresponding to audit-type events between a party and a party-of-interest in accordance with an embodiment of the present invention.
- Embodiments of the present invention are directed to methods, systems, and computer-storage media for presenting graphical representations of time-ordered audit events.
- the time-ordered audit events may represent instances where electronic records associated with one or more parties have been accessed by a party-of-interest during a specified time frame.
- parties-of-interest refers to a person employed or associated with a facility maintaining an audit log and who has access rights to electronic records kept by the facility.
- Exemplary parties-of-interest include clinicians, bank officers, administrators, teachers, and the like.
- the term “party” refers to an entity who receives services provided by the facility. As such, the party may refer to a customer, a patient, a student, and the like.
- the electronic records may include financial records, educational records, health records, insurance records, and the like.
- FIG. 1 is an exemplary computing environment (e.g., medical-information computing-system environment) with which embodiments of the present invention may be implemented.
- the computing environment is illustrated and designated generally as reference numeral 100 .
- the computing environment 100 is merely an example of one suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should the computing environment 100 be interpreted as having any dependency or requirement relating to any single component or combination of components illustrated therein.
- the present invention might be operational with numerous other purpose computing system environments or configurations.
- Examples of well-known computing systems, environments, and/or configurations that might be suitable for use with the present invention include personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above-mentioned systems or devices, and the like.
- the present invention might be described in the general context of computer-executable instructions, such as program modules, being executed by a computer.
- Exemplary program modules comprise routines, programs, objects, components, and data structures that perform particular tasks or implement particular abstract data types.
- the present invention might be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network.
- program modules might be located in association with local and/or remote computer storage media (e.g., memory storage devices).
- the computing environment 100 comprises a computing device in the form of a control server 102 .
- Exemplary components of the control server 102 comprise a processing unit, internal system memory, and a suitable system bus for coupling various system components, including data store 104 , with the control server 102 .
- the system bus might be any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, and a local bus, using any of a variety of bus architectures.
- Exemplary architectures comprise Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronic Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, also known as Mezzanine bus.
- ISA Industry Standard Architecture
- MCA Micro Channel Architecture
- EISA Enhanced ISA
- VESA Video Electronic Standards Association
- PCI Peripheral Component Interconnect
- the control server 102 typically includes therein, or has access to, a variety of non-transitory computer-readable media.
- Computer-readable media can be any available media that might be accessed by control server 102 , and includes volatile and nonvolatile media, as well as, removable and nonremovable media.
- Computer-readable media may comprise computer storage media and communication media.
- Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data.
- Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by control server 102 .
- Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
- modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.
- the control server 102 might operate in a computer network 106 using logical connections to one or more remote computers 108 .
- Remote computers 108 might be located at a variety of locations in a medical or research environment, including clinical laboratories (e.g., molecular diagnostic laboratories), hospitals and other inpatient settings, veterinary environments, ambulatory settings, medical billing and financial offices, hospital administration settings, home healthcare environments, and clinicians' offices.
- Clinicians may comprise a treating physician or physicians; specialists such as surgeons, radiologists, cardiologists, and oncologists; emergency medical technicians; physicians' assistants; nurse practitioners; nurses; nurses' aides; pharmacists; dieticians; microbiologists; laboratory experts; laboratory technologists; genetic counselors; researchers; veterinarians; students; and the like.
- the remote computers 108 might also be physically located in nontraditional medical care environments so that the entire healthcare community might be capable of integration on the network.
- the remote computers 108 might be personal computers, servers, routers, network PCs, peer devices, other common network nodes, or the like and might comprise some or all of the elements described above in relation to the control server 102 .
- the devices can be personal digital assistants or other like devices.
- Computer networks 106 comprise local area networks (LANs) and/or wide area networks (WANs). Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet.
- the control server 102 When utilized in a WAN networking environment, the control server 102 might comprise a modem or other means for establishing communications over the WAN, such as the Internet.
- program modules or portions thereof might be stored in association with the control server 102 , the data store 104 , or any of the remote computers 108 .
- various application programs may reside on the memory associated with any one or more of the remote computers 108 . It will be appreciated by those of ordinary skill in the art that the network connections shown are exemplary and other means of establishing a communications link between the computers (e.g., control server 102 and remote computers 108 ) might be utilized.
- an organization might enter commands and information into the control server 102 or convey the commands and information to the control server 102 via one or more of the remote computers 108 through input devices, such as a keyboard, a pointing device (commonly referred to as a mouse), a trackball, or a touch pad.
- input devices such as a keyboard, a pointing device (commonly referred to as a mouse), a trackball, or a touch pad.
- Other input devices comprise microphones, satellite dishes, scanners, or the like.
- Commands and information might also be sent directly from a remote healthcare device to the control server 102 .
- the control server 102 and/or remote computers 108 might comprise other peripheral output devices, such as speakers and a printer.
- control server 102 and the remote computers 108 are not shown, such components and their interconnection are well known. Accordingly, additional details concerning the internal construction of the control server 102 and the remote computers 108 are not further disclosed herein.
- FIG. 2 an exemplary computing system environment 200 is depicted suitable for use in implementing embodiments of the present invention.
- the computing system environment 200 is merely an example of one suitable computing system environment and is not intended to suggest any limitation as to the scope of use or functionality of embodiments of the present invention. Neither should the computing system environment 200 be interpreted as having any dependency or requirement related to any single module/component or combination of modules/components illustrated therein.
- the computing system environment 200 includes a graphical generator 210 , a data store 212 , and an end-user computing device 214 all in communication with one another via a network 216 .
- the network 216 may include, without limitation, one or more local area networks (LANs) or wide area networks (WANs).
- the network 216 may be a secure network associated with a facility such as a healthcare facility, a financial institution, an educational institution, and the like.
- the secure network 216 may require that a user log in and be authenticated in order to send and/or receive information over the network 216 .
- one or more of the illustrated components/modules may be implemented as stand-alone applications. In other embodiments, one or more of the illustrated components/modules may be integrated directly into the operating system of the graphical generator 210 .
- the components/modules illustrated in FIG. 2 are exemplary in nature and in number and should not be construed as limiting. Any number of components/modules may be employed to achieve the desired functionality within the scope of embodiments hereof. Further, components/modules may be located on any number of servers. By way of example only, the graphical generator 210 might reside on a server, a cluster of servers, or a computing device remote from one or more of the remaining components.
- the data store 212 is configured to store information for use by, for example, the graphical generator 210 and/or the end-user computing device 214 .
- the information stored in association with the data store 212 is configured to be searchable for one or more items of information stored in association therewith.
- the information stored in association with the data store 212 may comprise general information used by the graphical generator 210 and/or the end-user computing device 214 .
- the data store 212 may store audit logs kept by an entity.
- audit log or “audit trail” refers to chronological records of system activities that enable the reconstruction and examination of the sequence of events and/or changes in an event. More specifically, the term audit log may refer to chronological records of customer electronic record access and details associated with such access.
- the entity may include financial institutions, educational institutions, healthcare facilities, and the like.
- the data store 212 may store electronic medical records (EMRs) of patients associated with the healthcare facility.
- EMRs may comprise electronic clinical documents such as images, clinical notes, orders, summaries, reports, analyses, or other types of electronic medical documentation relevant to a particular patient's condition and/or treatment.
- Electronic clinical documents contain various types of information relevant to the condition and/or treatment of a particular patient and can include information relating to, for example, patient identification information, images, alert history, culture results, physical examinations, vital signs, past medical histories, surgical histories, family histories, histories of present illnesses, current and past medications, allergies, symptoms, past orders, completed orders, pending orders, tasks, lab results, other test results, patient encounters and/or visits, immunizations, physician comments, nurse comments, other caretaker comments, and a host of other relevant clinical information.
- the data store 212 may, in fact, be a plurality of storage devices, for instance, a database cluster, portions of which may reside on the graphical generator 210 , the end-user computing device 214 , and/or any combination thereof.
- the end-user computing device 214 includes a display screen 215 .
- the display screen 215 is configured to display information to the user of the end-user computing device 214 , for instance, information relevant to communications initiated by and/or received by the end-user computing device 214 , graphical representations of audit events, and/or the like.
- Embodiments are not intended to be limited to visual display but rather may also include audio presentation, combined audio/visual presentation, and the like.
- the end-user computing device 214 may be any type of display device suitable for presenting a graphical user interface.
- Such computing devices may include, without limitation, a computer, such as, for example, any of the remote computers 108 described above with reference to FIG. 1 .
- Other types of display devices may include tablet PCs, PDAs, mobile phones, smart phones, as well as conventional display devices such as televisions. Interaction with the graphical user interface may be via a touch pad, a pointing device, and/or gestures.
- Components of the graphical generator 210 may include a processing unit, internal system memory, and a suitable system bus for coupling various system components, including one or more data stores for storing information (e.g., files and metadata associated therewith).
- the graphical generator 210 typically includes, or has access to, a variety of computer-readable media.
- the computing system environment 200 is merely exemplary. While the graphical generator 210 is illustrated as a single unit, it will be appreciated that the graphical generator 210 is scalable. For example, the graphical generator 210 may in actuality include a plurality of computing devices in communication with one another. Moreover, the data store 212 , or portions thereof, may be included within, for instance, the graphical generator 210 as a computer-storage medium.
- the single unit depictions are meant for clarity, not to limit the scope of embodiments in any form.
- the graphical generator 210 comprises a receiving component 218 and a rendering component 220 .
- one or more of the components 218 and 220 may be implemented as stand-alone applications.
- one or more of the components 218 and 220 may be integrated directly into the operating system of a computing device such as the remote computer 108 of FIG. 1 .
- the components 218 and 220 illustrated in FIG. 2 are exemplary in nature and in number and should not be construed as limiting. Any number of components may be employed to achieve the desired functionality within the scope of embodiments hereof.
- the receiving component 218 is configured to receive user selections, commands, filters, requests, or inputs.
- User selections and/or requests may include requests for graphical representations of audit events. Further, the user is able to select different views of the audit events. For instance, one request may be for a graphical representation of electronic records accessed by a party-of-interest during a specified time frame. Another request may be for a graphical representation of all parties-of-interest who have accessed a specified party's electronic records during a specified time frame. An additional request may be for a graphical representation of a detail view of audit events relating to a specified party-of-interest and a party.
- the rendering component 220 is configured to utilize audit logs stored in association with the data store 212 in order to respond to the requests received by the receiving component 218 . As such, the rendering component 220 is configured to render graphical representations of audit events on a graphical user interface (GUI) that may be presented on the display screen 215 of the end-user computing device 214 .
- GUI graphical user interface
- FIGS. 3-6 depict exemplary GUIs illustrating the presentation of graphical representations of audit events.
- FIG. 3 depicts a GUI 300 in which the party-of-interest is represented by a central node 314 and one or more peripheral nodes, e.g., nodes 316 a , 316 b , and 316 c , surrounding the central node 314 represent parties having electronic records accessed by the party-of-interest during a specified time frame.
- the nodes 316 a - c are numbered and referenced in the GUI 300 , the following discussion is applicable to all of the peripheral nodes shown in the GUI 300 .
- the GUI 300 may be especially useful in situations where a facility suspects that a party-of-interest may be in violation of information security requirements.
- the party-of-interest represented by the central node 314 and the parties represented by the peripheral nodes 316 a - c may be represented by circles as shown. Other ways of representing the party-of-interest and the parties are contemplated.
- the nodes 314 and/or 316 a - c may be represented by other geometric shapes such as squares, triangles, ovals, diamonds, and the like.
- the nodes 314 and/or 316 a - c may be represented by stylized icons corresponding to a person, or a picture of the party or party-of-interest represented by the node. Any and all such variations, and any combination thereof, are contemplated as being within the scope of the invention.
- the party-of-interest and/or the parties' names may be presented in association with the nodes 314 and/or 316 a - c.
- Arrows, such as arrow 318 indicate a direction of access.
- the arrow 318 indicates that the party-of-interest represented by the central node 314 accessed the electronic record of the party represented by the peripheral node 316 a instead of vice versa.
- the GUI 300 further includes timelines 310 and 312 .
- the timeline 310 represents a coarse-grained timeline covering a time period from the inception of the audit log to the current point in time.
- the timeline 310 includes a bi-directional slider 311 that enables a user to select a time period in months and years.
- the timeline 312 represents a fine-grained timeline having a range corresponding to the range selected by the slider 311 on the coarse-grained timeline 310 .
- the timeline 312 includes a bi-directional slider 313 that enables a user to select a time period in months and days. The use of timelines 310 and 312 enables a user to quickly narrow in on the time period in question.
- Changing the specified time frame using either the bi-directional slider 311 and/or the bi-directional slider 313 causes the number of peripheral nodes presented on the GUI 300 to automatically update in real time. For example, a user may initially select a time frame corresponding to Apr. 1, 2011- May 1, 2011. In response to the selection, a first set of peripheral nodes is presented corresponding to parties having electronic records accessed during the selected time frame by the party-of-interest represented by the central node 314 . The user may then select a time frame corresponding to Apr. 1, 2011-Aug. 1, 2011. The number of peripheral nodes may dynamically increase because the number of electronic records accessed by the party-of-interest would likely be greater since the time span is longer.
- the size of the peripheral nodes represents the frequency with which the node's respective electronic record was accessed by the party-of-interest.
- a larger-sized node indicates a greater frequency of access and a smaller-sized node indicates a lesser frequency of access.
- the party's electronic record associated with the peripheral node 316 c has been accessed at a higher frequency than the electronic records associated with the peripheral nodes 316 a and 316 b .
- a larger-sized node indicates a lesser frequency of access and a smaller-sized node indicates a greater frequency of access. Any and all such aspects, and any combination thereof, are contemplated as being within the scope of the invention.
- Each of the nodes 314 and 316 a - c is actionable. Interaction via, for example, hovering over the central node 314 and/or peripheral nodes 316 a - c may initiate the presentation of user-identifying information for the party and/or party-of-interest represented by the node.
- user-identifying information may include name, role description, access rights associated with the party-of-interest, how long the party-of-interest has been associated with the company maintaining the audit logs, and the like.
- user-identifying information may include name, date-of-birth, address, gender, identifiers (e.g., customer ID), date of service, and the like.
- Selection via, for example, a right or left mouse click and/or a tapping gesture of a peripheral node such as the peripheral node 316 a may automatically initiate a new GUI such as the GUI shown in FIG. 4 , or may initiate the presentation of a set of options.
- One option may be for the presentation of a GUI where the party represented by the selected peripheral node 316 a is presented as the central node and peripheral nodes represent parties-of-interest who have accessed the party's electronic records during a specified time frame (e.g., the GUI shown in FIG. 4 ).
- Another option may be for the presentation of a GUI where details concerning the audit events between the party represented by the selected peripheral node 316 a and the party-of-interest represented by the central node 314 are depicted on a circular timeline (e.g., the GUI shown in FIG. 5 ).
- the GUI 300 may also include an area that presents one or more filters. Selection of a filter restricts the peripheral nodes to those nodes that meet the filter criteria.
- Exemplary filters may include filters based on the gender of the party represented by the peripheral nodes, filters corresponding to party roles (employee, customer, etc.), filters corresponding to specific types of audit events such as accessing an electronic record to place an order, make a change to a document, or create a new document, filters based on location such as the venue or facility in which the audit event took place, filters corresponding to a IP address or a device ID that indicate the device used to access the electronic record, and/or customized filters.
- a displayed filter may be presented in association with a numerical indicator (displayed adjacent to the filter name) that provides an indication of the number of results in the result set for that filter. For instance, “Female (17)” indicates that there are 17 results in the result set for the female filter.
- a healthcare facility may suspect that Clinician A is improperly prescribing narcotic medications. The healthcare facility may select a medication filter that restricts the peripheral nodes to those patients whose EMRs were accessed by Clinician A in order to prescribe narcotic medications.
- FIG. 4 depicts a GUI 400 where a central node 414 represents a party and one or more peripheral nodes surrounding the central node 414 , e.g., peripheral nodes 416 a and 416 b , represent parties-of-interest who have accessed the party's electronic record during a specified time frame.
- peripheral nodes 416 a and 416 b are numbered and referenced in the GUI 400 , the discussion that follows is applicable to all of the peripheral nodes shown in the GUI 400 .
- the GUI 400 may be presented in response to a selection of one of the options discussed with respect to the GUI 300 (e.g., the options that are presented when a user selects or otherwise interacts with one of the peripheral nodes 316 a - c ).
- the GUI 400 may be especially useful in those situations where the party represented by the central node 414 alleges a privacy breach, and the facility wishes to view parties-of-interest who have accessed the party's electronic records during a specified time frame.
- Arrows, such as arrow 418 represent the direction of access of the electronic record. For example, the arrow 418 indicates that the party-of-interest associated with the node 416 a accessed the electronic record of the party represented by the central node 414 and not vice versa.
- the party and the parties-of-interest may be represented by circles as shown.
- Other ways of representing the party and the parties-of-interest include other geometric shapes, icons, pictures, and the like.
- the name of the party and/or the parties-of-interest may be presented on the central node 414 and/or the peripheral nodes 416 a - b when space permits.
- the GUI 400 also includes timelines 410 and 412 similar to the timelines 310 and 312 of FIG. 3 .
- the timelines 410 and 412 will reflect the same timeframes as those selected using the timelines 310 and 312 unless otherwise changed by the user.
- the timeline 410 represents a coarse-grained timeline covering a time frame from the inception of the audit log to the current point in time.
- the timeline 410 includes a bi-direction slider 411 that enables the selection of a time period in months and years.
- the timeline 412 represents a fine-grained timeline having a range corresponding to the range selected by the slider 411 .
- the timeline 413 also includes a bi-directional slider 413 that enables the selection of a time period in days and months. Changing the specified time frame using the bi-directional sliders 411 and/or 413 causes the peripheral nodes to dynamically update to reflect the parties-of-interest that have accessed the party's electronic record during the new time frame.
- the size of the peripheral nodes reflects the frequency with which the parties-of-interest represented by the peripheral nodes 416 a - b have accessed the party's electronic record.
- a larger-sized peripheral node indicates a greater frequency of access and a smaller-sized peripheral node indicates a lesser frequency of access.
- the party-of-interest represented by the peripheral node 416 a has accessed the party's electronic record more frequently than the party-of-interest represented by the peripheral node 416 b .
- a smaller-sized peripheral node indicates a greater frequency of access and a larger-sized node indicates a lesser frequency of access. Any and all such variations, and any combination thereof, are contemplated as being within the scope of the invention.
- Each of the nodes 414 and 416 a - b is actionable. Interaction via, for example, hovering over the central node 414 and/or peripheral nodes 416 a - b may initiate the presentation of user-identifying information for the party and/or party-of-interest represented by the node.
- user-identifying information may include name, date-of-birth, address, gender, identifiers (e.g., customer ID), date of service, and the like.
- user-identifying information may include name, role description, access rights associated with the party-of-interest, how long the party-of-interest has been associated with the company maintaining the audit log, and the like.
- Selection via, for example, a right or left mouse click and/or a tapping gesture of a peripheral node such as the peripheral node 416 a may automatically initiate the presentation of a new GUI such as the GUI shown in FIG. 5 , or may initiate the presentation of a set of options.
- One option may be for the presentation of a GUI corresponding to the GUI 300 where the central node represents the party-of-interest associated with the peripheral node 416 a .
- Another option may be for the presentation of a GUI, such as the GUI shown in FIG. 5 , where details concerning the audit events between the party represented by the central node 414 and the party-of-interest represented by the peripheral node 416 a are depicted on a circular timeline.
- the GUI 400 may also include filters (not shown). Selection of a filter restricts the peripheral nodes to those nodes that meet the requirements of the selected filter.
- the filters associated with the GUI 400 may be the same or different than the filters associated with the GUI 300 .
- Exemplary filters may include gender filters, role filters, types of audit events, location filters, device or IP address filters, and/or customized filters.
- An additional filter that may be used in the context of the GUI 400 includes a filter that specifies parties-of-interest. Like above, a numerical indicator may be displayed alongside the filter name to provide an indication of the number of results in the result set for that filter.
- FIG. 5 depicts a GUI 500 that presents a detailed view of audit events related to a specified party and a specified party-of-interest.
- the GUI 500 may be initiated in response to a selection of an option as described with respect to the GUI 300 or the GUI 400 .
- the GUI 500 includes a first display area 514 that indicates the specified party and the specified party-of-interest (in this case, the specified party-of-interest is Dr. Robert Smith and the specified party is Mary Thomas).
- the party and the party-of-interest may be indicated by their respective names. Other ways of indicating the party and the party-of-interest may include icons or pictures.
- An arrow 515 in the first display area 514 depicts a direction of access. For example, the arrow 515 indicates that Dr. Robert Smith accessed patient Mary Thomas' EMR.
- the GUI 500 also includes timelines 510 and 512 which are similar to the timelines 410 and 412 of FIG. 4 and the timelines 310 and 312 of FIG. 3 .
- the timelines 510 and 512 represent the same timeframe as selected using the timelines 410 and 412 and/or the timelines 310 and 312 unless otherwise changed by the user.
- the timeline 510 comprises a coarse-grained timeline that enables selection of a time period in months and years by using a bi-directional slider 511 .
- the timeline 512 represents a fine-grained timeline that enables selection of a time period in months and days using a bi-directional slider 513 . Changing the time period using the bi-directional sliders 511 and/or 513 causes the GUI 500 to automatically update to reflect audit events corresponding to the new time period.
- the GUI 500 further comprises a circular timeline 516 surrounding the first display area 514 ; the circular timeline 516 has bounds 518 and 520 corresponding to the time period selected by the bi-directional sliders 511 and 513 .
- Overlaying the circular timeline 516 at distinct points in time are one or more icons, e.g., icons 522 , 524 , 526 , and 528 , representing one or more audit events that occurred at that respective point in time.
- icons 522 e.g., a square
- the icon 524 e.g., a star
- the icon 526 (e.g., a hexagon) may represent an electronic record access to create a new document
- the icon 528 e.g., a circle
- a legend may be provided in association with the GUI 500 detailing the different type of audit events associated with the icons.
- the types of audit events described and the shape of the icons 522 , 524 , 526 , and 528 are merely exemplary. Other types of audit events and other shapes of icons are contemplated and are within the scope of the current invention.
- Hovering over or otherwise interacting with the icons 522 , 524 , 526 , and 528 initiates a quick summary view of the audit event associated with the icon. For example, hovering over the icon 522 may initiate the summary “ordered ibuprofen 400 mg, b.i.d. on 01/26/2011 at 8:43 am.” Selecting an icon, such as the icon 522 , may initiate a detailed view of the audit event. For example, selecting an icon may cause the presentation of the portion of the electronic record corresponding to the icon. Using the example above, selecting the icon 522 may initiate the presentation of the patient's EMR corresponding to the ordering event.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Economics (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Epidemiology (AREA)
- Data Mining & Analysis (AREA)
- Public Health (AREA)
- Primary Health Care (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Health & Medical Sciences (AREA)
- User Interface Of Digital Computer (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Technology Law (AREA)
Abstract
Methods, systems, and computer-storage media are provided for generating graphical representations of audit events. A party-of-interest is represented by a central node, and one or more peripheral nodes surrounding the central node represent parties having electronic records accessed by the party-of-interest during a selected time frame. The size of the peripheral nodes represents a frequency of access of the node's respective electronic record. Each of the peripheral nodes is actionable enabling a user to view information related to the audit event.
Description
- This application, having attorney docket number CRNI.181248, claims the benefit of priority of U.S. Provisional Application No. 61/783,356, filed Mar. 14, 2013 and entitled “Graphical Representations of Time-Ordered Data.” The entirety of the aforementioned application is incorporated by reference herein.
- In order to comply with laws governing information security, such as the Health Insurance Portability and Accountability Act (HIPAA), certain institutions must maintain audit logs that track how often customer electronic records are accessed, the reasons for accessing the records (e.g., documentation, modification, etc.), and the identities of users who are accessing the electronic records. Examples of institutions include healthcare facilities, financial institutions, educational institutions, and the like.
- Most commercial tools for querying audit logs employ some form of report generation based loosely on the concept of relational queries. Many of the reports are batch-oriented in nature because of the computational and input/output demands necessary to conduct the underlying queries. As well, these reports are often presented in the form of two-dimensional tables. While these reports may be sufficient to meet information security requirements, they are not necessarily intuitive and efficient for end users nor do they facilitate the exploration of audit events related to a particular user.
- This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter. The present invention is defined by the claims.
- In brief and at a high level, this disclosure describes, among other things, methods, systems, and computer-storage media for presenting graphical representations of time-ordered audit events. The time-ordered audit events may represent instances where customer electronic records have been accessed by a party-of-interest during a specified time frame. The electronic records may include financial records, educational records, health records, insurance records, and the like.
- In one aspect, the party-of-interest is a clinician and the audit events represent instances where the clinician has accessed patient electronic medical records (EMRs). For example, a healthcare facility may become suspicious of the activities of the clinician, or a patient may have filed a complaint alleging some sort of privacy breach. In response to either of these two situations, the healthcare facility may wish to view an audit log of EMR accesses during a specified time frame and details associated with each access. An intuitive and easy-to-use graphical user interface (GUI) is needed to facilitate this process.
- As such, the present invention provides for a GUI that utilizes, in one aspect, timelines that enable a user to select a desired time frame, a central node representing the party-of-interest, and one or more peripheral nodes representing parties having electronic records that have been accessed by the party-of-interest during the selected time frame. As used throughout this application, the term “party-of-interest” refers to a person employed or associated with a facility maintaining an audit log and who has access rights to electronic records kept by the facility. Exemplary parties-of-interest include clinicians, bank officers, teachers, administrators, and the like. The term “party” refers to an entity who receives services provided by the facility. As such, the party may refer to a customer, a patient, a student, and the like. The size of the peripheral nodes provides an indication of how frequently the electronic records were accessed. As well, both the central node and the peripheral nodes are actionable allowing a user to quickly gather information regarding, for example, the identity of the party-of-interest, the parties, and/or options for viewing additional information regarding the electronic record access.
- In another aspect, the present invention provides for a GUI that utilizes one or more timelines configured to enable a user to select a time frame, a central node representing a party (e.g., a patient who is alleging a privacy breach), and one or more peripheral nodes representing parties-of-interest who have accessed the party's electronic records during the specified time frame. The size of the peripheral nodes indicates how frequently the party's electronic record was accessed by the node's respective party-of-interest Like above, both the central node and the peripheral nodes are actionable allowing a user to access information regarding, for example, the identity of the parties-of-interest, the party, and/or options for viewing additional information regarding the electronic record access.
- In yet another aspect, the present invention provides for a GUI that utilizes one or more timelines configured to enable a user to select a desired time frame, a display area providing an indication of a party and a party-of-interest, and a clockwise timeline having one or more icons overlaid at different points in time; the bounds of the clockwise timeline correspond to the specified time frame. The icons represent different types of audit events associated with the party and the party-of-interest. For instance, using healthcare as an example, one audit event may be the clinician accessing the patient's EMR to order a medication, while another audit event may be the clinician accessing the patient's EMR to document a clinical note. The icons are actionable, and interaction with an icon can initiate the presentation of a summary of the associated audit event.
- Embodiments are described in detail below with reference to the attached drawing figures, wherein:
-
FIG. 1 is a block diagram of an exemplary computing environment suitable to implement embodiments of the present invention; -
FIG. 2 is a block diagram of an exemplary system for visually representing time-ordered data related to a party-of-interest suitable to implement embodiments of the present invention; -
FIG. 3 is an exemplary graphical user interface having a central node representing a party-of-interest and one or more peripheral nodes representing parties having electronic records accessed by the party-of-interest during a specified time frame in accordance with an embodiment of the present invention; -
FIG. 4 is an exemplary graphical user interface having a central node representing a party and one or more peripheral nodes representing parties-of-interest who have accessed electronic records associated with the party during a specified time frame in accordance with an embodiment of the present invention; and -
FIG. 5 is an exemplary graphical user interface having a clockwise timeline with icons overlaying points in time corresponding to audit-type events between a party and a party-of-interest in accordance with an embodiment of the present invention. - The subject matter of the present invention is described with specificity herein to meet statutory requirements. However, the description itself is not intended to limit the scope of this patent. Rather, the inventors have contemplated that the claimed subject matter might also be embodied in other ways, to include different steps or combinations of steps similar to the ones described in this document, in conjunction with other present or future technologies. Moreover, although the terms “step” and/or “block” may be used herein to connote different elements of methods employed, the terms should not be interpreted as implying any particular order among or between various steps herein disclosed unless and except when the order of individual steps is explicitly described.
- Embodiments of the present invention are directed to methods, systems, and computer-storage media for presenting graphical representations of time-ordered audit events. The time-ordered audit events may represent instances where electronic records associated with one or more parties have been accessed by a party-of-interest during a specified time frame. As mentioned, the term “party-of-interest” refers to a person employed or associated with a facility maintaining an audit log and who has access rights to electronic records kept by the facility. Exemplary parties-of-interest include clinicians, bank officers, administrators, teachers, and the like. The term “party” refers to an entity who receives services provided by the facility. As such, the party may refer to a customer, a patient, a student, and the like. The electronic records may include financial records, educational records, health records, insurance records, and the like.
- An exemplary computing environment suitable for use in implementing embodiments of the present invention is described below.
FIG. 1 is an exemplary computing environment (e.g., medical-information computing-system environment) with which embodiments of the present invention may be implemented. The computing environment is illustrated and designated generally asreference numeral 100. Thecomputing environment 100 is merely an example of one suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should thecomputing environment 100 be interpreted as having any dependency or requirement relating to any single component or combination of components illustrated therein. - The present invention might be operational with numerous other purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that might be suitable for use with the present invention include personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above-mentioned systems or devices, and the like.
- The present invention might be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Exemplary program modules comprise routines, programs, objects, components, and data structures that perform particular tasks or implement particular abstract data types. The present invention might be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules might be located in association with local and/or remote computer storage media (e.g., memory storage devices).
- With continued reference to
FIG. 1 , thecomputing environment 100 comprises a computing device in the form of acontrol server 102. Exemplary components of thecontrol server 102 comprise a processing unit, internal system memory, and a suitable system bus for coupling various system components, includingdata store 104, with thecontrol server 102. The system bus might be any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, and a local bus, using any of a variety of bus architectures. Exemplary architectures comprise Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronic Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus, also known as Mezzanine bus. - The
control server 102 typically includes therein, or has access to, a variety of non-transitory computer-readable media. Computer-readable media can be any available media that might be accessed bycontrol server 102, and includes volatile and nonvolatile media, as well as, removable and nonremovable media. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed bycontrol server 102. Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media. - The
control server 102 might operate in acomputer network 106 using logical connections to one or moreremote computers 108.Remote computers 108 might be located at a variety of locations in a medical or research environment, including clinical laboratories (e.g., molecular diagnostic laboratories), hospitals and other inpatient settings, veterinary environments, ambulatory settings, medical billing and financial offices, hospital administration settings, home healthcare environments, and clinicians' offices. Clinicians may comprise a treating physician or physicians; specialists such as surgeons, radiologists, cardiologists, and oncologists; emergency medical technicians; physicians' assistants; nurse practitioners; nurses; nurses' aides; pharmacists; dieticians; microbiologists; laboratory experts; laboratory technologists; genetic counselors; researchers; veterinarians; students; and the like. Theremote computers 108 might also be physically located in nontraditional medical care environments so that the entire healthcare community might be capable of integration on the network. Theremote computers 108 might be personal computers, servers, routers, network PCs, peer devices, other common network nodes, or the like and might comprise some or all of the elements described above in relation to thecontrol server 102. The devices can be personal digital assistants or other like devices. -
Computer networks 106 comprise local area networks (LANs) and/or wide area networks (WANs). Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets, and the Internet. When utilized in a WAN networking environment, thecontrol server 102 might comprise a modem or other means for establishing communications over the WAN, such as the Internet. In a networking environment, program modules or portions thereof might be stored in association with thecontrol server 102, thedata store 104, or any of theremote computers 108. For example, various application programs may reside on the memory associated with any one or more of theremote computers 108. It will be appreciated by those of ordinary skill in the art that the network connections shown are exemplary and other means of establishing a communications link between the computers (e.g.,control server 102 and remote computers 108) might be utilized. - In operation, an organization might enter commands and information into the
control server 102 or convey the commands and information to thecontrol server 102 via one or more of theremote computers 108 through input devices, such as a keyboard, a pointing device (commonly referred to as a mouse), a trackball, or a touch pad. Other input devices comprise microphones, satellite dishes, scanners, or the like. Commands and information might also be sent directly from a remote healthcare device to thecontrol server 102. In addition to a monitor, thecontrol server 102 and/orremote computers 108 might comprise other peripheral output devices, such as speakers and a printer. - Although many other internal components of the
control server 102 and theremote computers 108 are not shown, such components and their interconnection are well known. Accordingly, additional details concerning the internal construction of thecontrol server 102 and theremote computers 108 are not further disclosed herein. - Turning now to
FIG. 2 , an exemplarycomputing system environment 200 is depicted suitable for use in implementing embodiments of the present invention. Thecomputing system environment 200 is merely an example of one suitable computing system environment and is not intended to suggest any limitation as to the scope of use or functionality of embodiments of the present invention. Neither should thecomputing system environment 200 be interpreted as having any dependency or requirement related to any single module/component or combination of modules/components illustrated therein. - The
computing system environment 200 includes agraphical generator 210, adata store 212, and an end-user computing device 214 all in communication with one another via anetwork 216. Thenetwork 216 may include, without limitation, one or more local area networks (LANs) or wide area networks (WANs). Thenetwork 216 may be a secure network associated with a facility such as a healthcare facility, a financial institution, an educational institution, and the like. Thesecure network 216 may require that a user log in and be authenticated in order to send and/or receive information over thenetwork 216. - In some embodiments, one or more of the illustrated components/modules may be implemented as stand-alone applications. In other embodiments, one or more of the illustrated components/modules may be integrated directly into the operating system of the
graphical generator 210. The components/modules illustrated inFIG. 2 are exemplary in nature and in number and should not be construed as limiting. Any number of components/modules may be employed to achieve the desired functionality within the scope of embodiments hereof. Further, components/modules may be located on any number of servers. By way of example only, thegraphical generator 210 might reside on a server, a cluster of servers, or a computing device remote from one or more of the remaining components. - It should be understood that this and other arrangements described herein are set forth only as examples. Other arrangements and elements (e.g., machines, interfaces, functions, orders, and groupings of functions, etc.) can be used in addition to or instead of those shown, and some elements may be omitted altogether. Further, many of the elements described herein are functional entities that may be implemented as discrete or distributed components or in conjunction with other components/modules, and in any suitable combination and location. Various functions described herein as being performed by one or more entities may be carried out by hardware, firmware, and/or software. For instance, various functions may be carried out by a processor executing instructions stored in memory.
- The
data store 212 is configured to store information for use by, for example, thegraphical generator 210 and/or the end-user computing device 214. The information stored in association with thedata store 212 is configured to be searchable for one or more items of information stored in association therewith. The information stored in association with thedata store 212 may comprise general information used by thegraphical generator 210 and/or the end-user computing device 214. - In one aspect, the
data store 212 may store audit logs kept by an entity. As used throughout this application, the term “audit log” or “audit trail” refers to chronological records of system activities that enable the reconstruction and examination of the sequence of events and/or changes in an event. More specifically, the term audit log may refer to chronological records of customer electronic record access and details associated with such access. As described above, the entity may include financial institutions, educational institutions, healthcare facilities, and the like. - With respect to healthcare facilities, in addition to audit logs, the
data store 212 may store electronic medical records (EMRs) of patients associated with the healthcare facility. EMRs may comprise electronic clinical documents such as images, clinical notes, orders, summaries, reports, analyses, or other types of electronic medical documentation relevant to a particular patient's condition and/or treatment. Electronic clinical documents contain various types of information relevant to the condition and/or treatment of a particular patient and can include information relating to, for example, patient identification information, images, alert history, culture results, physical examinations, vital signs, past medical histories, surgical histories, family histories, histories of present illnesses, current and past medications, allergies, symptoms, past orders, completed orders, pending orders, tasks, lab results, other test results, patient encounters and/or visits, immunizations, physician comments, nurse comments, other caretaker comments, and a host of other relevant clinical information. - The content and volume of such information in the
data store 212 are not intended to limit the scope of embodiments of the present invention in any way. Further, though illustrated as a single, independent component, thedata store 212 may, in fact, be a plurality of storage devices, for instance, a database cluster, portions of which may reside on thegraphical generator 210, the end-user computing device 214, and/or any combination thereof. - As shown, the end-
user computing device 214 includes adisplay screen 215. Thedisplay screen 215 is configured to display information to the user of the end-user computing device 214, for instance, information relevant to communications initiated by and/or received by the end-user computing device 214, graphical representations of audit events, and/or the like. Embodiments are not intended to be limited to visual display but rather may also include audio presentation, combined audio/visual presentation, and the like. The end-user computing device 214 may be any type of display device suitable for presenting a graphical user interface. Such computing devices may include, without limitation, a computer, such as, for example, any of theremote computers 108 described above with reference toFIG. 1 . Other types of display devices may include tablet PCs, PDAs, mobile phones, smart phones, as well as conventional display devices such as televisions. Interaction with the graphical user interface may be via a touch pad, a pointing device, and/or gestures. - Components of the
graphical generator 210 may include a processing unit, internal system memory, and a suitable system bus for coupling various system components, including one or more data stores for storing information (e.g., files and metadata associated therewith). Thegraphical generator 210 typically includes, or has access to, a variety of computer-readable media. - The
computing system environment 200 is merely exemplary. While thegraphical generator 210 is illustrated as a single unit, it will be appreciated that thegraphical generator 210 is scalable. For example, thegraphical generator 210 may in actuality include a plurality of computing devices in communication with one another. Moreover, thedata store 212, or portions thereof, may be included within, for instance, thegraphical generator 210 as a computer-storage medium. The single unit depictions are meant for clarity, not to limit the scope of embodiments in any form. - As shown in
FIG. 2 , thegraphical generator 210 comprises a receivingcomponent 218 and arendering component 220. In some embodiments, one or more of thecomponents components remote computer 108 ofFIG. 1 . It will be understood that thecomponents FIG. 2 are exemplary in nature and in number and should not be construed as limiting. Any number of components may be employed to achieve the desired functionality within the scope of embodiments hereof. - The receiving
component 218 is configured to receive user selections, commands, filters, requests, or inputs. User selections and/or requests may include requests for graphical representations of audit events. Further, the user is able to select different views of the audit events. For instance, one request may be for a graphical representation of electronic records accessed by a party-of-interest during a specified time frame. Another request may be for a graphical representation of all parties-of-interest who have accessed a specified party's electronic records during a specified time frame. An additional request may be for a graphical representation of a detail view of audit events relating to a specified party-of-interest and a party. - The
rendering component 220 is configured to utilize audit logs stored in association with thedata store 212 in order to respond to the requests received by the receivingcomponent 218. As such, therendering component 220 is configured to render graphical representations of audit events on a graphical user interface (GUI) that may be presented on thedisplay screen 215 of the end-user computing device 214. - Turning now to
FIGS. 3-6 ,FIGS. 3-6 depict exemplary GUIs illustrating the presentation of graphical representations of audit events.FIG. 3 depicts aGUI 300 in which the party-of-interest is represented by acentral node 314 and one or more peripheral nodes, e.g.,nodes central node 314 represent parties having electronic records accessed by the party-of-interest during a specified time frame. Although only the nodes 316 a-c are numbered and referenced in theGUI 300, the following discussion is applicable to all of the peripheral nodes shown in theGUI 300. TheGUI 300 may be especially useful in situations where a facility suspects that a party-of-interest may be in violation of information security requirements. - The party-of-interest represented by the
central node 314 and the parties represented by the peripheral nodes 316 a-c may be represented by circles as shown. Other ways of representing the party-of-interest and the parties are contemplated. For example, thenodes 314 and/or 316 a-c may be represented by other geometric shapes such as squares, triangles, ovals, diamonds, and the like. Additionally, thenodes 314 and/or 316 a-c may be represented by stylized icons corresponding to a person, or a picture of the party or party-of-interest represented by the node. Any and all such variations, and any combination thereof, are contemplated as being within the scope of the invention. As well, depending on the amount of available screen real estate, the party-of-interest and/or the parties' names may be presented in association with thenodes 314 and/or 316 a-c. - Arrows, such as
arrow 318 indicate a direction of access. For example, thearrow 318 indicates that the party-of-interest represented by thecentral node 314 accessed the electronic record of the party represented by theperipheral node 316 a instead of vice versa. - The
GUI 300 further includestimelines timeline 310 represents a coarse-grained timeline covering a time period from the inception of the audit log to the current point in time. Thetimeline 310 includes abi-directional slider 311 that enables a user to select a time period in months and years. Thetimeline 312 represents a fine-grained timeline having a range corresponding to the range selected by theslider 311 on the coarse-grained timeline 310. Thetimeline 312 includes abi-directional slider 313 that enables a user to select a time period in months and days. The use oftimelines - Changing the specified time frame using either the
bi-directional slider 311 and/or thebi-directional slider 313 causes the number of peripheral nodes presented on theGUI 300 to automatically update in real time. For example, a user may initially select a time frame corresponding to Apr. 1, 2011-May 1, 2011. In response to the selection, a first set of peripheral nodes is presented corresponding to parties having electronic records accessed during the selected time frame by the party-of-interest represented by thecentral node 314. The user may then select a time frame corresponding to Apr. 1, 2011-Aug. 1, 2011. The number of peripheral nodes may dynamically increase because the number of electronic records accessed by the party-of-interest would likely be greater since the time span is longer. - The size of the peripheral nodes, such as the
peripheral nodes FIG. 3 , the party's electronic record associated with theperipheral node 316 c has been accessed at a higher frequency than the electronic records associated with theperipheral nodes - Each of the
nodes 314 and 316 a-c is actionable. Interaction via, for example, hovering over thecentral node 314 and/or peripheral nodes 316 a-c may initiate the presentation of user-identifying information for the party and/or party-of-interest represented by the node. With respect to the party-of-interest represented by thecentral node 314, user-identifying information may include name, role description, access rights associated with the party-of-interest, how long the party-of-interest has been associated with the company maintaining the audit logs, and the like. With respect to the parties represented by the peripheral nodes 316 a-c, user-identifying information may include name, date-of-birth, address, gender, identifiers (e.g., customer ID), date of service, and the like. - Selection via, for example, a right or left mouse click and/or a tapping gesture of a peripheral node such as the
peripheral node 316 a, may automatically initiate a new GUI such as the GUI shown inFIG. 4 , or may initiate the presentation of a set of options. One option may be for the presentation of a GUI where the party represented by the selectedperipheral node 316 a is presented as the central node and peripheral nodes represent parties-of-interest who have accessed the party's electronic records during a specified time frame (e.g., the GUI shown inFIG. 4 ). Another option may be for the presentation of a GUI where details concerning the audit events between the party represented by the selectedperipheral node 316 a and the party-of-interest represented by thecentral node 314 are depicted on a circular timeline (e.g., the GUI shown inFIG. 5 ). - Although not shown, the
GUI 300 may also include an area that presents one or more filters. Selection of a filter restricts the peripheral nodes to those nodes that meet the filter criteria. Exemplary filters may include filters based on the gender of the party represented by the peripheral nodes, filters corresponding to party roles (employee, customer, etc.), filters corresponding to specific types of audit events such as accessing an electronic record to place an order, make a change to a document, or create a new document, filters based on location such as the venue or facility in which the audit event took place, filters corresponding to a IP address or a device ID that indicate the device used to access the electronic record, and/or customized filters. A displayed filter may be presented in association with a numerical indicator (displayed adjacent to the filter name) that provides an indication of the number of results in the result set for that filter. For instance, “Female (17)” indicates that there are 17 results in the result set for the female filter. Using healthcare as an example, a healthcare facility may suspect that Clinician A is improperly prescribing narcotic medications. The healthcare facility may select a medication filter that restricts the peripheral nodes to those patients whose EMRs were accessed by Clinician A in order to prescribe narcotic medications. - Turning now to
FIG. 4 ,FIG. 4 depicts aGUI 400 where acentral node 414 represents a party and one or more peripheral nodes surrounding thecentral node 414, e.g.,peripheral nodes peripheral nodes GUI 400, the discussion that follows is applicable to all of the peripheral nodes shown in theGUI 400. TheGUI 400 may be presented in response to a selection of one of the options discussed with respect to the GUI 300 (e.g., the options that are presented when a user selects or otherwise interacts with one of the peripheral nodes 316 a-c). TheGUI 400 may be especially useful in those situations where the party represented by thecentral node 414 alleges a privacy breach, and the facility wishes to view parties-of-interest who have accessed the party's electronic records during a specified time frame. Arrows, such asarrow 418, represent the direction of access of the electronic record. For example, thearrow 418 indicates that the party-of-interest associated with thenode 416 a accessed the electronic record of the party represented by thecentral node 414 and not vice versa. - Like above, the party and the parties-of-interest may be represented by circles as shown. Other ways of representing the party and the parties-of-interest include other geometric shapes, icons, pictures, and the like. The name of the party and/or the parties-of-interest may be presented on the
central node 414 and/or the peripheral nodes 416 a-b when space permits. - The
GUI 400 also includestimelines timelines FIG. 3 . Thetimelines timelines timeline 410 represents a coarse-grained timeline covering a time frame from the inception of the audit log to the current point in time. Thetimeline 410 includes abi-direction slider 411 that enables the selection of a time period in months and years. Thetimeline 412 represents a fine-grained timeline having a range corresponding to the range selected by theslider 411. Thetimeline 413 also includes abi-directional slider 413 that enables the selection of a time period in days and months. Changing the specified time frame using thebi-directional sliders 411 and/or 413 causes the peripheral nodes to dynamically update to reflect the parties-of-interest that have accessed the party's electronic record during the new time frame. - The size of the peripheral nodes, such as the peripheral nodes 416 a-b, reflects the frequency with which the parties-of-interest represented by the peripheral nodes 416 a-b have accessed the party's electronic record. In one aspect, a larger-sized peripheral node indicates a greater frequency of access and a smaller-sized peripheral node indicates a lesser frequency of access. Thus, with respect to
FIG. 4 , the party-of-interest represented by theperipheral node 416 a has accessed the party's electronic record more frequently than the party-of-interest represented by theperipheral node 416 b. In another aspect, a smaller-sized peripheral node indicates a greater frequency of access and a larger-sized node indicates a lesser frequency of access. Any and all such variations, and any combination thereof, are contemplated as being within the scope of the invention. - Each of the
nodes 414 and 416 a-b is actionable. Interaction via, for example, hovering over thecentral node 414 and/or peripheral nodes 416 a-b may initiate the presentation of user-identifying information for the party and/or party-of-interest represented by the node. With respect to the party represented by thecentral node 414, user-identifying information may include name, date-of-birth, address, gender, identifiers (e.g., customer ID), date of service, and the like. With respect to the parties-of-interest represented by the peripheral nodes 416 a-b, user-identifying information may include name, role description, access rights associated with the party-of-interest, how long the party-of-interest has been associated with the company maintaining the audit log, and the like. - Selection via, for example, a right or left mouse click and/or a tapping gesture of a peripheral node such as the
peripheral node 416 a, may automatically initiate the presentation of a new GUI such as the GUI shown inFIG. 5 , or may initiate the presentation of a set of options. One option may be for the presentation of a GUI corresponding to theGUI 300 where the central node represents the party-of-interest associated with theperipheral node 416 a. Another option may be for the presentation of a GUI, such as the GUI shown inFIG. 5 , where details concerning the audit events between the party represented by thecentral node 414 and the party-of-interest represented by theperipheral node 416 a are depicted on a circular timeline. - The
GUI 400 may also include filters (not shown). Selection of a filter restricts the peripheral nodes to those nodes that meet the requirements of the selected filter. The filters associated with theGUI 400 may be the same or different than the filters associated with theGUI 300. Exemplary filters may include gender filters, role filters, types of audit events, location filters, device or IP address filters, and/or customized filters. An additional filter that may be used in the context of theGUI 400 includes a filter that specifies parties-of-interest. Like above, a numerical indicator may be displayed alongside the filter name to provide an indication of the number of results in the result set for that filter. -
FIG. 5 depicts aGUI 500 that presents a detailed view of audit events related to a specified party and a specified party-of-interest. TheGUI 500 may be initiated in response to a selection of an option as described with respect to theGUI 300 or theGUI 400. TheGUI 500 includes afirst display area 514 that indicates the specified party and the specified party-of-interest (in this case, the specified party-of-interest is Dr. Robert Smith and the specified party is Mary Thomas). The party and the party-of-interest may be indicated by their respective names. Other ways of indicating the party and the party-of-interest may include icons or pictures. Anarrow 515 in thefirst display area 514 depicts a direction of access. For example, thearrow 515 indicates that Dr. Robert Smith accessed patient Mary Thomas' EMR. - The
GUI 500 also includestimelines timelines FIG. 4 and thetimelines FIG. 3 . Thetimelines timelines timelines timeline 510 comprises a coarse-grained timeline that enables selection of a time period in months and years by using abi-directional slider 511. Likewise, thetimeline 512 represents a fine-grained timeline that enables selection of a time period in months and days using abi-directional slider 513. Changing the time period using thebi-directional sliders 511 and/or 513 causes theGUI 500 to automatically update to reflect audit events corresponding to the new time period. - The
GUI 500 further comprises acircular timeline 516 surrounding thefirst display area 514; thecircular timeline 516 hasbounds bi-directional sliders circular timeline 516 at distinct points in time are one or more icons, e.g.,icons GUI 500 detailing the different type of audit events associated with the icons. The types of audit events described and the shape of theicons - Hovering over or otherwise interacting with the
icons icon 522 may initiate the summary “orderedibuprofen 400 mg, b.i.d. on 01/26/2011 at 8:43 am.” Selecting an icon, such as theicon 522, may initiate a detailed view of the audit event. For example, selecting an icon may cause the presentation of the portion of the electronic record corresponding to the icon. Using the example above, selecting theicon 522 may initiate the presentation of the patient's EMR corresponding to the ordering event. - The present invention has been described in relation to particular embodiments, which are intended in all respects to be illustrative rather than restrictive. Further, the present invention is not limited to these embodiments, but variations and modifications may be made without departing from the scope of the present invention.
Claims (20)
1. One or more computer-storage media having computer-executable instructions embodied thereon that, when executed by a computing device, cause the computing device to generate a graphical user interface (GUI) for visually representing time-ordered audit events related to a party-of-interest, the GUI comprising:
at least a first timeline configured to enable selection of a time period;
a first actionable central node representing the party-of-interest; and
a first set of actionable peripheral nodes surrounding the central node, each peripheral node of the first set of peripheral nodes representing a party having an electronic record accessed by the party-of-interest during the selected time period.
2. The GUI of claim 1 , wherein a size associated with each peripheral node of the first set of peripheral nodes is dependent upon a frequency of access of the each peripheral node's respective electronic record by the party-of-interest.
3. The GUI of claim 2 , wherein a larger size is associated with a greater frequency of access of the each peripheral node's respective electronic record, and wherein a smaller size is associated with a lesser frequency of access of the each peripheral node's respective electronic record.
4. The GUI of claim 2 , wherein a larger size is associated with a lesser frequency of access of the each peripheral node's respective electronic record, and wherein a smaller size is associated with a greater frequency of access of the each peripheral node's respective electronic record.
5. The GUI of claim 2 , wherein the first set of peripheral nodes updates in real time upon selection of a different time period.
6. The GUI of claim 2 , wherein the first central node and the first set of peripheral nodes are graphically represented by a circle.
7. The GUI of claim 2 , wherein interaction with each peripheral node of the first set of peripheral nodes initiates presentation of an identity of the peripheral node's respective party.
8. The GUI of claim 2 , wherein selection of a peripheral node of the first set of peripheral nodes initiates presentation of a second GUI, the second GUI comprising:
at least the first timeline configured to enable selection of a time period;
a first display area configured to present an indication of the party-of-interest and the party associated with the selected peripheral node; and
a clockwise timeline having one or more icons overlaid at points in time, each icon of the one or more icons representing an audit event between the party-of-interest and the party associated with the selected peripheral node, the clockwise timeline having bounds corresponding to the selected time period.
9. The GUI of claim 2 , wherein selection of a peripheral node of the first set of peripheral nodes initiates presentation of a second GUI, the second GUI comprising:
at least the first timeline configured to enable selection of a time period;
a second actionable central node representing the party associated with the selected peripheral node; and
a second set of actionable peripheral nodes surrounding the central node, each peripheral node of the second set of peripheral nodes representing a party-of-interest who has accessed the party's electronic record during the selected time period.
10. One or more computer-storage media having computer-executable instructions embodied thereon that, when executed by a computing device, cause the computing device to generate a graphical user interface (GUI) for visually representing an audit log history related to a clinician, the GUI comprising:
at least a first timeline configured to enable the selection of a time period;
a first actionable central node representing the clinician; and
a first set of actionable peripheral nodes surrounding the first central node, each peripheral node of the first set of peripheral nodes representing a patient having an electronic medical record (EMR) accessed by the clinician during the selected time period.
11. The GUI of claim 10 , wherein a size associated with each peripheral node of the first set of peripheral nodes indicates a frequency of access of the patient's EMR during the selected time period.
12. The GUI of claim 11 , wherein a larger size indicates a higher frequency of access of the patient's EMR during the selected time period, and wherein a smaller size indicates a lesser frequency of access of the patient's EMR during the selected time period.
13. The GUI of claim 11 , wherein a smaller size indicates a higher frequency of access of the patient's EMR during the selected time period, and wherein a larger size indicates a lesser frequency of access of the patient's EMR during the selected time period.
14. The GUI of claim 10 , wherein each peripheral node of the first set peripheral nodes is connected to the first central node by an arrow, each arrow pointing in a direction of access of the peripheral node's respective EMR.
15. The GUI of claim 10 , wherein selection of a peripheral node of the first set of peripheral nodes initiates presentation of a second GUI, the second GUI comprising:
at least the first timeline configured to enable selection of a time period;
a second actionable central node representing the patient associated with the selected peripheral node; and
a second set of peripheral nodes surrounding the second central node, each peripheral node of the second set of peripheral nodes representing a clinician who accessed the patient's EMR during the selected time period.
16. The GUI of claim 15 , wherein a size associated with each peripheral node of the second set of peripheral nodes indicates a frequency of access of the patient's EMR by the peripheral node's respective clinician.
17. The GUI of claim 10 , further comprising one or more filters each filter representing a different type of audit event, selection of which restricts the first set of peripheral nodes to patients having an EMR accessed by the clinician for the selected type of audit event.
18. One or more computer-storage media having computer-executable instructions embodied thereon that, when executed by a computing device, cause the computing device to generate a graphical user interface (GUI) for visually representing a time-ordered sequence of audit events related to a clinician and a patient, the GUI comprising:
at least a first timeline configured to enable selection of a time period;
a first display area configured to present an indication of the clinician and the patient, the patient having an electronic medical record (EMR) accessed by the clinician;
a clockwise timeline having one or more icons overlaid at points in time where the patient's EMR was accessed by the clinician, the clockwise timeline having bounds corresponding to the selected time period.
19. The GUI of claim 18 , wherein each icon of the one or more icons represents a different type of audit event.
20. The GUI of claim 19 , wherein interaction with each of the one or more icons initiates presentation of a patient-specific summary associated with the audit event represented by the icon.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/860,030 US20140278539A1 (en) | 2013-03-14 | 2013-04-10 | Graphical representations of time-ordered data |
US15/810,955 US11257037B2 (en) | 2013-03-14 | 2017-11-13 | Graphical representations of time-ordered data |
US17/581,436 US20220147238A1 (en) | 2013-03-14 | 2022-01-21 | Graphical representations of time-ordered data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361783356P | 2013-03-14 | 2013-03-14 | |
US13/860,030 US20140278539A1 (en) | 2013-03-14 | 2013-04-10 | Graphical representations of time-ordered data |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/810,955 Continuation US11257037B2 (en) | 2013-03-14 | 2017-11-13 | Graphical representations of time-ordered data |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140278539A1 true US20140278539A1 (en) | 2014-09-18 |
Family
ID=51531924
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/860,030 Abandoned US20140278539A1 (en) | 2013-03-14 | 2013-04-10 | Graphical representations of time-ordered data |
US15/810,955 Active 2036-05-21 US11257037B2 (en) | 2013-03-14 | 2017-11-13 | Graphical representations of time-ordered data |
US17/581,436 Pending US20220147238A1 (en) | 2013-03-14 | 2022-01-21 | Graphical representations of time-ordered data |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/810,955 Active 2036-05-21 US11257037B2 (en) | 2013-03-14 | 2017-11-13 | Graphical representations of time-ordered data |
US17/581,436 Pending US20220147238A1 (en) | 2013-03-14 | 2022-01-21 | Graphical representations of time-ordered data |
Country Status (1)
Country | Link |
---|---|
US (3) | US20140278539A1 (en) |
Cited By (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150033172A1 (en) * | 2013-07-24 | 2015-01-29 | Concurix Corporation | Timeline Charts with Subgraphs |
US20160232217A1 (en) * | 2015-02-06 | 2016-08-11 | Adp, Llc | Adjustable Graphical Display System |
US9658943B2 (en) | 2013-05-21 | 2017-05-23 | Microsoft Technology Licensing, Llc | Interactive graph for navigating application code |
US9734040B2 (en) | 2013-05-21 | 2017-08-15 | Microsoft Technology Licensing, Llc | Animated highlights in a graph representing an application |
US9754396B2 (en) | 2013-07-24 | 2017-09-05 | Microsoft Technology Licensing, Llc | Event chain visualization of performance data |
US9864672B2 (en) | 2013-09-04 | 2018-01-09 | Microsoft Technology Licensing, Llc | Module specific tracing in a shared module environment |
US10346292B2 (en) | 2013-11-13 | 2019-07-09 | Microsoft Technology Licensing, Llc | Software component recommendation based on multiple trace runs |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11301589B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Consent receipt management systems and related methods |
US11308435B2 (en) | 2016-06-10 | 2022-04-19 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11328240B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11334682B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11334681B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Application privacy scanning systems and related meihods |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11341447B2 (en) * | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11347889B2 (en) | 2016-06-10 | 2022-05-31 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11361057B2 (en) | 2016-06-10 | 2022-06-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11373007B2 (en) | 2017-06-16 | 2022-06-28 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11397819B2 (en) | 2020-11-06 | 2022-07-26 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US11410106B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Privacy management systems and methods |
US11409908B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US11416636B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent management systems and related methods |
US11416576B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11416634B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11418516B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11436373B2 (en) | 2020-09-15 | 2022-09-06 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
US11442906B2 (en) | 2021-02-04 | 2022-09-13 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
US11444976B2 (en) | 2020-07-28 | 2022-09-13 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11449633B2 (en) | 2016-06-10 | 2022-09-20 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11461722B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Questionnaire response automation for compliance management |
US11468386B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11468196B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11475165B2 (en) | 2020-08-06 | 2022-10-18 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11494515B2 (en) | 2021-02-08 | 2022-11-08 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US11526624B2 (en) | 2020-09-21 | 2022-12-13 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US11533315B2 (en) | 2021-03-08 | 2022-12-20 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11558429B2 (en) | 2016-06-10 | 2023-01-17 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11586762B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US11593523B2 (en) | 2018-09-07 | 2023-02-28 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11651402B2 (en) | 2016-04-01 | 2023-05-16 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of risk assessments |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11775348B2 (en) | 2021-02-17 | 2023-10-03 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11797528B2 (en) | 2020-07-08 | 2023-10-24 | OneTrust, LLC | Systems and methods for targeted data discovery |
US11921894B2 (en) | 2016-06-10 | 2024-03-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210386385A1 (en) * | 2020-06-10 | 2021-12-16 | Mette Dyhrberg | Managing dynamic health data and in-body experiments for digital therapeutics |
US20230029011A1 (en) * | 2021-07-20 | 2023-01-26 | AIble Inc. | Collaborative Analytics Platform |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040172558A1 (en) * | 2002-11-18 | 2004-09-02 | Terrance Callahan | Method and system for access control |
US20080081594A1 (en) * | 2006-09-29 | 2008-04-03 | Lg Electronics Inc. | Event information display apparatus and method for mobile communication terminal |
US20080109870A1 (en) * | 2006-11-08 | 2008-05-08 | Kieran Gerard Sherlock | Identities Correlation Infrastructure for Passive Network Monitoring |
US20100275263A1 (en) * | 2009-04-24 | 2010-10-28 | Allgress, Inc. | Enterprise Information Security Management Software For Prediction Modeling With Interactive Graphs |
US20110216067A1 (en) * | 2003-12-15 | 2011-09-08 | Microsoft Corporation | System and method for providing a dynamic expanded timeline |
US20120041769A1 (en) * | 2010-08-13 | 2012-02-16 | The Rand Corporation | Requests for proposals management systems and methods |
US20130046786A1 (en) * | 2011-08-17 | 2013-02-21 | The Regents Of The University Of Michigan | System for Explanation-Based Auditing of Medical Records Data |
US20130097662A1 (en) * | 2011-10-18 | 2013-04-18 | Mcafee, Inc. | Integrating security policy and event management |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8984583B2 (en) * | 2012-05-30 | 2015-03-17 | Accenture Global Services Limited | Healthcare privacy breach prevention through integrated audit and access control |
-
2013
- 2013-04-10 US US13/860,030 patent/US20140278539A1/en not_active Abandoned
-
2017
- 2017-11-13 US US15/810,955 patent/US11257037B2/en active Active
-
2022
- 2022-01-21 US US17/581,436 patent/US20220147238A1/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040172558A1 (en) * | 2002-11-18 | 2004-09-02 | Terrance Callahan | Method and system for access control |
US20110216067A1 (en) * | 2003-12-15 | 2011-09-08 | Microsoft Corporation | System and method for providing a dynamic expanded timeline |
US20080081594A1 (en) * | 2006-09-29 | 2008-04-03 | Lg Electronics Inc. | Event information display apparatus and method for mobile communication terminal |
US20080109870A1 (en) * | 2006-11-08 | 2008-05-08 | Kieran Gerard Sherlock | Identities Correlation Infrastructure for Passive Network Monitoring |
US20100275263A1 (en) * | 2009-04-24 | 2010-10-28 | Allgress, Inc. | Enterprise Information Security Management Software For Prediction Modeling With Interactive Graphs |
US20120041769A1 (en) * | 2010-08-13 | 2012-02-16 | The Rand Corporation | Requests for proposals management systems and methods |
US20130046786A1 (en) * | 2011-08-17 | 2013-02-21 | The Regents Of The University Of Michigan | System for Explanation-Based Auditing of Medical Records Data |
US20130097662A1 (en) * | 2011-10-18 | 2013-04-18 | Mcafee, Inc. | Integrating security policy and event management |
Non-Patent Citations (1)
Title |
---|
Oxygen Forensic Suite 2012 v.4.4, Oxygen Forensic Suite 2012 v.4.4 release notes. Release date: 27 July 2012. Accessed March 27, 2015. * |
Cited By (96)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9658943B2 (en) | 2013-05-21 | 2017-05-23 | Microsoft Technology Licensing, Llc | Interactive graph for navigating application code |
US9734040B2 (en) | 2013-05-21 | 2017-08-15 | Microsoft Technology Licensing, Llc | Animated highlights in a graph representing an application |
US20150033172A1 (en) * | 2013-07-24 | 2015-01-29 | Concurix Corporation | Timeline Charts with Subgraphs |
US9754396B2 (en) | 2013-07-24 | 2017-09-05 | Microsoft Technology Licensing, Llc | Event chain visualization of performance data |
US9864672B2 (en) | 2013-09-04 | 2018-01-09 | Microsoft Technology Licensing, Llc | Module specific tracing in a shared module environment |
US10346292B2 (en) | 2013-11-13 | 2019-07-09 | Microsoft Technology Licensing, Llc | Software component recommendation based on multiple trace runs |
US20160232217A1 (en) * | 2015-02-06 | 2016-08-11 | Adp, Llc | Adjustable Graphical Display System |
US10262051B2 (en) * | 2015-02-06 | 2019-04-16 | Adp, Llc | Adjustable graphical display system |
US11651402B2 (en) | 2016-04-01 | 2023-05-16 | OneTrust, LLC | Data processing systems and communication systems and methods for the efficient generation of risk assessments |
US11468386B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US11418516B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent conversion optimization systems and related methods |
US11301589B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Consent receipt management systems and related methods |
US11308435B2 (en) | 2016-06-10 | 2022-04-19 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11328092B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for processing and managing data subject access in a distributed environment |
US11328240B2 (en) | 2016-06-10 | 2022-05-10 | OneTrust, LLC | Data processing systems for assessing readiness for responding to privacy-related incidents |
US11334682B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11334681B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Application privacy scanning systems and related meihods |
US11336697B2 (en) | 2016-06-10 | 2022-05-17 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11343284B2 (en) | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Data processing systems and methods for performing privacy assessments and monitoring of new versions of computer code for privacy compliance |
US11341447B2 (en) * | 2016-06-10 | 2022-05-24 | OneTrust, LLC | Privacy management systems and methods |
US11347889B2 (en) | 2016-06-10 | 2022-05-31 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11354435B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11354434B2 (en) | 2016-06-10 | 2022-06-07 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11361057B2 (en) | 2016-06-10 | 2022-06-14 | OneTrust, LLC | Consent receipt management systems and related methods |
US11366786B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing systems for processing data subject access requests |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11488085B2 (en) | 2016-06-10 | 2022-11-01 | OneTrust, LLC | Questionnaire response automation for compliance management |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11960564B2 (en) | 2016-06-10 | 2024-04-16 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11403377B2 (en) | 2016-06-10 | 2022-08-02 | OneTrust, LLC | Privacy management systems and methods |
US11410106B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Privacy management systems and methods |
US11409908B2 (en) | 2016-06-10 | 2022-08-09 | OneTrust, LLC | Data processing systems and methods for populating and maintaining a centralized database of personal data |
US11416636B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent management systems and related methods |
US11416576B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11416634B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11416798B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for providing training in a vendor procurement process |
US11416109B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Automated data processing systems and methods for automatically processing data subject access requests using a chatbot |
US11416590B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11416589B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11418492B2 (en) | 2016-06-10 | 2022-08-16 | OneTrust, LLC | Data processing systems and methods for using a data model to select a target data asset in a data migration |
US11438386B2 (en) | 2016-06-10 | 2022-09-06 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US11921894B2 (en) | 2016-06-10 | 2024-03-05 | OneTrust, LLC | Data processing systems for generating and populating a data inventory for processing data access requests |
US11868507B2 (en) | 2016-06-10 | 2024-01-09 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11847182B2 (en) | 2016-06-10 | 2023-12-19 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11449633B2 (en) | 2016-06-10 | 2022-09-20 | OneTrust, LLC | Data processing systems and methods for automatic discovery and assessment of mobile software development kits |
US11461500B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Data processing systems for cookie compliance testing with website scanning and related methods |
US11461722B2 (en) | 2016-06-10 | 2022-10-04 | OneTrust, LLC | Questionnaire response automation for compliance management |
US11295316B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems for identity validation for consumer rights requests and related methods |
US11468196B2 (en) | 2016-06-10 | 2022-10-11 | OneTrust, LLC | Data processing systems for validating authorization for personal data collection, storage, and processing |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US11544405B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11301796B2 (en) | 2016-06-10 | 2022-04-12 | OneTrust, LLC | Data processing systems and methods for customizing privacy training |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US11651106B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Data processing systems for fulfilling data subject access requests and related methods |
US11651104B2 (en) | 2016-06-10 | 2023-05-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11645353B2 (en) | 2016-06-10 | 2023-05-09 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11645418B2 (en) | 2016-06-10 | 2023-05-09 | OneTrust, LLC | Data processing systems for data testing to confirm data deletion and related methods |
US11475136B2 (en) | 2016-06-10 | 2022-10-18 | OneTrust, LLC | Data processing systems for data transfer risk identification and related methods |
US11550897B2 (en) | 2016-06-10 | 2023-01-10 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11551174B2 (en) | 2016-06-10 | 2023-01-10 | OneTrust, LLC | Privacy management systems and methods |
US11556672B2 (en) | 2016-06-10 | 2023-01-17 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US11558429B2 (en) | 2016-06-10 | 2023-01-17 | OneTrust, LLC | Data processing and scanning systems for generating and populating a data inventory |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11562097B2 (en) | 2016-06-10 | 2023-01-24 | OneTrust, LLC | Data processing systems for central consent repository and related methods |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US11586762B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for auditing data request compliance |
US11625502B2 (en) | 2016-06-10 | 2023-04-11 | OneTrust, LLC | Data processing systems for identifying and modifying processes that are subject to data subject access requests |
US11609939B2 (en) | 2016-06-10 | 2023-03-21 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US11663359B2 (en) | 2017-06-16 | 2023-05-30 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11373007B2 (en) | 2017-06-16 | 2022-06-28 | OneTrust, LLC | Data processing systems for identifying whether cookies contain personally identifying information |
US11947708B2 (en) | 2018-09-07 | 2024-04-02 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11593523B2 (en) | 2018-09-07 | 2023-02-28 | OneTrust, LLC | Data processing systems for orphaned data identification and deletion and related methods |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11797528B2 (en) | 2020-07-08 | 2023-10-24 | OneTrust, LLC | Systems and methods for targeted data discovery |
US11444976B2 (en) | 2020-07-28 | 2022-09-13 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11968229B2 (en) | 2020-07-28 | 2024-04-23 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US11475165B2 (en) | 2020-08-06 | 2022-10-18 | OneTrust, LLC | Data processing systems and methods for automatically redacting unstructured data from a data subject access request |
US11704440B2 (en) | 2020-09-15 | 2023-07-18 | OneTrust, LLC | Data processing systems and methods for preventing execution of an action documenting a consent rejection |
US11436373B2 (en) | 2020-09-15 | 2022-09-06 | OneTrust, LLC | Data processing systems and methods for detecting tools for the automatic blocking of consent requests |
US11526624B2 (en) | 2020-09-21 | 2022-12-13 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US11615192B2 (en) | 2020-11-06 | 2023-03-28 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11397819B2 (en) | 2020-11-06 | 2022-07-26 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US11687528B2 (en) | 2021-01-25 | 2023-06-27 | OneTrust, LLC | Systems and methods for discovery, classification, and indexing of data in a native computing system |
US11442906B2 (en) | 2021-02-04 | 2022-09-13 | OneTrust, LLC | Managing custom attributes for domain objects defined within microservices |
US11494515B2 (en) | 2021-02-08 | 2022-11-08 | OneTrust, LLC | Data processing systems and methods for anonymizing data samples in classification analysis |
US11601464B2 (en) | 2021-02-10 | 2023-03-07 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
US11775348B2 (en) | 2021-02-17 | 2023-10-03 | OneTrust, LLC | Managing custom workflows for domain objects defined within microservices |
US11546661B2 (en) | 2021-02-18 | 2023-01-03 | OneTrust, LLC | Selective redaction of media content |
US11533315B2 (en) | 2021-03-08 | 2022-12-20 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11816224B2 (en) | 2021-04-16 | 2023-11-14 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US11620142B1 (en) | 2022-06-03 | 2023-04-04 | OneTrust, LLC | Generating and customizing user interfaces for demonstrating functions of interactive user environments |
Also Published As
Publication number | Publication date |
---|---|
US20180068408A1 (en) | 2018-03-08 |
US11257037B2 (en) | 2022-02-22 |
US20220147238A1 (en) | 2022-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220147238A1 (en) | Graphical representations of time-ordered data | |
JP7335938B2 (en) | An informatics platform for integrated clinical care | |
US10915222B2 (en) | Multi-disciplinary team workspace | |
US20180130003A1 (en) | Systems and methods to provide a kpi dashboard and answer high value questions | |
US20150081339A1 (en) | Attaching patient context to a call history associated with voice communication | |
US20160132645A1 (en) | System and architecture for providing shared patient data notifications | |
US20130275151A1 (en) | Systems and methods for and displaying patient data | |
US20130346105A1 (en) | Collaborative management of nursing risk assessments | |
US9846850B2 (en) | Consolidation of healthcare-related schedules across disparate systems | |
US10475540B2 (en) | Impactability scoring | |
US20230122360A1 (en) | Integrated data capture using aliasing schemes | |
Yoo et al. | Hospital information systems: experience at the fully digitized Seoul National University Bundang Hospital | |
US20160188822A1 (en) | Clinical decision support rule generation and modification system and methods | |
US20200159372A1 (en) | Pinned bar apparatus and methods | |
US11462306B2 (en) | Presenting patient information by body system | |
US8521554B2 (en) | Presenting related results during medication administration documentation | |
US20130317834A1 (en) | Customized and intuitive antibiograms | |
Fontaine et al. | A work-sampling tool to measure the effect of electronic medical record implementation on health care workers | |
US10741273B1 (en) | User friendly medical records systems, apparatuses and methods | |
Abd-Ali et al. | Web based e-hospital management system | |
US11551791B2 (en) | Key note | |
Das et al. | Ownership, privacy, and value of health-care data: Perspectives and future direction | |
Suri | Using medical and information technology for improving quality of care | |
US20200159716A1 (en) | Hierarchical data filter apparatus and methods | |
Watfa et al. | Computer Based E-Healthcare Clinical Systems: A Comprehensive Survey |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CERNER INNOVATION, INC., KANSAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EDWARDS, DAVID LEE;REEL/FRAME:030580/0254 Effective date: 20130410 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |