US20060156381A1 - Approach for deleting electronic documents on network devices using document retention policies - Google Patents

Approach for deleting electronic documents on network devices using document retention policies Download PDF

Info

Publication number
US20060156381A1
US20060156381A1 US11/034,483 US3448305A US2006156381A1 US 20060156381 A1 US20060156381 A1 US 20060156381A1 US 3448305 A US3448305 A US 3448305A US 2006156381 A1 US2006156381 A1 US 2006156381A1
Authority
US
United States
Prior art keywords
retention policy
audit
document
recited
network devices
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/034,483
Inventor
Tetsuro Motoyama
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ricoh Co Ltd
Original Assignee
Ricoh Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ricoh Co Ltd filed Critical Ricoh Co Ltd
Priority to US11/034,483 priority Critical patent/US20060156381A1/en
Assigned to RICOH COMPANY, LTD. reassignment RICOH COMPANY, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MOTOYAMA, TETSURO
Priority to US11/182,870 priority patent/US7703125B2/en
Priority to JP2006004238A priority patent/JP2006195998A/en
Publication of US20060156381A1 publication Critical patent/US20060156381A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Definitions

  • This invention relates generally to electronic document management, and more specifically, to an approach for deleting electronic documents on network devices using document retention policies.
  • document retention policies to define conditions under which documents are to be destroyed. Businesses typically destroy documents to reduce costs attributable to maintaining old documents and to reduce potential legal liability. Document retention policies may apply to physical documents as well as electronic documents.
  • a document retention policy may specify the destruction of a particular document after a specified time. Some copies of the particular document may be readily obtained and destroyed. Other copies of the particular document may exist but may be difficult to locate. For example, copies of the particular document may have been sent to remote storage and may be difficult, if not impossible, to locate. In other situations, the existence of some copies of the particular document may not even be known. This may occur, for example, if copies of the particular document were made, but no record was made documenting that the copies were made. This can be potentially damaging if the unknown copies are later discovered in litigation by an adverse party.
  • the document retention policy specifies one or more deletion criteria for documents belonging to each of a plurality of document classifications.
  • the document retention policy may specify that documents belonging to a particular document classification are to be deleted after a specified time, at a specified time or in response to the occurrence of a particular event.
  • the document retention policy is defined by document retention policy data that is managed by a document retention policy manager.
  • the document retention policy manager disseminates the document retention policy data to one or more network elements over a communications network.
  • the document retention policy manager determines whether a retention policy audit should be performed. If so, then the document retention policy manager signals the one or more network elements to conduct a retention policy audit.
  • the network elements are configured to conduct the retention policy audit by deleting electronic documents in accordance with the document retention policy.
  • the one or more network elements are further configured to generate and provide to the document retention policy manager report data that indicates results of performing the retention policy audit.
  • a computer-implemented method for deleting electronic documents on network devices.
  • Document retention policy data is retrieved that specifies one or more deletion criteria for each of a plurality of electronic document classifications.
  • the document retention policy data is transmitted to one or more network devices over a communications network.
  • a determination is made whether a retention policy audit should be conducted. If the retention policy audit should be conducted, then the one or more network devices are signaled to cause the one or more network devices to perform the retention policy audit.
  • Performing the retention policy audit includes identifying, from the plurality of electronic document classifications, one or more electronic document classifications for which the corresponding one or more deletion criteria are satisfied and deleting one or more electronic documents associated with the identified one or more electronic document classifications.
  • Audit report data is received from the one or more network devices that indicate results of the one or more network devices performing the retention policy audit.
  • a computer-implemented method for deleting electronic documents on network devices.
  • Document retention policy data is received at each of a plurality of network devices over a communications network from a document retention policy manager executing on another network device.
  • the document retention policy data specifies one or more deletion criteria for each of a plurality of electronic document classifications.
  • An instruction to conduct a retention policy audit is received at each of the plurality of network devices from the document retention policy manager executing on the another network device.
  • an audit processor on each of the plurality of network devices causing the retention policy audit to be conducted by identifying, from the plurality of electronic document classifications, one or more electronic document classifications for which the corresponding one or more deletion criteria are satisfied, and deleting one or more electronic documents associated with the identified one or more electronic document classifications.
  • the audit processors also cause audit report data to be generated that indicates results of performing the retention policy audit and cause the audit report data to be provided to the document retention policy manager over the communications network.
  • FIG. 1 is a block diagram that depicts an arrangement for deleting electronic documents using a document retention policy according to an embodiment of the invention.
  • FIG. 2 is a table that depicts example document retention policy data.
  • FIG. 3 depicts an example implementation of document retention policy manager.
  • FIG. 4 is a block diagram that depicts an example implementation of secure system.
  • FIG. 5 depicts a file information table, in accordance with an embodiment of the invention.
  • FIG. 6 is a flow diagram that depicts an approach for deleting electronic documents using a document retention policy according to an embodiment of the invention.
  • FIG. 7 is a block diagram of a computer system on which embodiments of the invention may be implemented.
  • the document retention policy specifies one or more deletion criteria for documents belonging to each of a plurality of document classifications.
  • the document retention policy may specify that documents belonging to a particular document classification are to be deleted after a specified time, at a specified time or in response to the occurrence of a particular event.
  • the document retention policy is defined by document retention policy data that is managed by a document retention policy manager.
  • the document retention policy manager disseminates the document retention policy data to one or more network elements over a communications network.
  • the document retention policy manager determines whether a retention policy audit should be performed. If so, then the document retention policy manager signals the one or more network elements to conduct a retention policy audit.
  • the network elements are configured to conduct the retention policy audit by deleting electronic documents in accordance with the document retention policy.
  • the one or more network elements are further configured to generate and provide to the document retention policy manager report data that indicates results of performing the retention policy audit.
  • FIG. 1 is a block diagram that depicts an arrangement 100 for deleting electronic documents using a document retention policy according to an embodiment of the invention.
  • Arrangement 100 includes a secure system 102 , a workstation 104 , a multifunction peripheral (MFP) 106 , a personal computer 108 and a document retention policy manager 110 communicatively coupled to a network 112 .
  • Network 112 may be implemented by any mechanism or medium that provides for the exchange of information between the elements depicted in FIG. 1 . Examples of network 112 include, without limitation, a network such as a Local Area Network (LAN), Wide Area Network (WAN), Ethernet or the Internet, or one or more terrestrial, satellite or wireless links.
  • LAN Local Area Network
  • WAN Wide Area Network
  • Ethernet or the Internet
  • terrestrial, satellite or wireless links or one or more terrestrial, satellite or wireless links.
  • Secure system 102 is a system configured to maintain data in a secure manner.
  • secure system 102 may include a gateway or other mechanism for controlling access to data stored in secure system 102 .
  • Workstation 104 is any type of workstation and MFP 106 is any device that performs one or more functions, such as printing, copying, facsimile or scanning.
  • Personal computer 108 is any type of personal computer.
  • a document retention policy specifies one or more deletion criteria for a plurality of electronic document classifications.
  • FIG. 2 is a table 200 that depicts example document retention policy data.
  • FIG. 2 depicts the document retention policy data organized in tabular format for explanation purposes only and the document retention policy data may be stored in any type of data structure or format, depending upon the requirements of a particular implementation.
  • document retention policy data 122 is not limited to the example data depicted in table 200 and may include fewer data types or more data types than depicted in FIG. 2 , depending upon the requirements of a particular implementation.
  • Each row of table 200 specifies a retention policy for a particular document classification.
  • the document classification L 1 pertains to meeting records and has a document retention policy that specifies that documents in this classification are to be deleted after five years.
  • the “L” in the document classification “L1” refers to a legal requirement where the length of retention is specified by law.
  • the document classification C 4 pertains to project “A” data and has a document retention policy that specifies that documents in this classification are to be deleted after the project has been completed.
  • the “C” in the document classification “C4” refers to a corporate standard.
  • deletion criteria may specify a time duration that may be applied on a document-by-document basis, based upon the creation date or storage date of the electronic documents.
  • the deletion criteria may specify a date certain at which all constituent documents of an electronic document classification are to be deleted.
  • the deletion criteria may specify that all documents associated with an electronic document classification are to be deleted in response to the occurrence of an event.
  • Example events include a notification from administrative personnel and the completion of a project, as described above.
  • document retention policy manager 110 provides for the creation and management of document retention policies that are defined by document retention policy data.
  • FIG. 3 depicts an example implementation of document retention policy manager 110 .
  • document retention policy manager 110 is configured with a graphical user interface (GUI) 300 , a retention policy editor 302 and a retention policy auditor 304 .
  • Document retention policy manager 110 also includes document retention policy data 306 , audit schedule data 308 and audit report data 310 .
  • Document retention policy data 306 is described in this section, while audit schedule data 308 and audit report data 310 are described in later sections.
  • Retention policy editor 302 is configured to allow users to create, store and manage document retention policies via GUI 300 .
  • retention policy editor 302 allows users to create document retention policy data 306 , such as the document retention policy data contained in table 200 , through the use of various editing controls. This may include, for example, allowing a user to edit “raw” document retention policy data 306 or display one or more templates on GUI 300 and allow the user to enter data into available fields. Alternatively, a user may retrieve existing document retention policy data 306 from a storage medium. Users may then edit and store the document retention policy data 306 . Users may also use the editing controls provided by retention policy editor 302 to delete document retention policy data 306 .
  • Document retention policy data 306 may be stored in a volatile memory, such as a random access memory (RAM), and/or stored on a non-volatile memory such as one or more disks, optical media or tape.
  • RAM random access memory
  • document retention policy manager 110 is configured to distribute document retention policy data 306 to secure system 102 , workstation 104 , MFP 106 and personal computer 108 .
  • Document retention policy manager 110 may be configured to automatically provide document retention policy data 306 to those elements that require the data.
  • Document retention policy manager 110 may be configured to query secure system 102 , workstation 104 , MFP 106 and personal computer 108 to determine which of these elements requires document retention policy data 306 . Alternatively, these elements may request document retention policy data 306 from document retention policy manager 110 .
  • retention policy auditor 304 may be configured to provide document retention policy data 306 to secure system 102 , workstation 104 , MFP 106 and personal computer 108 in response to document retention policy data 306 being updated.
  • retention policy auditor 304 is configured to automatically detect that document retention policy data 306 has been updated and provide the updated document retention policy data 306 to secure system 102 , workstation 104 , MFP 106 and personal computer 108 .
  • Document retention policy manager 110 is configured to enforce document retention policies using audits.
  • retention policy auditor 304 is configured to signal one or more of secure system 102 , workstation 104 , MFP 106 and personal computer 108 to perform an audit.
  • Retention policy auditor 304 may cause audits to be performed in response to user input. For example, administrative personnel may indicate, via GUI 300 , that a retention policy audit is to be performed.
  • Retention policy auditor 304 may also cause audits to be performed based upon a schedule specified by audit schedule data 308 .
  • each of these elements conducts an audit.
  • the audit process is described herein with respect secure system 102 , although the approach is applicable to the other elements depicted in FIG. 1 ., namely, workstation 104 , MFP 106 and personal computer 108 , as well as any other type of element.
  • FIG. 4 is a block diagram that depicts an example implementation of secure system 102 .
  • secure system 102 includes a GUI 400 , a document manager 402 , an audit processor 404 , a file classifier 406 , a file handler 408 and an operating system 410 .
  • Secure system 102 also includes document retention policy data 306 , received from document retention policy manager 110 , a file information table 412 and audit report data 414 .
  • GUI 400 may be implemented by any mechanism that allows secure system 102 to convey information to a user.
  • Document manager 402 performs a variety of document management tasks for secure system 102 . For example, document manager 402 interacts with document retention policy manager 110 to coordinate the request and/or receipt of document retention policy data 306 .
  • document manager 402 when secure system 102 receives an audit signal from document retention policy manager 110 , document manager 402 provides the audit signal to audit processor 404 .
  • Audit processor 404 examines document retention policy data 306 to identify document classifications for which the corresponding deletion criteria have been satisfied. For example, if at least one year has elapsed since document classification C 3 was activated, then the deletion criteria are satisfied and electronic documents associated with document classification C 3 are to be deleted. Audit processor 404 then identifies documents stored on secure system 102 that are associated with document classification C 3 and causes the identified documents to be deleted from secure system 102 . In situations where a file cannot be deleted because it is no longer located on secure system, then audit processor 404 indicates this fact in report data provided to document retention policy manager 110 . This situation may occur, for example, if a data file was stored on a removable media, such as a floppy disk, a removable disk drive or a portable storage device. The use of report data is described in more detail hereinafter.
  • audit processor 404 uses a file information table, such as the file information table 500 depicted in FIG. 5 , to determine which documents are associated with a particular document classification.
  • File information table 500 includes data that indicates, for each electronic document, a file name, a creation data, a location and a classification.
  • the file name is the name of the file that contains the electronic document.
  • the classification is the same as the document classification from table 200 .
  • the creation date is the creation date of the file that contains the electronic document. The creation date is useful for identifying particular electronic documents to be deleted on a document-by-document basis. For example, a particular document classification may have associated deletion criteria that specify deletion after one year from creation date of the document.
  • the location indicates whether the file is stored locally on the particular element or on a removable storage media. For example, an “L” indicates that a particular electronic document is stored locally on secure system 102 , while an “R” indicates that the particular electronic document is stored on a removable media or at another location.
  • document manager 402 manages the creation and maintenance of file information table 500 .
  • Document manager 402 operates in conjunction with file handler 408 to create and populate file information table 500 .
  • file handler 408 detects that a save or copy command has been issued to operating system 410 and in response, creates an entry in file information table 500 for the file that was saved or copied.
  • File handler 408 may also detect that a file name has been changed and update the corresponding file name in file information table 500 .
  • File classifier 406 then interacts with a user through GUI 400 to obtain the classification for each file, or to copy the classification of the original file, in the case of a file copy.
  • audit processor 404 After performing a retention policy audit, audit processor 404 causes the generation of audit report data 414 that indicates results of performing the audit. For example, audit report data 414 may indicate files that were deleted in response to deletion criteria being satisfied. Audit report data 414 may also indicate files that could not be deleted, for example, because the files are located on removable media. Audit processor 404 then causes the audit report data 414 to be provided to document retention policy manager 110 .
  • FIG. 6 is a flow diagram 600 that depicts an approach for deleting electronic documents using a document retention policy according to an embodiment of the invention.
  • initial or updated document retention policy data is provided to network devices.
  • document retention policy manager 110 provides document retention policy data 306 to secure system 102 , workstation 104 , MFP 106 and personal computer 108 when these devices are initially put into service, and then at other times when document retention policy data 306 is updated.
  • retention policy auditor 304 may determine that a retention policy audit is to be performed in response to user input, based upon audit schedule data 308 , or some other criteria.
  • step 606 if a retention policy audit is to be performed, then the network devices are signaled to perform a retention policy audit.
  • policy auditor 304 signals the audit processor 404 on each network device.
  • step 608 the network devices perform the retention policy audit.
  • the audit processor 404 in each network device performs the retention policy audit.
  • step 610 the network devices generate and provide report data that indicates results of performing the retention policy audit.
  • the audit processor 404 on each network device causes report data to be generated and provided to document retention policy manager 110 .
  • the approach described herein for deleting electronic documents using a document retention policy is applicable to any type of data and not just electronic documents.
  • the approach is applicable to emails, message data and audio/video data.
  • FIG. 7 is a block diagram that illustrates a computer system 700 upon which an embodiment of the invention may be implemented.
  • Computer system 700 includes a bus 702 or other communication mechanism for communicating information, and a processor 704 coupled with bus 702 for processing information.
  • Computer system 700 also includes a main memory 706 , such as a random access memory (RAM) or other dynamic storage device, coupled to bus 702 for storing information and instructions to be executed by processor 704 .
  • Main memory 706 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 704 .
  • Computer system 700 further includes a read only memory (ROM) 708 or other static storage device coupled to bus 702 for storing static information and instructions for processor 704 .
  • ROM read only memory
  • a storage device 710 such as a magnetic disk or optical disk, is provided and coupled to bus 702 for storing information and instructions.
  • Computer system 700 may be coupled via bus 702 to a display 712 , such as a cathode ray tube (CRT), for displaying information to a computer user.
  • a display 712 such as a cathode ray tube (CRT)
  • An input device 714 is coupled to bus 702 for communicating information and command selections to processor 704 .
  • cursor control 716 is Another type of user input device
  • cursor control 716 such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 704 and for controlling cursor movement on display 712 .
  • This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
  • the invention is related to the use of computer system 700 or an MFP with a similar structure for implementing the techniques described herein. According to one embodiment of the invention, those techniques are performed by computer system 700 in response to processor 704 executing one or more sequences of one or more instructions contained in main memory 706 . Such instructions may be read into main memory 706 from another machine-readable medium, such as storage device 710 . Execution of the sequences of instructions contained in main memory 706 causes processor 704 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
  • machine-readable medium refers to any medium that participates in providing data that causes a machine to operation in a specific fashion.
  • various machine-readable media are involved, for example, in providing instructions to processor 704 for execution.
  • Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media.
  • Non-volatile media includes, for example, optical or magnetic disks, such as storage device 710 .
  • Volatile media includes dynamic memory, such as main memory 706 .
  • Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 702 . Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
  • Machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
  • Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 704 for execution.
  • the instructions may initially be carried on a magnetic disk of a remote computer.
  • the remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem.
  • a modem local to computer system 700 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal.
  • An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 702 .
  • Bus 702 carries the data to main memory 706 , from which processor 704 retrieves and executes the instructions.
  • the instructions received by main memory 706 may optionally be stored on storage device 710 either before or after execution by processor 704 .
  • Computer system 700 or an MFP with a similar structure also includes a communication interface 718 coupled to bus 702 .
  • Communication interface 718 provides a two-way data communication coupling to a network link 720 that is connected to a local network 722 .
  • communication interface 718 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line.
  • ISDN integrated services digital network
  • communication interface 718 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless links may also be implemented.
  • communication interface 718 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • Network link 720 typically provides data communication through one or more networks to other data devices.
  • network link 720 may provide a connection through local network 722 to a host computer 724 or to data equipment operated by an Internet Service Provider (ISP) 726 .
  • ISP 726 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 728 .
  • Internet 728 uses electrical, electromagnetic or optical signals that carry digital data streams.
  • the signals through the various networks and the signals on network link 720 and through communication interface 718 which carry the digital data to and from computer system 700 , are exemplary forms of carrier waves transporting the information.
  • Computer system 700 can send messages and receive data, including program code, through the network(s), network link 720 and communication interface 718 .
  • a server 730 might transmit a requested code for an application program through Internet 728 , ISP 726 , local network 722 and communication interface 718 .
  • the received code may be executed by processor 704 as it is received, and/or stored in storage device 710 , or other non-volatile storage for later execution. In this manner, computer system 700 may obtain application code in the form of a carrier wave.

Abstract

An approach is provided for deleting electronic documents on network devices using a document retention policy. The document retention policy specifies one or more deletion criteria for documents belonging to each of a plurality of document classifications. The document retention policy is defined by document retention policy data that is managed by a document retention policy manager. The document retention policy manager disseminates the document retention policy data to network elements over a communications network. The document retention policy manager determines whether a retention policy audit should be performed and if so, signals the network elements to conduct a retention policy audit. The network elements are configured to conduct the retention policy audit by deleting electronic documents in accordance with the document retention policy. The network elements are further configured to generate and provide to the document retention policy manager report data that indicates results of performing the retention policy audit.

Description

    FIELD OF THE INVENTION
  • This invention relates generally to electronic document management, and more specifically, to an approach for deleting electronic documents on network devices using document retention policies.
  • BACKGROUND
  • The approaches described in this section are approaches that could be pursued, but not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated, the approaches described in this section may not be prior art to the claims in this application and are not admitted to be prior art by inclusion in this section.
  • Many businesses have implemented document retention policies to define conditions under which documents are to be destroyed. Businesses typically destroy documents to reduce costs attributable to maintaining old documents and to reduce potential legal liability. Document retention policies may apply to physical documents as well as electronic documents.
  • One of the problems with document retention policies is the difficulty in uniformly applying a document retention policy to all copies of a particular document. For example, a document retention policy may specify the destruction of a particular document after a specified time. Some copies of the particular document may be readily obtained and destroyed. Other copies of the particular document may exist but may be difficult to locate. For example, copies of the particular document may have been sent to remote storage and may be difficult, if not impossible, to locate. In other situations, the existence of some copies of the particular document may not even be known. This may occur, for example, if copies of the particular document were made, but no record was made documenting that the copies were made. This can be potentially damaging if the unknown copies are later discovered in litigation by an adverse party. Furthermore, in some situations, adverse inferences may be drawn when only select copies of electronic documents are deleted. This problem is particularly acute for electronic documents, where many copies of a particular electronic document may be unknowingly made and stored at intermediate network node locations. As a result of this problem, document management systems have been developed to implement document retention policies for electronic documents. The effectiveness of these systems necessarily depends upon knowing about the existence of all copies of electronic documents and the locations of those copies. With the proliferation of wired and wireless networks, the many different types of network devices, e.g., computers, hand-held devices, personal digital assistants (PDAs), and the many different forms of electronic documents, e.g., email and messages, it is increasingly difficult to track the existence and location of all copies of an electronic document.
  • Based on the foregoing, there is a need for an approach for deleting electronic documents on network devices that does not suffer from limitations of prior approaches.
  • SUMMARY
  • An approach is provided for deleting electronic documents on network devices using a document retention policy. The document retention policy specifies one or more deletion criteria for documents belonging to each of a plurality of document classifications. For example, the document retention policy may specify that documents belonging to a particular document classification are to be deleted after a specified time, at a specified time or in response to the occurrence of a particular event. The document retention policy is defined by document retention policy data that is managed by a document retention policy manager. The document retention policy manager disseminates the document retention policy data to one or more network elements over a communications network. The document retention policy manager determines whether a retention policy audit should be performed. If so, then the document retention policy manager signals the one or more network elements to conduct a retention policy audit. The network elements are configured to conduct the retention policy audit by deleting electronic documents in accordance with the document retention policy. The one or more network elements are further configured to generate and provide to the document retention policy manager report data that indicates results of performing the retention policy audit.
  • According to one aspect of the invention, a computer-implemented method is provided for deleting electronic documents on network devices. Document retention policy data is retrieved that specifies one or more deletion criteria for each of a plurality of electronic document classifications. The document retention policy data is transmitted to one or more network devices over a communications network. A determination is made whether a retention policy audit should be conducted. If the retention policy audit should be conducted, then the one or more network devices are signaled to cause the one or more network devices to perform the retention policy audit. Performing the retention policy audit includes identifying, from the plurality of electronic document classifications, one or more electronic document classifications for which the corresponding one or more deletion criteria are satisfied and deleting one or more electronic documents associated with the identified one or more electronic document classifications. Audit report data is received from the one or more network devices that indicate results of the one or more network devices performing the retention policy audit.
  • According to another aspect of the invention, a computer-implemented method is provided for deleting electronic documents on network devices. Document retention policy data is received at each of a plurality of network devices over a communications network from a document retention policy manager executing on another network device. The document retention policy data specifies one or more deletion criteria for each of a plurality of electronic document classifications. An instruction to conduct a retention policy audit is received at each of the plurality of network devices from the document retention policy manager executing on the another network device. In response to receiving the instruction at each of the plurality of network devices, an audit processor on each of the plurality of network devices causing the retention policy audit to be conducted by identifying, from the plurality of electronic document classifications, one or more electronic document classifications for which the corresponding one or more deletion criteria are satisfied, and deleting one or more electronic documents associated with the identified one or more electronic document classifications. The audit processors also cause audit report data to be generated that indicates results of performing the retention policy audit and cause the audit report data to be provided to the document retention policy manager over the communications network.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • In the figures of the accompanying drawings like reference numerals refer to similar elements.
  • FIG. 1 is a block diagram that depicts an arrangement for deleting electronic documents using a document retention policy according to an embodiment of the invention.
  • FIG. 2 is a table that depicts example document retention policy data.
  • FIG. 3 depicts an example implementation of document retention policy manager.
  • FIG. 4 is a block diagram that depicts an example implementation of secure system.
  • FIG. 5 depicts a file information table, in accordance with an embodiment of the invention.
  • FIG. 6 is a flow diagram that depicts an approach for deleting electronic documents using a document retention policy according to an embodiment of the invention.
  • FIG. 7 is a block diagram of a computer system on which embodiments of the invention may be implemented.
  • DETAILED DESCRIPTION
  • In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention. Various aspects of the invention are described hereinafter in the following sections:
      • I. OVERVIEW
      • II. ELECTRONIC DOCUMENT MANAGEMENT ARCHITECTURE
      • III. DOCUMENT RETENTION POLICIES
      • IV. CREATING, MAINTAINING AND DISTRIBUTING DOCUMENT RETENTION POLICIES
      • V. ENFORCING A DOCUMENT RETENTION POLICY USING AUDITS
      • VI. IMPLEMENTATION MECHANISMS
        I. Overview
  • An approach is provided for deleting electronic documents on network devices using a document retention policy. The document retention policy specifies one or more deletion criteria for documents belonging to each of a plurality of document classifications. For example, the document retention policy may specify that documents belonging to a particular document classification are to be deleted after a specified time, at a specified time or in response to the occurrence of a particular event. The document retention policy is defined by document retention policy data that is managed by a document retention policy manager. The document retention policy manager disseminates the document retention policy data to one or more network elements over a communications network. The document retention policy manager determines whether a retention policy audit should be performed. If so, then the document retention policy manager signals the one or more network elements to conduct a retention policy audit. The network elements are configured to conduct the retention policy audit by deleting electronic documents in accordance with the document retention policy. The one or more network elements are further configured to generate and provide to the document retention policy manager report data that indicates results of performing the retention policy audit.
  • II. Electronic Document Management Architecture
  • FIG. 1 is a block diagram that depicts an arrangement 100 for deleting electronic documents using a document retention policy according to an embodiment of the invention. Arrangement 100 includes a secure system 102, a workstation 104, a multifunction peripheral (MFP) 106, a personal computer 108 and a document retention policy manager 110 communicatively coupled to a network 112. Network 112 may be implemented by any mechanism or medium that provides for the exchange of information between the elements depicted in FIG. 1. Examples of network 112 include, without limitation, a network such as a Local Area Network (LAN), Wide Area Network (WAN), Ethernet or the Internet, or one or more terrestrial, satellite or wireless links. Although the various elements are depicted in FIG. 1 as being external to network 112, any of these elements may be implemented within network 112, depending upon the requirements of a particular implementation.
  • Secure system 102 is a system configured to maintain data in a secure manner. For example, secure system 102 may include a gateway or other mechanism for controlling access to data stored in secure system 102. Workstation 104 is any type of workstation and MFP 106 is any device that performs one or more functions, such as printing, copying, facsimile or scanning. Personal computer 108 is any type of personal computer.
  • Although embodiments of the invention are described herein in the context of managing documents on secure system 102, workstation 104, MFP 106 and personal computer 108, the approach for managing documents is applicable to a wide variety of devices. Other example devices include, without limitation, wired or wireless devices such as personal digital assistants (PDAs), portable or laptop computers and other network devices.
  • III. Document Retention Polices
  • According to one embodiment of the invention, a document retention policy specifies one or more deletion criteria for a plurality of electronic document classifications. FIG. 2 is a table 200 that depicts example document retention policy data. FIG. 2 depicts the document retention policy data organized in tabular format for explanation purposes only and the document retention policy data may be stored in any type of data structure or format, depending upon the requirements of a particular implementation. Furthermore, document retention policy data 122 is not limited to the example data depicted in table 200 and may include fewer data types or more data types than depicted in FIG. 2, depending upon the requirements of a particular implementation.
  • In the example depicted in FIG. 2, table 200 includes a document classification column, a deletion criteria column, a document type column (“O”=official; “P”=private) and a classification description column. Each row of table 200 specifies a retention policy for a particular document classification. For example, the document classification L1 pertains to meeting records and has a document retention policy that specifies that documents in this classification are to be deleted after five years. In this example, the “L” in the document classification “L1” refers to a legal requirement where the length of retention is specified by law. As another example, the document classification C4 pertains to project “A” data and has a document retention policy that specifies that documents in this classification are to be deleted after the project has been completed. In this example, the “C” in the document classification “C4” refers to a corporate standard.
  • Any number and types of document classifications and deletion criteria may be used, depending upon the requirements of a particular implementation, and the invention is not limited to any particular number or types of document classifications or deletion criteria. For example, as described above, the deletion criteria may specify a time duration that may be applied on a document-by-document basis, based upon the creation date or storage date of the electronic documents. As another example, the deletion criteria may specify a date certain at which all constituent documents of an electronic document classification are to be deleted. As another example, the deletion criteria may specify that all documents associated with an electronic document classification are to be deleted in response to the occurrence of an event. Example events include a notification from administrative personnel and the completion of a project, as described above.
  • IV. Creating, Maintaining and Distributing Document Retention Polices
  • According to one embodiment of the invention, document retention policy manager 110 provides for the creation and management of document retention policies that are defined by document retention policy data. FIG. 3 depicts an example implementation of document retention policy manager 110. In this example, document retention policy manager 110 is configured with a graphical user interface (GUI) 300, a retention policy editor 302 and a retention policy auditor 304. Document retention policy manager 110 also includes document retention policy data 306, audit schedule data 308 and audit report data 310. Document retention policy data 306 is described in this section, while audit schedule data 308 and audit report data 310 are described in later sections.
  • Retention policy editor 302 is configured to allow users to create, store and manage document retention policies via GUI 300. For example, retention policy editor 302 allows users to create document retention policy data 306, such as the document retention policy data contained in table 200, through the use of various editing controls. This may include, for example, allowing a user to edit “raw” document retention policy data 306 or display one or more templates on GUI 300 and allow the user to enter data into available fields. Alternatively, a user may retrieve existing document retention policy data 306 from a storage medium. Users may then edit and store the document retention policy data 306. Users may also use the editing controls provided by retention policy editor 302 to delete document retention policy data 306. Document retention policy data 306 may be stored in a volatile memory, such as a random access memory (RAM), and/or stored on a non-volatile memory such as one or more disks, optical media or tape.
  • According to one embodiment of the invention, document retention policy manager 110 is configured to distribute document retention policy data 306 to secure system 102, workstation 104, MFP 106 and personal computer 108. Document retention policy manager 110 may be configured to automatically provide document retention policy data 306 to those elements that require the data. Document retention policy manager 110 may be configured to query secure system 102, workstation 104, MFP 106 and personal computer 108 to determine which of these elements requires document retention policy data 306. Alternatively, these elements may request document retention policy data 306 from document retention policy manager 110. Furthermore, retention policy auditor 304 may be configured to provide document retention policy data 306 to secure system 102, workstation 104, MFP 106 and personal computer 108 in response to document retention policy data 306 being updated. For example, suppose that a user updates document retention policy data 306 using retention policy editor 302. An administrator may determine that document retention policy data 306 needs to be updated to reflect a change in a document retention policy. According to one embodiment of the invention, retention policy auditor 304 is configured to automatically detect that document retention policy data 306 has been updated and provide the updated document retention policy data 306 to secure system 102, workstation 104, MFP 106 and personal computer 108.
  • V. Enforcing a Document Retention Policy Using Audits
  • Document retention policy manager 110 is configured to enforce document retention policies using audits. According to one embodiment of the invention, retention policy auditor 304 is configured to signal one or more of secure system 102, workstation 104, MFP 106 and personal computer 108 to perform an audit. Retention policy auditor 304 may cause audits to be performed in response to user input. For example, administrative personnel may indicate, via GUI 300, that a retention policy audit is to be performed. Retention policy auditor 304 may also cause audits to be performed based upon a schedule specified by audit schedule data 308. In response to receiving the signal to conduct a retention policy audit from retention policy auditor 304, each of these elements conducts an audit. For purposes of explanation, the audit process is described herein with respect secure system 102, although the approach is applicable to the other elements depicted in FIG. 1., namely, workstation 104, MFP 106 and personal computer 108, as well as any other type of element.
  • FIG. 4 is a block diagram that depicts an example implementation of secure system 102. In this example, secure system 102 includes a GUI 400, a document manager 402, an audit processor 404, a file classifier 406, a file handler 408 and an operating system 410. Secure system 102 also includes document retention policy data 306, received from document retention policy manager 110, a file information table 412 and audit report data 414. GUI 400 may be implemented by any mechanism that allows secure system 102 to convey information to a user. Document manager 402 performs a variety of document management tasks for secure system 102. For example, document manager 402 interacts with document retention policy manager 110 to coordinate the request and/or receipt of document retention policy data 306.
  • According to one embodiment of the invention, when secure system 102 receives an audit signal from document retention policy manager 110, document manager 402 provides the audit signal to audit processor 404. Audit processor 404 examines document retention policy data 306 to identify document classifications for which the corresponding deletion criteria have been satisfied. For example, if at least one year has elapsed since document classification C3 was activated, then the deletion criteria are satisfied and electronic documents associated with document classification C3 are to be deleted. Audit processor 404 then identifies documents stored on secure system 102 that are associated with document classification C3 and causes the identified documents to be deleted from secure system 102. In situations where a file cannot be deleted because it is no longer located on secure system, then audit processor 404 indicates this fact in report data provided to document retention policy manager 110. This situation may occur, for example, if a data file was stored on a removable media, such as a floppy disk, a removable disk drive or a portable storage device. The use of report data is described in more detail hereinafter.
  • According to one embodiment of the invention, audit processor 404 uses a file information table, such as the file information table 500 depicted in FIG. 5, to determine which documents are associated with a particular document classification. File information table 500 includes data that indicates, for each electronic document, a file name, a creation data, a location and a classification. The file name is the name of the file that contains the electronic document. The classification is the same as the document classification from table 200. The creation date is the creation date of the file that contains the electronic document. The creation date is useful for identifying particular electronic documents to be deleted on a document-by-document basis. For example, a particular document classification may have associated deletion criteria that specify deletion after one year from creation date of the document. In this situation, different electronic documents that have different creation dates, although all associated with the same particular document classification, are deleted at different times because of their different creation dates. The location indicates whether the file is stored locally on the particular element or on a removable storage media. For example, an “L” indicates that a particular electronic document is stored locally on secure system 102, while an “R” indicates that the particular electronic document is stored on a removable media or at another location.
  • According to one embodiment of the invention, document manager 402 manages the creation and maintenance of file information table 500. Document manager 402 operates in conjunction with file handler 408 to create and populate file information table 500. For example, file handler 408 detects that a save or copy command has been issued to operating system 410 and in response, creates an entry in file information table 500 for the file that was saved or copied. File handler 408 may also detect that a file name has been changed and update the corresponding file name in file information table 500. File classifier 406 then interacts with a user through GUI 400 to obtain the classification for each file, or to copy the classification of the original file, in the case of a file copy.
  • After performing a retention policy audit, audit processor 404 causes the generation of audit report data 414 that indicates results of performing the audit. For example, audit report data 414 may indicate files that were deleted in response to deletion criteria being satisfied. Audit report data 414 may also indicate files that could not be deleted, for example, because the files are located on removable media. Audit processor 404 then causes the audit report data 414 to be provided to document retention policy manager 110.
  • FIG. 6 is a flow diagram 600 that depicts an approach for deleting electronic documents using a document retention policy according to an embodiment of the invention. In step 602, initial or updated document retention policy data is provided to network devices. For example, document retention policy manager 110 provides document retention policy data 306 to secure system 102, workstation 104, MFP 106 and personal computer 108 when these devices are initially put into service, and then at other times when document retention policy data 306 is updated.
  • In step 604, a determination is made whether a retention policy audit should be performed. For example, as described herein, retention policy auditor 304 may determine that a retention policy audit is to be performed in response to user input, based upon audit schedule data 308, or some other criteria.
  • In step 606, if a retention policy audit is to be performed, then the network devices are signaled to perform a retention policy audit. For example, policy auditor 304 signals the audit processor 404 on each network device. In step 608, the network devices perform the retention policy audit. For example, the audit processor 404 in each network device performs the retention policy audit.
  • In step 610 the network devices generate and provide report data that indicates results of performing the retention policy audit. For example, the audit processor 404 on each network device causes report data to be generated and provided to document retention policy manager 110.
  • VI. Implementation Mechanisms
  • The approach described herein for deleting electronic documents using a document retention policy is applicable to any type of data and not just electronic documents. For example, the approach is applicable to emails, message data and audio/video data.
  • FIG. 7 is a block diagram that illustrates a computer system 700 upon which an embodiment of the invention may be implemented. Computer system 700 includes a bus 702 or other communication mechanism for communicating information, and a processor 704 coupled with bus 702 for processing information. Computer system 700 also includes a main memory 706, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 702 for storing information and instructions to be executed by processor 704. Main memory 706 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 704. Computer system 700 further includes a read only memory (ROM) 708 or other static storage device coupled to bus 702 for storing static information and instructions for processor 704. A storage device 710, such as a magnetic disk or optical disk, is provided and coupled to bus 702 for storing information and instructions.
  • Computer system 700 may be coupled via bus 702 to a display 712, such as a cathode ray tube (CRT), for displaying information to a computer user. An input device 714, including alphanumeric and other keys, is coupled to bus 702 for communicating information and command selections to processor 704. Another type of user input device is cursor control 716, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 704 and for controlling cursor movement on display 712. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
  • The invention is related to the use of computer system 700 or an MFP with a similar structure for implementing the techniques described herein. According to one embodiment of the invention, those techniques are performed by computer system 700 in response to processor 704 executing one or more sequences of one or more instructions contained in main memory 706. Such instructions may be read into main memory 706 from another machine-readable medium, such as storage device 710. Execution of the sequences of instructions contained in main memory 706 causes processor 704 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
  • The term “machine-readable medium” as used herein refers to any medium that participates in providing data that causes a machine to operation in a specific fashion. In an embodiment implemented using computer system 700, various machine-readable media are involved, for example, in providing instructions to processor 704 for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 710. Volatile media includes dynamic memory, such as main memory 706. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 702. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
  • Common forms of machine-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punchcards, papertape, any other physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
  • Various forms of machine-readable media may be involved in carrying one or more sequences of one or more instructions to processor 704 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 700 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 702. Bus 702 carries the data to main memory 706, from which processor 704 retrieves and executes the instructions. The instructions received by main memory 706 may optionally be stored on storage device 710 either before or after execution by processor 704.
  • Computer system 700 or an MFP with a similar structure also includes a communication interface 718 coupled to bus 702. Communication interface 718 provides a two-way data communication coupling to a network link 720 that is connected to a local network 722. For example, communication interface 718 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 718 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 718 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • Network link 720 typically provides data communication through one or more networks to other data devices. For example, network link 720 may provide a connection through local network 722 to a host computer 724 or to data equipment operated by an Internet Service Provider (ISP) 726. ISP 726 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 728. Local network 722 and Internet 728 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals on network link 720 and through communication interface 718, which carry the digital data to and from computer system 700, are exemplary forms of carrier waves transporting the information.
  • Computer system 700 can send messages and receive data, including program code, through the network(s), network link 720 and communication interface 718. In the Internet example, a server 730 might transmit a requested code for an application program through Internet 728, ISP 726, local network 722 and communication interface 718. The received code may be executed by processor 704 as it is received, and/or stored in storage device 710, or other non-volatile storage for later execution. In this manner, computer system 700 may obtain application code in the form of a carrier wave.
  • In the foregoing specification, embodiments of the invention have been described with reference to numerous specific details that may vary from implementation to implementation. Thus, the sole and exclusive indicator of what is, and is intended by the applicants to be, the invention is the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction. Hence, no limitation, element, property, feature, advantage or attribute that is not expressly recited in a claim should limit the scope of such claim in any way. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims (45)

1. A computer-implemented method for deleting electronic documents on network devices, the computer-implemented method comprising:
retrieving document retention policy data that specifies one or more deletion criteria for each of a plurality of electronic document classifications;
transmitting the document retention policy data to one or more network devices over a communications network;
determining whether a retention policy audit should be conducted; and
if the retention policy audit should be conducted, then
signaling the one or more network devices to cause the one or more network devices to perform the retention policy audit, wherein performing the retention policy audit includes
identifying, from the plurality of electronic document classifications, one or more electronic document classifications for which the corresponding one or more deletion criteria are satisfied, and
deleting one or more electronic documents associated with the identified one or more electronic document classifications, and
receiving, from the one or more network devices, audit report data that indicates results of the one or more network devices performing the retention policy audit.
2. The computer-implemented method as recited in claim 1, wherein the deletion criteria include a time duration for each of the plurality of electronic document classifications.
3. The computer-implemented method as recited in claim 1, wherein the deletion criteria include a deletion time for each of the plurality of electronic document classifications.
4. The computer-implemented method as recited in claim 1, wherein the deletion criteria include the occurrence of one or more events.
5. The computer-implemented method as recited in claim 1, further comprising allowing a user to create and edit the document retention policy data.
6. The computer-implemented method as recited in claim 1, wherein providing the document retention policy data to one or more network devices is performed in response to the document retention policy data being updated.
7. The computer-implemented method as recited in claim 1, wherein determining whether a retention policy audit should be conducted includes determining whether user input has been received indicating that the retention policy audit should be conducted.
8. The computer-implemented method as recited in claim 1, wherein determining whether a retention policy audit should be conducted includes determining whether audit schedule data indicates that the retention policy audit should be conducted.
9. The computer-implemented method as recited in claim 1, wherein the audit report data indicates whether one or more data files could be deleted.
10. A computer-readable medium for deleting electronic documents on network devices, the computer-readable medium carrying instructions which, when executed by one or more processors, cause:
retrieving document retention policy data that specifies one or more deletion criteria for each of a plurality of electronic document classifications;
transmitting the document retention policy data to one or more network devices over a communications network;
determining whether a retention policy audit should be conducted; and
if the retention policy audit should be conducted, then
signaling the one or more network devices to cause the one or more network devices to perform the retention policy audit, wherein performing the retention policy audit includes
identifying, from the plurality of electronic document classifications, one or more electronic document classifications for which the corresponding one or more deletion criteria are satisfied, and
deleting one or more electronic documents associated with the identified one or more electronic document classifications, and
receiving, from the one or more network devices, audit report data that indicates results of the one or more network devices performing the retention policy audit.
11. The computer-readable medium as recited in claim 10, wherein the deletion criteria include a time duration for each of the plurality of electronic document classifications.
12. The computer-readable medium as recited in claim 10, wherein the deletion criteria include a deletion time for each of the plurality of electronic document classifications.
13. The computer-readable medium as recited in claim 10, wherein the deletion criteria include the occurrence of one or more events.
14. The computer-readable medium as recited in claim 10, further comprising additional instructions which, when executed by the one or more processors, causes allowing a user to create and edit the document retention policy data allowing a user to create and edit the document retention policy data.
15. The computer-readable medium as recited in claim 10, wherein providing the document retention policy data to one or more network devices is performed in response to the document retention policy data being updated.
16. The computer-readable medium as recited in claim 10, wherein determining whether a retention policy audit should be conducted includes determining whether user input has been received indicating that the retention policy audit should be conducted.
17. The computer-readable medium as recited in claim 10, wherein determining whether a retention policy audit should be conducted includes determining whether audit schedule data indicates that the retention policy audit should be conducted.
18. The computer-readable medium as recited in claim 10, wherein the audit report data indicates whether one or more data files could be deleted.
19. An apparatus for deleting electronic documents on network devices, the apparatus comprising:
one or more processors; and
a memory communicatively coupled to the one or more processors and storing one or more instructions which, when executed by the one or more processors, cause retrieving document retention policy data that specifies one or more deletion criteria for each of a plurality of electronic document classifications;
transmitting the document retention policy data to one or more network devices over a communications network;
determining whether a retention policy audit should be conducted; and
if the retention policy audit should be conducted, then
signaling the one or more network devices to cause the one or more
network devices to perform the retention policy audit, wherein
performing the retention policy audit includes
identifying, from the plurality of electronic document classifications, one or more electronic document classifications for which the corresponding one or more deletion criteria are satisfied, and
deleting one or more electronic documents associated with the identified one or more electronic document classifications, and
receiving, from the one or more network devices, audit report data that indicates results of the one or more network devices performing the retention policy audit.
20. The apparatus as recited in claim 19, wherein the deletion criteria include a time duration for each of the plurality of electronic document classifications.
21. The apparatus as recited in claim 19, wherein the deletion criteria include a deletion time for each of the plurality of electronic document classifications.
22. The apparatus as recited in claim 19, wherein the deletion criteria include the occurrence of one or more events.
23. The apparatus as recited in claim 19, wherein the memory further stores additional instructions which, when executed by the one or more processors, causes allowing a user to create and edit the document retention policy data.
24. The apparatus as recited in claim 19, wherein providing the document retention policy data to one or more network devices is performed in response to the document retention policy data being updated.
25. The apparatus as recited in claim 19, wherein determining whether a retention policy audit should be conducted includes determining whether user input has been received indicating that the retention policy audit should be conducted.
26. The apparatus as recited in claim 19, wherein determining whether a retention policy audit should be conducted includes determining whether audit schedule data indicates that the retention policy audit should be conducted.
27. The apparatus as recited in claim 19, wherein the audit report data indicates whether one or more data files could be deleted.
28. A computer-implemented method for deleting electronic documents on network devices, the computer-implemented method comprising:
receiving at each of a plurality of network devices over a communications network, document retention policy data from a document retention policy manager executing on another network device, wherein the document retention policy data specifies one or more deletion criteria for each of a plurality of electronic document classifications;
receiving, at each of the plurality of network devices from the document retention policy manager executing on the another network device, an instruction to conduct a retention policy audit; and
in response to receiving the instruction at each of the plurality of network devices, an audit processor on each of the plurality of network devices causing the retention policy audit to be conducted by
identifying, from the plurality of electronic document classifications, one or more electronic document classifications for which the corresponding one or more deletion criteria are satisfied, and
deleting one or more electronic documents associated with the identified one or more electronic document classifications;
causing audit report data to be generated that indicates results of performing the retention policy audit, and
causing the audit report data to be provided to the document retention policy manager over the communications network.
29. The computer-implemented method as recited in claim 28, wherein the deletion criteria include a time duration for each of the plurality of electronic document classifications.
30. The computer-implemented method as recited in claim 28, wherein the deletion criteria include a deletion time for each of the plurality of electronic document classifications.
31. The computer-implemented method as recited in claim 28, wherein the deletion criteria include the occurrence of one or more events.
32. The computer-implemented method as recited in claim 28, wherein the document retention policy manager on each of the plurality of network devices is configured to allow a user to specify which of the plurality of electronic document classifications each of a plurality of electronic documents belongs to.
33. The computer-implemented method as recited in claim 28, wherein the audit report data indicates whether one or more data files could be deleted.
34. A computer-readable medium for deleting electronic documents on network devices, the computer-readable medium carrying instructions which, when executed by one or more processors, cause:
receiving at each of a plurality of network devices over a communications network, document retention policy data from a document retention policy manager executing on another network device, wherein the document retention policy data specifies one or more deletion criteria for each of a plurality~of electronic document classifications;
receiving, at each of the plurality of network devices from the document retention policy manager executing on the another network device, an instruction to conduct a retention policy audit; and
in response to receiving the instruction at each of the plurality of network devices, an audit processor on each of the plurality of network devices causing the retention policy audit to be conducted by
identifying, from the plurality of electronic document classifications, one or more electronic document classifications for which the corresponding one or more deletion criteria are satisfied, and
deleting one or more electronic documents associated with the identified one or more electronic document classifications;
causing audit report data to be generated that indicates results of performing the retention policy audit, and
causing the audit report data to be provided to the document retention policy manager over the communications network.
35. The computer-readable medium as recited in claim 34, wherein the deletion criteria include a time duration for each of the plurality of electronic document classifications.
36. The computer-readable medium as recited in claim 34, wherein the deletion criteria include a deletion time for each of the plurality of electronic document classifications.
37. The computer-readable medium as recited in claim 34, wherein the deletion criteria include the occurrence of one or more events.
38. The computer-readable medium as recited in claim 34, wherein the document retention policy manager on each of the plurality of network devices is configured to allow a user to specify which of the plurality of electronic document classifications each of a plurality of electronic documents belongs to.
39. The computer-readable medium as recited in claim 34, wherein the audit report data indicates whether one or more data files could be deleted.
40. An apparatus for deleting electronic documents on network devices, the apparatus comprising:
one or more processors; and
a memory communicatively coupled to the one or more processors and storing instructions which, when executed by the one or more processors, cause
receiving at each of a plurality of network devices over a communications network, document retention policy data from a document retention policy manager executing on another network device, wherein the document retention policy data specifies one or more deletion criteria for each of a plurality of electronic document classifications;
receiving, at each of the plurality of network devices from the document retention policy manager executing on the another network device, an instruction to conduct a retention policy audit; and
in response to receiving the instruction at each of the plurality of network devices, an audit processor on each of the plurality of network devices causing the retention policy audit to be conducted by
identifying, from the plurality of electronic document classifications, one or more electronic document classifications for which the corresponding one or more deletion criteria are satisfied, and
deleting one or more electronic documents associated with the identified one or more electronic document classifications;
causing audit report data to be generated that indicates results of performing the retention policy audit, and
causing the audit report data to be provided to the document retention policy manager over the communications network.
41. The apparatus as recited in claim 40, wherein the deletion criteria include a time duration for each of the plurality of electronic document classifications.
42. The apparatus as recited in claim 40, wherein the deletion criteria include a deletion time for each of the plurality of electronic document classifications.
43. The apparatus as recited in claim 40, wherein the deletion criteria include the occurrence of one or more events.
44. The apparatus as recited in claim 40, wherein the document retention policy manager on each of the plurality of network devices is configured to allow a user to specify which of the plurality of electronic document classifications each of a plurality of electronic documents belongs to.
45. The apparatus as recited in claim 40, wherein the audit report data indicates whether one or more data files could be deleted.
US11/034,483 2005-01-12 2005-01-12 Approach for deleting electronic documents on network devices using document retention policies Abandoned US20060156381A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US11/034,483 US20060156381A1 (en) 2005-01-12 2005-01-12 Approach for deleting electronic documents on network devices using document retention policies
US11/182,870 US7703125B2 (en) 2005-01-12 2005-07-14 Approach for deleting electronic documents on network devices using document retention policies
JP2006004238A JP2006195998A (en) 2005-01-12 2006-01-11 Method of deleting electronic document on network system using document storage policy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/034,483 US20060156381A1 (en) 2005-01-12 2005-01-12 Approach for deleting electronic documents on network devices using document retention policies

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/182,870 Continuation-In-Part US7703125B2 (en) 2005-01-12 2005-07-14 Approach for deleting electronic documents on network devices using document retention policies

Publications (1)

Publication Number Publication Date
US20060156381A1 true US20060156381A1 (en) 2006-07-13

Family

ID=36654870

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/034,483 Abandoned US20060156381A1 (en) 2005-01-12 2005-01-12 Approach for deleting electronic documents on network devices using document retention policies
US11/182,870 Active 2028-05-14 US7703125B2 (en) 2005-01-12 2005-07-14 Approach for deleting electronic documents on network devices using document retention policies

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/182,870 Active 2028-05-14 US7703125B2 (en) 2005-01-12 2005-07-14 Approach for deleting electronic documents on network devices using document retention policies

Country Status (2)

Country Link
US (2) US20060156381A1 (en)
JP (1) JP2006195998A (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070076229A1 (en) * 2005-09-30 2007-04-05 Samsung Electronics Co., Ltd. Image forming device and printing system having selective printing function of address book and printing method thereof
US20080168122A1 (en) * 2007-01-10 2008-07-10 Benjamin Joseph Fletcher Publish/subscribe system
US20080294492A1 (en) * 2007-05-24 2008-11-27 Irina Simpson Proactively determining potential evidence issues for custodial systems in active litigation
US20080294586A1 (en) * 2005-12-29 2008-11-27 Blue Jungle Enforcing Application and Access Control Policies in an Information Management System with Two or More Interactive Enforcement Points
US20090313196A1 (en) * 2008-06-12 2009-12-17 Nazrul Islam External scoping sources to determine affected people, systems, and classes of information in legal matters
US20090327375A1 (en) * 2008-06-30 2009-12-31 Deidre Paknad Method and Apparatus for Handling Edge-Cases of Event-Driven Disposition
US20100082676A1 (en) * 2008-09-30 2010-04-01 Deidre Paknad Method and apparatus to define and justify policy requirements using a legal reference library
US8073729B2 (en) 2008-09-30 2011-12-06 International Business Machines Corporation Forecasting discovery costs based on interpolation of historic event patterns
US8112406B2 (en) 2007-12-21 2012-02-07 International Business Machines Corporation Method and apparatus for electronic data discovery
US8140494B2 (en) 2008-01-21 2012-03-20 International Business Machines Corporation Providing collection transparency information to an end user to achieve a guaranteed quality document search and production in electronic data discovery
US8250041B2 (en) 2009-12-22 2012-08-21 International Business Machines Corporation Method and apparatus for propagation of file plans from enterprise retention management applications to records management systems
US8327384B2 (en) 2008-06-30 2012-12-04 International Business Machines Corporation Event driven disposition
US8402359B1 (en) 2010-06-30 2013-03-19 International Business Machines Corporation Method and apparatus for managing recent activity navigation in web applications
US8484069B2 (en) 2008-06-30 2013-07-09 International Business Machines Corporation Forecasting discovery costs based on complex and incomplete facts
US8489439B2 (en) 2008-06-30 2013-07-16 International Business Machines Corporation Forecasting discovery costs based on complex and incomplete facts
US8566903B2 (en) 2010-06-29 2013-10-22 International Business Machines Corporation Enterprise evidence repository providing access control to collected artifacts
US8572043B2 (en) 2007-12-20 2013-10-29 International Business Machines Corporation Method and system for storage of unstructured data for electronic discovery in external data stores
US8655856B2 (en) 2009-12-22 2014-02-18 International Business Machines Corporation Method and apparatus for policy distribution
US8832148B2 (en) 2010-06-29 2014-09-09 International Business Machines Corporation Enterprise evidence repository
US9621584B1 (en) * 2009-09-30 2017-04-11 Amazon Technologies, Inc. Standards compliance for computing data
US9830563B2 (en) 2008-06-27 2017-11-28 International Business Machines Corporation System and method for managing legal obligations for data
US10846139B2 (en) 2018-11-15 2020-11-24 Bank Of America Corporation Self-purgative electronic resources

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7181010B2 (en) * 2002-05-24 2007-02-20 Scientific-Atlanta, Inc. Apparatus for entitling remote client devices
US7861082B2 (en) 2002-05-24 2010-12-28 Pinder Howard G Validating client-receivers
US20060106857A1 (en) * 2004-11-12 2006-05-18 Lillibridge Mark D Method and system for assured document retention
US7970743B1 (en) 2005-09-15 2011-06-28 Emc Corporation Retention and disposition of stored content associated with multiple stored objects
US8321381B2 (en) * 2005-12-19 2012-11-27 Oracle International Corporation Facilitating a sender of email communications to specify policies with which the email communication are to be managed as a record
US7594082B1 (en) * 2006-03-07 2009-09-22 Emc Corporation Resolving retention policy conflicts
US7814063B1 (en) 2006-03-07 2010-10-12 Emc Corporation Retention and disposition of components of a complex stored object
US7818300B1 (en) 2006-03-07 2010-10-19 Emc Corporation Consistent retention and disposition of managed content and associated metadata
US8577852B2 (en) * 2006-03-23 2013-11-05 Infaxiom Group, Llc Automated records inventory and retention schedule generation system
US8208796B2 (en) * 2006-04-17 2012-06-26 Prus Bohdan S Systems and methods for prioritizing the storage location of media data
US9195665B2 (en) * 2006-04-28 2015-11-24 Hewlett-Packard Development Company, L.P. Method and system for data retention
GB0609997D0 (en) * 2006-05-19 2006-06-28 Ibm Method, apparatus and computer program for controlling retention of data messages
EP2027563A2 (en) * 2006-05-22 2009-02-25 Iron Mountain Incorporated Methods and apparatus for managing retention of information assets
US9277295B2 (en) 2006-06-16 2016-03-01 Cisco Technology, Inc. Securing media content using interchangeable encryption key
US20080005204A1 (en) * 2006-06-30 2008-01-03 Scientific-Atlanta, Inc. Systems and Methods for Applying Retention Rules
US7978720B2 (en) * 2006-06-30 2011-07-12 Russ Samuel H Digital media device having media content transfer capability
US9137480B2 (en) 2006-06-30 2015-09-15 Cisco Technology, Inc. Secure escrow and recovery of media device content keys
US7801862B1 (en) 2006-09-29 2010-09-21 Emc Corporation Retention of complex objects
JP4135762B1 (en) * 2007-02-21 2008-08-20 富士ゼロックス株式会社 Document management program and system
US9311633B2 (en) * 2007-06-22 2016-04-12 David Rosenberg Digital file processing for secondary sale
US8819815B1 (en) * 2007-10-16 2014-08-26 Jpmorgan Chase Bank, N.A. Method and system for distributing and tracking information
US20090177704A1 (en) * 2008-01-09 2009-07-09 Microsoft Corporation Retention policy tags for data item expiration
US8620869B2 (en) * 2008-09-25 2013-12-31 Microsoft Corporation Techniques to manage retention policy tags
US8027960B2 (en) * 2009-03-11 2011-09-27 International Business Machines Corporation Intelligent deletion of elements to maintain referential integrity of dynamically assembled components in a content management system
US20100274750A1 (en) * 2009-04-22 2010-10-28 Microsoft Corporation Data Classification Pipeline Including Automatic Classification Rules
US8386533B2 (en) 2010-11-30 2013-02-26 Oracle International Corporation Records management of database tables
US8706697B2 (en) * 2010-12-17 2014-04-22 Microsoft Corporation Data retention component and framework
US10051073B1 (en) * 2010-12-31 2018-08-14 EMC IP Holding Company LLC Cloud information services
US9262449B2 (en) * 2012-03-08 2016-02-16 Commvault Systems, Inc. Automated, tiered data retention
US8812464B2 (en) 2012-05-30 2014-08-19 Oracle International Corporation Content management system and method of managing retention and disposition of content items
US9424432B2 (en) * 2012-09-20 2016-08-23 Nasdaq, Inc. Systems and methods for secure and persistent retention of sensitive information
US9405482B2 (en) 2012-12-21 2016-08-02 Commvault Systems, Inc. Filtered reference copy of secondary storage data in a data storage system
US9351163B2 (en) * 2012-12-26 2016-05-24 Mcafee, Inc. Automatic sanitization of data on a mobile device in a network environment
US9058606B1 (en) 2013-11-18 2015-06-16 Access Sciences Corporation Computer implemented method for forming an accelerated compliance plan with a graphic visualization
US9053484B1 (en) 2013-11-18 2015-06-09 Access Sciences Corporation Computer implemented system for forming an accelerated compliance plan with a graphic visualization
JP6278678B2 (en) * 2013-12-09 2018-02-14 キヤノン株式会社 File management apparatus, control method thereof, and program
US10430377B2 (en) 2014-04-24 2019-10-01 International Business Machines Corporation Processes to better support defensible disposal in records management
US10372832B2 (en) * 2014-06-20 2019-08-06 International Business Machines Corporation Deletion workflow that preserves data integrity of a records management system
CN104217165B (en) * 2014-09-16 2016-07-06 百度在线网络技术(北京)有限公司 The processing method of file and device
US20160292154A1 (en) * 2015-03-31 2016-10-06 Mckesson Corporation Methods and Apparatuses for Providing Document Workflow Management
US10783113B2 (en) 2015-06-11 2020-09-22 Oracle International Corporation Data retention framework
US10460296B2 (en) 2016-02-08 2019-10-29 Bank Of America Corporation System for processing data using parameters associated with the data for auto-processing
US10437880B2 (en) * 2016-02-08 2019-10-08 Bank Of America Corporation Archive validation system with data purge triggering
US10437778B2 (en) * 2016-02-08 2019-10-08 Bank Of America Corporation Archive validation system with data purge triggering
US10067869B2 (en) 2016-02-12 2018-09-04 Bank Of America Corporation System for distributed data processing with automatic caching at various system levels
US10270749B2 (en) * 2016-06-03 2019-04-23 Bittium Wireless Oy Apparatus and method for managing files
US10303393B2 (en) 2016-06-21 2019-05-28 International Business Machines Corporation Technology for governance of data retention and transfer
US10409779B2 (en) 2016-08-31 2019-09-10 Microsoft Technology Licensing, Llc. Document sharing via logical tagging
CN111787029B (en) * 2020-07-29 2023-03-17 浙江德迅网络安全技术有限公司 Advanced network security threat mitigation for https protocol deep monitoring

Citations (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4426680A (en) * 1980-12-24 1984-01-17 Honeywell Information Systems Inc. Data processor using read only memories for optimizing main memory access and identifying the starting position of an operand
US4451742A (en) * 1981-05-27 1984-05-29 Mostek Corporation Power supply control for integrated circuit
US4584641A (en) * 1983-08-29 1986-04-22 Paul Guglielmino Copyprotecting system for software protection
US4639864A (en) * 1976-09-07 1987-01-27 Tandem Computers Incorporated Power interlock system and method for use with multiprocessor systems
US5007053A (en) * 1988-11-30 1991-04-09 International Business Machines Corporation Method and apparatus for checksum address generation in a fail-safe modular memory
US5130922A (en) * 1989-05-17 1992-07-14 International Business Machines Corporation Multiprocessor cache memory system using temporary access states and method for operating such a memory
US5265159A (en) * 1992-06-23 1993-11-23 Hughes Aircraft Company Secure file erasure
US5313632A (en) * 1987-12-18 1994-05-17 Hitachi, Ltd. Method for processing data in a distributed processing system
US5325523A (en) * 1991-04-10 1994-06-28 International Business Machines Corporation Method for deleting objects from library resident optical disks by accumulating pending delete requests
US5359713A (en) * 1989-06-01 1994-10-25 Legato Systems, Inc. Method and apparatus for enhancing synchronous I/O in a computer system with a non-volatile memory and using an acceleration device driver in a computer operating system
US5375227A (en) * 1989-08-29 1994-12-20 Hitachi, Ltd. Method of and apparatus for automatic recovery of a cache in a storage system
US5388156A (en) * 1992-02-26 1995-02-07 International Business Machines Corp. Personal computer system with security features and method
US5414827A (en) * 1991-12-19 1995-05-09 Opti, Inc. Automatic cache flush
US5428766A (en) * 1992-12-01 1995-06-27 Digital Equipment Corporation Error detection scheme in a multiprocessor environment
US5438674A (en) * 1988-04-05 1995-08-01 Data/Ware Development, Inc. Optical disk system emulating magnetic tape units
US5448719A (en) * 1992-06-05 1995-09-05 Compaq Computer Corp. Method and apparatus for maintaining and retrieving live data in a posted write cache in case of power failure
US5457748A (en) * 1992-11-30 1995-10-10 Motorola, Inc. Method and apparatus for improved security within encrypted communication devices
US5469573A (en) * 1993-02-26 1995-11-21 Sytron Corporation Disk operating system backup and recovery system
US5475834A (en) * 1992-10-26 1995-12-12 International Business Machines Corporation Integration of migration level two and backup tape processing using multiple inventory entries
US5499012A (en) * 1994-03-30 1996-03-12 C & K Systems, Inc. Intrusion detector test circuit which automatically disables a detected-event indicator
US5515540A (en) * 1990-08-27 1996-05-07 Dallas Semiconducter Corp. Microprocessor with single pin for memory wipe
US5544356A (en) * 1990-12-31 1996-08-06 Intel Corporation Block-erasable non-volatile semiconductor memory which tracks and stores the total number of write/erase cycles for each block
US5630044A (en) * 1993-07-06 1997-05-13 Nec Corporation Memory fault recovery system which executes degradation or recovery of memory
US5638509A (en) * 1994-06-10 1997-06-10 Exabyte Corporation Data storage and protection system
US5652830A (en) * 1995-05-31 1997-07-29 Sharp Kabushiki Kaisha Data storage device
US5664089A (en) * 1994-04-26 1997-09-02 Unisys Corporation Multiple power domain power loss detection and interface disable
US5682471A (en) * 1994-10-06 1997-10-28 Billings; Thomas Neal System for transparently storing inputs to non-volatile storage and automatically re-entering them to reconstruct work if volatile memory is lost
US5761705A (en) * 1996-04-04 1998-06-02 Symbios, Inc. Methods and structure for maintaining cache consistency in a RAID controller having redundant caches
US5787247A (en) * 1996-07-12 1998-07-28 Microsoft Corporation Replica administration without data loss in a store and forward replication enterprise
US5835953A (en) * 1994-10-13 1998-11-10 Vinca Corporation Backup system that takes a snapshot of the locations in a mass storage device that has been identified for updating prior to updating
US5913025A (en) * 1996-11-14 1999-06-15 Novell, Inc. Method and apparatus for proxy authentication
US5933584A (en) * 1993-03-13 1999-08-03 Ricoh Company, Ltd. Network system for unified business
US5943688A (en) * 1997-05-29 1999-08-24 International Business Machines Corporation Automated database back-up within a data storage system using removable media
US5991895A (en) * 1995-05-05 1999-11-23 Silicon Graphics, Inc. System and method for multiprocessor partitioning to support high availability
US6006311A (en) * 1997-04-14 1999-12-21 Internatinal Business Machines Corporation Dynamic updating of repair mask used for cache defect avoidance
US6009500A (en) * 1995-06-07 1999-12-28 Compaq Computer Corporation Replacement of erroneous firmware in a redundant non-volatile memory system
US6035379A (en) * 1997-01-09 2000-03-07 Microsoft Corporation Transaction processing for user data employing both logging and shadow copying
US6078404A (en) * 1997-03-12 2000-06-20 Minolta Co., Ltd. Image forming apparatus that can appropriately process image of original stored in memory
US6088815A (en) * 1998-02-23 2000-07-11 International Busines Machines Corporation Automatic data recovery for a duplex pair
US6092173A (en) * 1996-08-08 2000-07-18 Fujitsu Limited Multiprocessor, memory accessing method for multiprocessor, transmitter and receiver in data transfer system, data transfer system, and bus control method for data transfer system
US6119209A (en) * 1998-02-03 2000-09-12 International Business Machines Corporation Backup directory for a write cache
US6138125A (en) * 1998-03-31 2000-10-24 Lsi Logic Corporation Block coding method and system for failure recovery in disk arrays
US6185507B1 (en) * 1996-08-23 2001-02-06 Siemens Aktiengesellschaft Microprocessor, in particular for use in a chip card, with a control unit and with a housing surrounding the control unit
US6301670B1 (en) * 1998-10-06 2001-10-09 Ricoh Corporation Method and apparatus for erasing data when a problem is identified
US6304948B1 (en) * 1998-10-06 2001-10-16 Ricoh Corporation Method and apparatus for erasing data after expiration
US20010038462A1 (en) * 1998-03-19 2001-11-08 Teeuwen Peter Johannes Hendrikus Maria Interactive printing with a plurality of printer devices
US6317217B1 (en) * 1998-01-30 2001-11-13 Canon Kabushiki Kaisha Printing system and printing control method
US20020010708A1 (en) * 1996-09-23 2002-01-24 Mcintosh Lowrie Defining a uniform subject classification system incorporating document management/records retention functions
US20020194014A1 (en) * 2000-04-19 2002-12-19 Starnes Curt R. Legal and regulatory compliance program and legal resource database architecture
US20030126215A1 (en) * 1997-06-17 2003-07-03 Udell Howard R. Self-destructing document and e-mail messaging system
US6665082B1 (en) * 1996-07-31 2003-12-16 Fuji Photo Film Co., Ltd. Printer system and method of controlling operation of the same
US20030236788A1 (en) * 2002-06-03 2003-12-25 Nick Kanellos Life-cycle management engine
US20040162876A1 (en) * 2003-02-14 2004-08-19 Whale Communications Ltd. System and method for providing conditional access to server-based applications from remote access devices
US20040186836A1 (en) * 2003-03-17 2004-09-23 David Schlesinger Entitlement security and control for information system entitlement
US20050055518A1 (en) * 2003-09-08 2005-03-10 International Business Machines Corporation Method, system, and program for retention management and protection of stored objects
US20050114672A1 (en) * 2003-11-20 2005-05-26 Encryptx Corporation Data rights management of digital information in a portable software permission wrapper
US6915435B1 (en) * 2000-02-09 2005-07-05 Sun Microsystems, Inc. Method and system for managing information retention
US20050160481A1 (en) * 2004-01-21 2005-07-21 Todd Stephen J. Methods and apparatus for secure modification of a retention period for data in a storage system
US20050223242A1 (en) * 2004-03-30 2005-10-06 Pss Systems, Inc. Method and system for providing document retention using cryptography
US20050223414A1 (en) * 2004-03-30 2005-10-06 Pss Systems, Inc. Method and system for providing cryptographic document retention with off-line access
US20060010301A1 (en) * 2004-07-06 2006-01-12 Hitachi, Ltd. Method and apparatus for file guard and file shredding
US20060075001A1 (en) * 2004-09-30 2006-04-06 Canning Jeffrey C System, method and program to distribute program updates
US20060101285A1 (en) * 2004-11-09 2006-05-11 Fortiva Inc. Secure and searchable storage system and method
US7331725B2 (en) * 2002-02-28 2008-02-19 Portauthority Technologies Inc. System and method for monitoring unauthorized dissemination of documents and portable media
US20100095349A1 (en) * 2008-10-15 2010-04-15 Tetsuro Motoyama Approach for Managing Access to Electronic Documents on Network Devices Using Document Retention Policies and Document Security Policies

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH05165685A (en) * 1991-12-16 1993-07-02 Fujitsu Ltd File system managing device
JPH05324421A (en) * 1992-05-19 1993-12-07 Matsushita Graphic Commun Syst Inc Electronic filing device
FR2745112B1 (en) 1996-02-16 1998-04-24 Philippe Escal DEVICE FOR PROTECTING DATA ON MAGNETIC OR MAGNETO-OPTIC MEDIA
JPH1185578A (en) * 1997-09-05 1999-03-30 Fujitsu Ltd File managing device and recording medium describing program for executing operation thereof
JP2003316774A (en) * 2002-04-19 2003-11-07 Ricoh Co Ltd Document control system, document accumulation method and program executing the method
JP2003330783A (en) * 2002-05-15 2003-11-21 Secom Co Ltd Document storage system, document storage method and information recording medium
JP4064162B2 (en) * 2002-06-12 2008-03-19 日本電信電話株式会社 File storage apparatus and method
JP4400059B2 (en) * 2002-10-17 2010-01-20 株式会社日立製作所 Policy setting support tool
JP2004206466A (en) * 2002-12-25 2004-07-22 Ricoh Co Ltd Document management device and document management program

Patent Citations (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4639864A (en) * 1976-09-07 1987-01-27 Tandem Computers Incorporated Power interlock system and method for use with multiprocessor systems
US4426680A (en) * 1980-12-24 1984-01-17 Honeywell Information Systems Inc. Data processor using read only memories for optimizing main memory access and identifying the starting position of an operand
US4451742A (en) * 1981-05-27 1984-05-29 Mostek Corporation Power supply control for integrated circuit
US4584641A (en) * 1983-08-29 1986-04-22 Paul Guglielmino Copyprotecting system for software protection
US5313632A (en) * 1987-12-18 1994-05-17 Hitachi, Ltd. Method for processing data in a distributed processing system
US5438674A (en) * 1988-04-05 1995-08-01 Data/Ware Development, Inc. Optical disk system emulating magnetic tape units
US5007053A (en) * 1988-11-30 1991-04-09 International Business Machines Corporation Method and apparatus for checksum address generation in a fail-safe modular memory
US5130922A (en) * 1989-05-17 1992-07-14 International Business Machines Corporation Multiprocessor cache memory system using temporary access states and method for operating such a memory
US5359713A (en) * 1989-06-01 1994-10-25 Legato Systems, Inc. Method and apparatus for enhancing synchronous I/O in a computer system with a non-volatile memory and using an acceleration device driver in a computer operating system
US5375227A (en) * 1989-08-29 1994-12-20 Hitachi, Ltd. Method of and apparatus for automatic recovery of a cache in a storage system
US5515540A (en) * 1990-08-27 1996-05-07 Dallas Semiconducter Corp. Microprocessor with single pin for memory wipe
US5544356A (en) * 1990-12-31 1996-08-06 Intel Corporation Block-erasable non-volatile semiconductor memory which tracks and stores the total number of write/erase cycles for each block
US5325523A (en) * 1991-04-10 1994-06-28 International Business Machines Corporation Method for deleting objects from library resident optical disks by accumulating pending delete requests
US5414827A (en) * 1991-12-19 1995-05-09 Opti, Inc. Automatic cache flush
US5388156A (en) * 1992-02-26 1995-02-07 International Business Machines Corp. Personal computer system with security features and method
US5448719A (en) * 1992-06-05 1995-09-05 Compaq Computer Corp. Method and apparatus for maintaining and retrieving live data in a posted write cache in case of power failure
US5265159A (en) * 1992-06-23 1993-11-23 Hughes Aircraft Company Secure file erasure
US5475834A (en) * 1992-10-26 1995-12-12 International Business Machines Corporation Integration of migration level two and backup tape processing using multiple inventory entries
US5457748A (en) * 1992-11-30 1995-10-10 Motorola, Inc. Method and apparatus for improved security within encrypted communication devices
US5428766A (en) * 1992-12-01 1995-06-27 Digital Equipment Corporation Error detection scheme in a multiprocessor environment
US5469573A (en) * 1993-02-26 1995-11-21 Sytron Corporation Disk operating system backup and recovery system
US5933584A (en) * 1993-03-13 1999-08-03 Ricoh Company, Ltd. Network system for unified business
US5630044A (en) * 1993-07-06 1997-05-13 Nec Corporation Memory fault recovery system which executes degradation or recovery of memory
US5499012A (en) * 1994-03-30 1996-03-12 C & K Systems, Inc. Intrusion detector test circuit which automatically disables a detected-event indicator
US5664089A (en) * 1994-04-26 1997-09-02 Unisys Corporation Multiple power domain power loss detection and interface disable
US5638509A (en) * 1994-06-10 1997-06-10 Exabyte Corporation Data storage and protection system
US5682471A (en) * 1994-10-06 1997-10-28 Billings; Thomas Neal System for transparently storing inputs to non-volatile storage and automatically re-entering them to reconstruct work if volatile memory is lost
US5835953A (en) * 1994-10-13 1998-11-10 Vinca Corporation Backup system that takes a snapshot of the locations in a mass storage device that has been identified for updating prior to updating
US5991895A (en) * 1995-05-05 1999-11-23 Silicon Graphics, Inc. System and method for multiprocessor partitioning to support high availability
US5652830A (en) * 1995-05-31 1997-07-29 Sharp Kabushiki Kaisha Data storage device
US6009500A (en) * 1995-06-07 1999-12-28 Compaq Computer Corporation Replacement of erroneous firmware in a redundant non-volatile memory system
US5761705A (en) * 1996-04-04 1998-06-02 Symbios, Inc. Methods and structure for maintaining cache consistency in a RAID controller having redundant caches
US5787247A (en) * 1996-07-12 1998-07-28 Microsoft Corporation Replica administration without data loss in a store and forward replication enterprise
US6665082B1 (en) * 1996-07-31 2003-12-16 Fuji Photo Film Co., Ltd. Printer system and method of controlling operation of the same
US6092173A (en) * 1996-08-08 2000-07-18 Fujitsu Limited Multiprocessor, memory accessing method for multiprocessor, transmitter and receiver in data transfer system, data transfer system, and bus control method for data transfer system
US6185507B1 (en) * 1996-08-23 2001-02-06 Siemens Aktiengesellschaft Microprocessor, in particular for use in a chip card, with a control unit and with a housing surrounding the control unit
US20020010708A1 (en) * 1996-09-23 2002-01-24 Mcintosh Lowrie Defining a uniform subject classification system incorporating document management/records retention functions
US5913025A (en) * 1996-11-14 1999-06-15 Novell, Inc. Method and apparatus for proxy authentication
US6035379A (en) * 1997-01-09 2000-03-07 Microsoft Corporation Transaction processing for user data employing both logging and shadow copying
US6078404A (en) * 1997-03-12 2000-06-20 Minolta Co., Ltd. Image forming apparatus that can appropriately process image of original stored in memory
US6006311A (en) * 1997-04-14 1999-12-21 Internatinal Business Machines Corporation Dynamic updating of repair mask used for cache defect avoidance
US5943688A (en) * 1997-05-29 1999-08-24 International Business Machines Corporation Automated database back-up within a data storage system using removable media
US20030126215A1 (en) * 1997-06-17 2003-07-03 Udell Howard R. Self-destructing document and e-mail messaging system
US6317217B1 (en) * 1998-01-30 2001-11-13 Canon Kabushiki Kaisha Printing system and printing control method
US6119209A (en) * 1998-02-03 2000-09-12 International Business Machines Corporation Backup directory for a write cache
US6088815A (en) * 1998-02-23 2000-07-11 International Busines Machines Corporation Automatic data recovery for a duplex pair
US20010038462A1 (en) * 1998-03-19 2001-11-08 Teeuwen Peter Johannes Hendrikus Maria Interactive printing with a plurality of printer devices
US6138125A (en) * 1998-03-31 2000-10-24 Lsi Logic Corporation Block coding method and system for failure recovery in disk arrays
US6304948B1 (en) * 1998-10-06 2001-10-16 Ricoh Corporation Method and apparatus for erasing data after expiration
US6301670B1 (en) * 1998-10-06 2001-10-09 Ricoh Corporation Method and apparatus for erasing data when a problem is identified
US6915435B1 (en) * 2000-02-09 2005-07-05 Sun Microsystems, Inc. Method and system for managing information retention
US20020194014A1 (en) * 2000-04-19 2002-12-19 Starnes Curt R. Legal and regulatory compliance program and legal resource database architecture
US7331725B2 (en) * 2002-02-28 2008-02-19 Portauthority Technologies Inc. System and method for monitoring unauthorized dissemination of documents and portable media
US20030236788A1 (en) * 2002-06-03 2003-12-25 Nick Kanellos Life-cycle management engine
US20040162876A1 (en) * 2003-02-14 2004-08-19 Whale Communications Ltd. System and method for providing conditional access to server-based applications from remote access devices
US20040186836A1 (en) * 2003-03-17 2004-09-23 David Schlesinger Entitlement security and control for information system entitlement
US20050055518A1 (en) * 2003-09-08 2005-03-10 International Business Machines Corporation Method, system, and program for retention management and protection of stored objects
US20050114672A1 (en) * 2003-11-20 2005-05-26 Encryptx Corporation Data rights management of digital information in a portable software permission wrapper
US20050160481A1 (en) * 2004-01-21 2005-07-21 Todd Stephen J. Methods and apparatus for secure modification of a retention period for data in a storage system
US20050223242A1 (en) * 2004-03-30 2005-10-06 Pss Systems, Inc. Method and system for providing document retention using cryptography
US20050223414A1 (en) * 2004-03-30 2005-10-06 Pss Systems, Inc. Method and system for providing cryptographic document retention with off-line access
US20060010301A1 (en) * 2004-07-06 2006-01-12 Hitachi, Ltd. Method and apparatus for file guard and file shredding
US20060075001A1 (en) * 2004-09-30 2006-04-06 Canning Jeffrey C System, method and program to distribute program updates
US20060101285A1 (en) * 2004-11-09 2006-05-11 Fortiva Inc. Secure and searchable storage system and method
US20100095349A1 (en) * 2008-10-15 2010-04-15 Tetsuro Motoyama Approach for Managing Access to Electronic Documents on Network Devices Using Document Retention Policies and Document Security Policies

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8189218B2 (en) * 2005-09-30 2012-05-29 Samsung Electronics Co., Ltd. Image forming device and printing system having selective printing function of address book and printing method thereof
US20070076229A1 (en) * 2005-09-30 2007-04-05 Samsung Electronics Co., Ltd. Image forming device and printing system having selective printing function of address book and printing method thereof
US20080294586A1 (en) * 2005-12-29 2008-11-27 Blue Jungle Enforcing Application and Access Control Policies in an Information Management System with Two or More Interactive Enforcement Points
US9973533B2 (en) 2005-12-29 2018-05-15 Nextlabs, Inc. Enforcing application and access control policies in an information management system with two or more interactive enforcement points
US8407345B2 (en) * 2005-12-29 2013-03-26 Nextlabs, Inc. Enforcing application and access control policies in an information management system with two or more interactive enforcement points
US20080168122A1 (en) * 2007-01-10 2008-07-10 Benjamin Joseph Fletcher Publish/subscribe system
US20080294492A1 (en) * 2007-05-24 2008-11-27 Irina Simpson Proactively determining potential evidence issues for custodial systems in active litigation
US8572043B2 (en) 2007-12-20 2013-10-29 International Business Machines Corporation Method and system for storage of unstructured data for electronic discovery in external data stores
US8112406B2 (en) 2007-12-21 2012-02-07 International Business Machines Corporation Method and apparatus for electronic data discovery
US8140494B2 (en) 2008-01-21 2012-03-20 International Business Machines Corporation Providing collection transparency information to an end user to achieve a guaranteed quality document search and production in electronic data discovery
US8275720B2 (en) * 2008-06-12 2012-09-25 International Business Machines Corporation External scoping sources to determine affected people, systems, and classes of information in legal matters
US20090313196A1 (en) * 2008-06-12 2009-12-17 Nazrul Islam External scoping sources to determine affected people, systems, and classes of information in legal matters
US9830563B2 (en) 2008-06-27 2017-11-28 International Business Machines Corporation System and method for managing legal obligations for data
US8327384B2 (en) 2008-06-30 2012-12-04 International Business Machines Corporation Event driven disposition
US8484069B2 (en) 2008-06-30 2013-07-09 International Business Machines Corporation Forecasting discovery costs based on complex and incomplete facts
US8489439B2 (en) 2008-06-30 2013-07-16 International Business Machines Corporation Forecasting discovery costs based on complex and incomplete facts
US8515924B2 (en) * 2008-06-30 2013-08-20 International Business Machines Corporation Method and apparatus for handling edge-cases of event-driven disposition
US20090327375A1 (en) * 2008-06-30 2009-12-31 Deidre Paknad Method and Apparatus for Handling Edge-Cases of Event-Driven Disposition
US20100082676A1 (en) * 2008-09-30 2010-04-01 Deidre Paknad Method and apparatus to define and justify policy requirements using a legal reference library
US8204869B2 (en) 2008-09-30 2012-06-19 International Business Machines Corporation Method and apparatus to define and justify policy requirements using a legal reference library
US8073729B2 (en) 2008-09-30 2011-12-06 International Business Machines Corporation Forecasting discovery costs based on interpolation of historic event patterns
US10104127B2 (en) 2009-09-30 2018-10-16 Amazon Technologies, Inc. Managing computing resource usage for standards compliance
US9621584B1 (en) * 2009-09-30 2017-04-11 Amazon Technologies, Inc. Standards compliance for computing data
US8250041B2 (en) 2009-12-22 2012-08-21 International Business Machines Corporation Method and apparatus for propagation of file plans from enterprise retention management applications to records management systems
US8655856B2 (en) 2009-12-22 2014-02-18 International Business Machines Corporation Method and apparatus for policy distribution
US8566903B2 (en) 2010-06-29 2013-10-22 International Business Machines Corporation Enterprise evidence repository providing access control to collected artifacts
US8832148B2 (en) 2010-06-29 2014-09-09 International Business Machines Corporation Enterprise evidence repository
US8402359B1 (en) 2010-06-30 2013-03-19 International Business Machines Corporation Method and apparatus for managing recent activity navigation in web applications
US10846139B2 (en) 2018-11-15 2020-11-24 Bank Of America Corporation Self-purgative electronic resources

Also Published As

Publication number Publication date
US20060156382A1 (en) 2006-07-13
JP2006195998A (en) 2006-07-27
US7703125B2 (en) 2010-04-20

Similar Documents

Publication Publication Date Title
US20060156381A1 (en) Approach for deleting electronic documents on network devices using document retention policies
US8272028B2 (en) Approach for managing access to electronic documents on network devices using document retention policies and document security policies
US20160171234A1 (en) Approach For Managing Access To Electronic Documents On Network Devices Using Document Analysis, Document Retention Policies And Document Security Policies
US8681994B2 (en) Systems and methods for document control using public key encryption
US9147080B2 (en) System and methods for granular access control
US8490163B1 (en) Enforcing security policies across heterogeneous systems
US20060004689A1 (en) Systems and methods for managing content on a content addressable storage system
US20080222513A1 (en) Method and System for Rules-Based Tag Management in a Document Review System
US8533242B2 (en) File management method in web storage system
US10545991B2 (en) Synchronizing local and remote data
US20060227368A1 (en) Approach for providing scheduled printing of electronic documents
US20120254134A1 (en) Using An Update Feed To Capture and Store Documents for Litigation Hold and Legal Discovery
US10547525B2 (en) Determining events by analyzing stored electronic communications
US20120179990A1 (en) Capturing and Visualizing Data Lineage in Content Management System
US20140164946A1 (en) System and method for selectively tagging received messages
US11841842B2 (en) Method and system for using external content type object types
US11809813B1 (en) Multilayered electronic content management system
US20100257376A1 (en) System and method for management of plaintext data in a mobile data processing device
US20230015450A1 (en) Method for managing and controlling system permission, data center, management and control apparatus, and storage medium
US20050234990A1 (en) System and method for tracking documents
US11645017B2 (en) Print governance management
US20180365237A1 (en) Method and system for using micro objects
US20230145722A1 (en) Recursive Data and Electronic Signature Document Updater
US20230177182A1 (en) Blocking operations for data privacy integration services using different blocking responder groups
US20230177183A1 (en) Redistribution operations for data privacy integration services using different redistribution responder groups

Legal Events

Date Code Title Description
AS Assignment

Owner name: RICOH COMPANY, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOYAMA, TETSURO;REEL/FRAME:016160/0496

Effective date: 20050110

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION