Automated complaint hotline processing system and method with privacy protection and computerized analytics

ABSTRACT

Automated system and method for processing online idea submissions (with crowdsourcing and anonymity functions), formal complaints and anonymous complaints. The system receives and processes registration information, creates a unique coding entry, and generates an associated keyword database. When the system receives input data from a user, it utilizes the unique coding identifier to relate to the organization, searches the keyword database in any communications involving the registered entity, automatically analyzes the received data, and preforms a zone of reliability verification analysis on the received data. The system also removes private personal information (PPI) for anonymous users, and “locks” and/or encrypts the version with PPI, preventing unauthorized access, and unseals the dataset with PPI information only after receipt of an unsealing order from a court or a governmental entity. The system also automatically generates and transmits reports to governmental entities and others based on the analysis of the reported complaints and legal requirements and guidelines. The system also calculates and utilizes a rating score as part of the engagement process with the registered entity, performs analysis and reporting of the overall industry, and connects the entity with the experts in the area of concern based on the analysis.

REFERENCE TO RELATED APPLICATION

This application claims priority to U.S. provisional patent applicationNo. 63/213,101, filed on Jun. 21, 2021, which is incorporated herein byreference in its entirety.

FIELD OF THE INVENTION

The present invention relates to automated and computerized analyticsprocessing in the areas of hotline and anonymous complaint processing,and particularly relates to these areas in students and learninginstitutions realms. More particularly, the present invention pertainsto the automated modeling, identification, determination and analysis ofcomplaints and cross-referencing related complaints, automated andsemi-automated software-driven decision making, follow-up processing ofcomplaints and automated connection with relevant investigatoryagencies, protection of privacy and maintaining anonymity of callers,separation of privacy data from non-private data that can be shared withothers, such as the relevant authorities, and generation of analyticsand matrices to determine the growth or reduction of specific types ofcomplaints or determined problems.

BACKGROUND OF THE INVENTION

Over the many years, companies and learning institutions (e.g.,universities) have developed policies and procedures to protect studentsfrom harassment, intimidation, bullying, inappropriate sexual behavior,and other identified potential harms. Many organizations implementcomplaint hotlines and assistance groups to help facilitate thosepolicies and procedures.

However, many institutions, such schools, athletic teams, and companies,use their own personnel to collect, analyze, and report the complaints,most of which is from students, parents, athletes, etc. This approachhas been criticized as being non-objective, unfair and simply incapabletechnique for instituting appropriate measures. In certainhigh-publicity cases, the organization-implemented hotlines andcomplaint processing has basically suppressed the complaints, oftensince they are deemed to be potentially damaging to the institution orthe applicable team.

There are powerful forces in many organizations that cause thewidespread withholding of information about potential problems orissues, as reported in 2000 by the Morrison and Milliken study“Organizational Silence: A Barrier to Change and Development in aPluralistic Work” (www.jstor.org/stable/259200?seq=1). Among otherproblems, these organizational barriers promote exclusivity andmarginalize the voice of employees. Organizations often do not hear“what needs to be said” and “what is not being said.” This restricts andlimits the potential benefits to organizations, such as cost/savings andnew revenue streams. It also creates higher risks of various legalactions against the company, many of which are highly damaging toreputation, including allegations of racism, agism and sexism,harassment, intimidation in the workplace environment, furtheringdisparity and inequality.

In many settings and organizations, open discussions of the potential orexisting problems are considered “uncomfortable” and may sometimes fallvictim to the more dominant forces that promote company stability andstatus quo. Employees with a potential “gem of idea” may feeluncomfortable or afraid to speak up for fear of not being takenseriously or failure in accomplishing any meaningful changes. These, andother obstacles, may be further compounded by a remote workingenvironment, where there are fewer in-person discussions.

An independent report uncovered a lack of any action by Louisiana StateUniversity (LSU) when it received complaints about its football coach.This enabled its head football coach, Les Miles, to continue managementpractices that were abusive, illegal and in clear violation of thecollege's hiring guidelines and many of its regulations. The lack ofproper response and action by the institution—to the numerous anonymouscomplaints—were documented in an independent report and mentioned by DanWetzel in the article “Why did LSU allow Les Miles to carry on? ‘We'reprotecting our brand’,” which was published on Mar. 10, 2021, in theYahoo online Sports section(https://sports.yahoo.com/why-did-1su-allow-les-miles-to-carry-on-nobody-wanted-to-rock-the-boat-221807508.html).

Another example of the typical failure, or lack of an objective andcomprehensive complaint-processing hotline system, is illustrated by themany complaints and requests for the investigation made by the Olympicmedalist gymnast, Simone Biles, and other gymnasts, who repeatedlydemanded a thorough, independent investigation into the multiplecomplaints about sexual assaults and abuse committed by the U.S.gymnastics team doctor Larry Nassar. For many years, numerous complaintsby young gymnasts and their families (often submitted anonymously) werenot properly analyzed and processed, and were not elevated andtransmitted to proper authorities for investigation. Instead, eachcomplaint was processed and acted upon in an ad-hoc, non-systematic way,never cross-referenced with other complaints, and not processed andanalyzed seriously and objectively. See Huffington Post article athttps://www.huffpost.com/entry/simone-biles-usa-gymnastics-sexual-abuse-accountability_n_602a0788c5b680717ee8fa61.

Another example of the prevalent problems in the craft beer industry isdescribed in the article “Tidal Wave of Sexual Harassment Allegationsand Toxicity in Craft Beer Industry Lead to Terminations”(https://www.brewbound.com/news/tidal-wave-of-sexual-harassment-allegations-and-toxicity-in-craft-beer-industy-lead-to-terminations).This article indicates that a significant number of complaints were madeabout a particular industry, including allegations of pregnancydiscrimination, sexual assault and other problems. However, because thebreweries were very slow to respond and take appropriate action, theindustry suffered significant bad publicity and terminations. Thisfurther illustrates the need for a quick and responsive system thatallows different companies to share and use information that may beanonymously provided by employees of other companies or that reflect onthe industry as a whole.

In addition to the problems involving learning institutions, teams, andgovernmental agencies, many private companies have instituted online andremote hotlines where employees can voice their opinions, providesuggestions, and launch anonymous complaints. The Harvard BusinessReview found that “when employees can voice their concerns freely,organizations see increased retention and stronger performance.” Otherstudies have shown a clear correlation between an employee's ability tofreely voice his/her views and the amount of employee engagement incompany activities and business initiatives. Greater employee engagementtranslates to greater organization productivity and greater retention,which is of significant value to employers.

Unfortunately, currently utilized hotline and whistleblower complaintmechanisms have significant limitations and faults. To list just a few:(1) there is lack of independent processing that protects those whocommence complaints; (2) the concept of anonymous complaints also iswithout proper safeguards and mechanisms to make such complaintsaffective; (3) there is a lack of whistleblower hotlines that areimplemented as a SaaS/online system that offer complete anonymity tocomplainants; (4) there is a lack of systems that employ software code,including AI-calculations, to provide reliability and validity analysesof complaints; and (5) present systems don't utilize any type ofsnagging source codes for anonymous crowdsourcing. While crowdsourcingplatforms exist, none serve to completely protect the anonymity ofemployees, and at the same time to use AI or automated computer softwarethat causes the system to grab the source code to contact and promulgatethe future work of the company with proper consultants in the relevanttagged area or topic.

OBJECTS AND SUMMARY OF THE INVENTION

Among other unmet needs, the above-summarized examples demonstrate theneed for an independent system, that is, independent from theorganization, along with automated, software and rule-driven hotlinesystems that properly receive, evaluate and process complaints,including anonymous complaints, from students, young (and not-so-young)athletes, families, company employees, customers and consumers, and thatalso protect complainants from harassment, intimidation, bullying,intentional indifference, reprisals and other acts of retaliation.

The major criticism of currently known systems, policies and proceduresin place is that they usually protect the institutions that they serve,rather than serve the best interests of individuals. Maddie Slamone, thechairman of the NCAA's Student-Athlete advisory Committee from2013-2014, told the Washington Post that “[e]verybody that an athletecould trust or may rightfully trust, they still work for the universityand answer to the university. It creates complications and conflicts ofinterest because their ultimate goal is not to take care of athletes butto protect the department and avoid scandal.” (2019article—www.washigtonpost.com/sports/2019/08/30/complaints-against-nebraska-softball-coach-show-college-athletes-limited-options/.)

In view of the foregoing, a main objective of the present inventionincludes providing an automated system that allows athletes and studentsto anonymously report certain abusive practices, launch complaints,demand investigations, and prevent further abuse, all without fear ofretaliation by the institution.

Further objectives include providing an automated reporting system thatpromotes equality and inclusivity, also without fear of retaliation bythe organization or by individuals within the organization. Yet otherobjectives include providing proactive automated tools that ensure thediversity, equality, and inclusion of all voices, irrespective ofwhether or not complaints are launched anonymously.

As will be appreciated from the description herein, the presentinvention may be employed as an independent 24/7 hotline that providesan anonymous feedback loop (like crowdsourcing) and to replace currentwhistleblower hotlines as an automated and rule-driven system, withspecific implementation of the intended protection of the callers andappropriate customization for the specific companies, industries,variations in state laws and regulations and other variations of localand state-specific nature (e.g., taking into account the variedreporting requirements of different states).

Other goals and features of the present invention include providingsystems that allow company employees to provide their own evaluations,offer suggestions, comments or launch specific and/or anonymouscomplaints against company management or the company's overall policy.

Yet still further objectives include providing platforms that entailgreater reliability of assessing and reporting anonymous complaintsthat, in turn, are assessed, processed, reported and acted upon byassociated relevant organizations, management and governmental entities.

Additional objectives of the present invention include systems thatachieve/implement one or more of the following: (1) serve to anonymouslycrowd source innovative ideas and, when applied, increase workplaceproductivity; (2) demonstrate and improve leadership or managementcommitment to diversity, equality, and inclusion in the workplace; (3)ensure that the organization leadership and management hear all voicesequally and fairly, not just those with better access or are moredominant in inter-organizational discussions; (4) diminish the “gossipat the water cooler” with a direct avenue to the source; (5) cultivateand improve the environment that does not tolerate harassment,intimidation and bullying in the workplace; (6) unleash the hiddenpotential, engagement and idea-generation function of the company staff,employees or customers; (7) provide automated reporting mechanisms thatpromote equality, diversity and inclusivity without any fear of negativeresponse or retaliation; (8) provide an anonymous reporting processing,with higher level of reliability; and (9) provide asoftware-as-a-service (SAAS) implementation of an automated andcomprehensive system, with a simplified user interface, AI andsoftware-based processing, reporting and storage of private andsensitive information.

The above-mentioned objectives, features, and aspects of the presentinvention are illustrative and non-limiting. In summary, the followingembodiments, and features and aspects thereof, represents varioussystems and processes of the present invention (stated in more technicalterms).

In accordance with the present invention, a method for automaticallyprocessing online complaints comprises receiving and processingregistration information about an entity; creating and providing aunique coding entry for the identification of the registered entity;generating and populating a key word database associated with theregistered entity; receiving an input data from a user, comprising anidea, a complaint with identification information or an anonymouscomplaint; searching the key word database in any communicationsinvolving the registered entity; automatically analyzing the receiveduser input data and determining whether the input data comprises acomplaint launched or reported by the user; preforming a zone ofreliability verification analysis on the received data; automaticallyscrubbing and removing private personal information (PPI) from thereceived input data, and storing it in two datasets, the first datasetincluding the PPI and the second dataset storing data after scrubbing,with all PPI information removed; unsealing and providing access to thedataset with PPI information only upon receipt and verification of anunsealing decision or order; and automatically generating andtransmitting one or more reports to governmental entities, industrygroups or independent organizations, based on the analysis of one ormore reported complaints and at least one guideline provided by federallaws, state laws, local regulation, industry standards orentity-specific policy.

As an aspect of the invention, the unique coding entry, created andprovided for the identification of the registered entity, includes athree-standard-words combination and further utilizing thethree-standard-words combination for identification of the entity duringregistration, receiving and processing communications from the user andreporting.

As a further aspect of the invention, the method further comprisescalculating a rating score to the registered entity as part of theengagement data; and creating and transmitting periodic engagementemails that include registered entity rating score and industry ratinginformation, or any changes in the rating information.

As another aspect of the invention, the method further comprisescreating and maintaining a second industry key word database, andincluding the keywords in a key word database for the registered entityinto the second industry key word database; performing analysis andreporting of the overall industry, without identifying the specific orpersonal registered entity in the report; and transmitting the generatedreports to one or more governmental entities, industry groups orindependent organizations involved with the industry.

As an addition aspect of the invention, the receiving and processingregistration information about an entity includes receiving andprocession information that designates at least one person as apoint-of-contact for the registered entity, and assigning weightqualification to the idea entered by the user at least partially basedon a number of other users that present a similar idea.

As yet another aspect of the invention, the process further comprisesproviding multiple pricing options for different offered services, andreceiving and processing registration information that reflects at leaston selected pricing option and at least one selection of the offeredservices for the registered entity.

As yet a further aspect of the invention, the key word databaseassociated with the registered entity comprises special goals andobjectives that the entity wants to improve, or one or more specificproblems or challenges that the entity wants to address.

As still yet another aspect of the invention, the zone of reliabilityverification analysis of the received complaint data comprisesconfirming the location of the user, who provides complaint data, basedon an IP address or zip code provided by the user.

As still yet an additional aspect of the invention, the method furthercomprises encrypting dataset with PPI using one or more encryption key;and linking the dataset with PPI with the corresponding dataset whereall PPI is removed.

As a further aspect of the invention, the method further comprisesautomatically executing a data collection protocol, comprising sending aWebpage with an entry space or a form to enter a date of the incident, atext box for data entry, an option to upload images or an option toactivate a webcam to take and include an image of the user; andreceiving and processing data collected from the user as part of thedata collection protocol.

In accordance with a further system embodiment of the invention, anautomated system for processing online complaints comprises at least oneprocessor executing computer instructions stored in a tangible,non-transitory computer readable storage medium causing the processorto: receive and process registration information about an entity; createand provide a unique coding entry for the identification of theregistered entity; generate and populate a key word database associatedwith the registered entity; receive an input data from a user,comprising an idea, a complaint with identification information or ananonymous complaint; search the key word database in any communicationsinvolving the registered entity; automatically analyze the received userinput data and determining whether the input data comprises a complaintlaunched or reported by the user; preform a zone of reliabilityverification analysis on the received data; automatically scrub andremove private personal information (PPI) from the received input data,and store it in two datasets, the first dataset including the PPI andthe second dataset storing data after scrubbing, with all PPIinformation removed; unseal and provide access to the dataset with PPIinformation only upon receipt and verification of an unsealing decisionor order; and automatically generate and transmit one or more reports togovernmental entities, industry groups or independent organizations,based on the analysis of one or more reported complaints and at leastone guideline provided by federal laws, state laws, local regulation,industry standards or entity-specific policy.

As an aspect of this embodiment, the unique coding entry, created andprovided for the identification of the registered entity, includes athree-standard-words combination and further executing computerinstructions that cause the system to utilize the three-standard-wordscombination for identification of the entity during registration, forreceiving and processing communications from the user and for reporting.

As a further aspect, the processor executes computer instructions thatcause the system to: calculate a rating score to the registered entityas part of the engagement data; and create and transmit periodicengagement emails that include registered entity rating score andindustry rating information, or any changes in the rating information.

As another aspect, the processor executes computer instructions thatcause the system to: create and maintaining a second industry key worddatabase, and including the keywords in a key word database for theregistered entity into the second industry key word database; performanalysis and generate report on the overall industry, withoutidentifying the specific or personal registered entity in the report;and transmit generated reports to one or more governmental entities,industry groups or independent organizations involved with the industry.

As an additional aspect, the processor executes computer instructionsthat cause the system to: receive and process information thatdesignates at least one person as a point-of-contact for the registeredentity, and assign weight qualification to the idea entered by the userat least partially based on a number of other users that present asimilar idea.

As yet another aspect, the processor executes computer instructions thatcause the system to: provide multiple pricing options for differentoffered services; and receive and process registration information thatreflects at least one selected pricing option and at least one selectionof the offered services for the registered entity. p As yet a furtheraspect, the key word database associated with the registered entitycomprises special goals and objectives that the entity wants to improve,or one or more specific problems or challenges that the entity wants toaddress.

As still yet another aspect, the zone of reliability verificationanalysis of the received complaint data comprises confirming thelocation of the user, who provides complaint data, based on an IPaddress or zip code provided by the user.

As still yet a further aspect, the processor executes computerinstructions that cause the system to: encrypt dataset with PPI usingone or more encryption key; and link the dataset with PPI with thedataset where all PPI is removed.

As another aspect, the processor executes computer instructions thatcause the system to: automatically execute a data collection protocolthat sends a Webpage with an entry space or a form to enter a date ofthe incident, a text box for data entry, an option to upload images oran option to activate a webcam to take and include an image of the user;and receive and process data collected from the user as part of the datacollection protocol.

In accordance with a further embodiment of the invention, a method forautomatically processing online complaints, comprising: submittingregistration information about an entity; utilizing a unique codingentry for the identification of the registered entity; providing orreceiving one or more key words for storage in a database associatedwith the registered entity; receiving a selection request to enter anidea, launch a complaint with identification information or launch ananonymous complaint; transmitting information that designates at leastone person as a point-of-contact for the registered entity; transmittinginput data from a user, comprising user selection for enter the idea,launch the complaint with identification information or launch theanonymous complaint; providing data for a zone of reliabilityverification analysis on the user-transmitted data; providingverification of an unsealing decision or order, and instructions forunsealing and providing access to a dataset with PPI information;receiving notification of one or more automatically reports togovernmental entities, industry groups or independent organizations; andreceiving a rating score to the registered entity as part of theengagement data.

As an aspect of this embodiment, the method further comprises receivingmultiple pricing options for different offered services; transmittingthe selected pricing option and at least one selection of the offeredservices for the registered entity; and receiving periodic engagementemails that include registered entity rating score and industry ratinginformation, or any changes in the rating information.

Various other objects, advantages and features of the present inventionwill become readily apparent to those of ordinary skill in the art fromthe following detailed description of the invention.

BRIEF DESCRIPTION OF THE DRAWINGS

The following detailed description, given by way of example and notintended to limit the present invention solely thereto, will best beappreciated in conjunction with the accompanying drawings, wherein likereference numerals denote like elements and parts, in which:

FIG. 1 schematically illustrates the process flow in accordance withcertain embodiments of the present invention.

FIG. 2 schematically illustrates interaction and interfacing between theuser and the software operating on the IA server in accordance with thepresent invention.

FIG. 3 schematically illustrates the process flow for communicatingideas, reporting or launching formal complaints, or reporting complaintsof another person with verification, and reporting or launchinganonymous complaints in accordance with the present invention.

FIG. 4 schematically illustrates the organization and encryption of datarecords with personal data and anonymous reporting options in accordancewith the present invention.

FIG. 5 schematically illustrates some of the advantages of the presentinvention in comparison to currently known and used systems.

DETAILED DESCRIPTION OF THE PRESENT INVENTION

Definitions

In the discussion herein, the following definitions of various terms areprovided for various purposes, including establishing broad definitionsof such terms and for other reasons as set forth below.

The terms “customer,” “customers,” “user,” “users,” “caller” and“callers,” are used interchangeably herein.

The terms “transmission,” “communication,” “transfer,” and the like areintended to include direct or indirect communication, and wired orwireless communication, and may be achieved via any known manner known.Unless otherwise stated, communication between devices include wired orwireless communication, include direct communication (e.g., Bluetoothcommunication) in certain embodiments and include indirect communicationin other embodiments. Indirect communication includes communicationbetween intermediary devices, computing systems, communication portalsand other devices known in the art.

Input by a user of a computerized device is intended to be broadlyconstrued and may include any action or a set of actions by the userthat are perceived by a mechanical, electrical, optical, audio, or otherdevice capable of receiving a human-provided output, such as a “click”on a mouse, depression of a button, a selection or depression of a keyon a keyboard or keypad (including a virtual keyboard or keypad), acontact on a touch-screen type device, a voice command received by anappropriate computing device, and/or a physical gesture also received byan appropriate computer device (e.g., devices employing a camera orother types of sensors that detect movement), among other forms of inputto such devices.

The types of devices that can receive and process the transmission,communication, or other form of input by a user includes, asnon-limiting examples, a keyboard, touchscreen, mouse, input device of acomputer, smart phone, tablet or other mobile electronic device, aremote control, key fob, camera system coupled to a suitable computingdevice, computing system that employs a microphone, movement/motionsensors, optical systems, and devices/systems that include a combinationof any of the foregoing.

Output from a computing device and the like to a user is intended to bebroadly construed and may include any action or a set of actions by thecomputing device (with or without the assistance of associated devices)perceivable by a user and includes, as non-limiting examples,information on a display or visual output on another device, audiooutput (e.g., from a speaker), tactile output (human-perceivablemovement), and other known manners where a computing device is able toconvey information to a human.

The terms “smart phone,” “mobile phone,” “mobile device,” “computerizeddevice,” “computer,” “computing device” and the like as used herein areused interchangeably herein and includes devices capable of beingprogrammed and, as appropriate, have communication capability and/or areused to facilitate/carry out the functions, steps and/or processesdescribed herein and include, as non-limiting examples, desktopcomputers, portable computers, laptops, smart phones, tablets, smartwatches, and other appropriate technological devices.

As illustrated, the present invention is not limited to the use of asingle operator, a single platform, a single type of device, etc. Hence,the present invention is applicable to any type of device capable ofcarrying out the various functions as described herein (within therelevant embodiment) and applicable to any operator.

Discussions pertaining to a computer, server, processor, electronicdevice, computing device, and the like shall include a combination ofmultiple devices. Language relating to a computer, computing device,electronic device, and the like includes any suitable combination ofcomputing devices, including servers, systems, databases, controllers,engines, interfaces, or other types of devices generally recognized tobe used within or associated with computing devices.

Computer, computing devices and electronic devices employ a processor(e.g., a CPU or controller) configured to execute software instructionsthat are stored on a tangible, non-transitory computer readable storagemedium. Computers, computing devices and electronic devices, along withtheir associated processors and the tangible, non-transitory computerreadable storage mediums are well known in the art. The presentinvention also is described as carrying out certain processes, steps andfunctions. Such processes, steps and functions are carried out byappropriate computers, computing devices, electronic devices, processorsor other known components capable of carrying out those processes orsteps. Hence, even if structural devices are not mentioned within eachof the various sections presented herein, the foregoing mentionedstructural devices, such as a processor, computer, computing system,electronic device, etc., represent the structures that may be used inthe present invention.

The present invention is described as a multitude of processes in termsof functions, steps, objectives, and other things, and given thediscussion herein, and in light of the discussion herein, a person ofordinary skill in the art to which the present invention applies is ableto generate the corresponding code, software applications and “apps.”Custom apps may be developed to facilitate these functions wherein auser is simply able to push a virtual button on his/her smart phone (orother device) and then the app does the rest, with the assistance ofremote servers/systems as discussed herein.

The server or processors may employ artificial intelligence (AI)software to perform various analytics processes.

Since technology for enabling communication between devices, whetherdirect or indirect, and whether via the Internet or other methodologyare well known in the art, detailed descriptions of such technologiesand methodologies are not provided herein in order to avoid obscuringthe inventive subject matter described herein.

Process Flow

An example of the overall process flow in accordance with certainembodiments of the present invention is described with reference to FIG.1 . Initially, in Step 10, a company, hospital, team, educationalinstitution, or any private company registers for “It's Anonymous”(hereinafter “IA”) services and designates (hereinafter “CD”) at leastone person as the point-person for the platform. Generically, IAincludes the systems and personnel behind the services provided.

Before continuing with the process discussion shown in FIG. 1 , FIG. 2is referenced to schematically illustrate the interaction andinterfacing between user and the software operating on the IA server inaccordance with the present invention. In FIG. 2 , the IA may be aserver 210 that includes one or more computer processors,microprocessors or CPUs 220, a display screen 230, a computer memory 240(for example, RAM, ROM or PROM memory) storing computer instructions,which are executed by the processor to perform the described functionsof the IA that are described in this application. The server 210 isenabled with a communication interface and an Internet connection 250(for example, T1 line or Wifi modem) that allows the server to connectto and communicate over the Internet 260 or to another type of networkthrough which an individual (user) can connect and transmit data. Theuser can communicate using a desktop computer 270, a laptop 271, atablet 272, a mobile device (for example, a mobile phone) 273 or anyother device that can connect to Internet and transmit and receive HTML,XML or other communications that are used for data transmission.Alternatively, the connection and data transfer can be performed thougha LAN or WAN, or any other type of closed or open network. Other mannersof known technology and communication protocols not otherwise describedherein, may be employed, as appropriate.

Referring back to FIG. 1 , in step 10, the company representative or theathletic program official (or other designated person) contacts theindependent IA service provider and completes the company registrationprocess, which includes pricing options along with a selection ofvarious services that can be provided. As part of the engagement, thecompany may sign an agreement with IA for use and access to the IAserver along with additional information and training that are providedto company management.

In step 20, IA provides custom-tailored training for leadership in howto process/handle information, such as how to deal with negativeinformation, dealing with data and situations that are not intuitive,how to respond and what information is considered valid. Optionally, IAprovides a limited-time of free training/coaching, monthly newsletters,and other related information.

In step 30, IA provides the CD with a uniquely or specifically designedemail template announcing the partnership and commitment to diversity,equity, and inclusion, along with ensuring that all voices are heardthroughout the organization/program. In at least one embodiment, thestakeholders are provided a unique coding entry (e.g., comprising ofthree standard words) that are typed into the URL for anonymous coach.The unique coding entry is used for unique identification of theorganization represented by CD or any particular department within anorganization. In at least one embodiment, a unique coding entry may beused to identify a company branch or a department (or any group) withingthe organization, or an independent organization of multiple companies.

Keyword Bank

The IA server may also generate and populate the keyword database or“word bank” associated with the company's initiative. The word bank mayinclude key terms that may be automatically searched for by the AI inany communications involving the company, the specific goals andobjectives that the company wants to improve, and/or the specificproblems or challenges that the company wants to address.

The key word bank that is organized for or provided by the specificcompany may be added to the overall “industry word bank”. For example,the company that provides a laundry service may include its own specifickey words “lost clothes” or “wrinkled”, and these key words are added tothe overall industry word bank that analyzes problems and data for alllaundry-related services. The IA may perform analytics on the overallindustry, without utilizing specific or private information, andgenerate reports that concern or impact the whole industry (e.g.,Diversity Engagement Initiatives (DEI), mismanagement, etc.) In additionto many reports and information that IA may provide to the individualcompanies about the common trends, challenges and problems in theindustry, the IA may also provide the identified areas of concern oraction in the annual or periodic reports to SEC and other governmentalagencies, industry groups and independent organizations.

Automated Reports and Notifications

Among the above reports, or in addition to them, the IA may alsogenerate and send weekly emails, which can provide further details ofthe analysis (e.g., for trends, patterns) of the replies to weeklyemails. Such details can also provide the identified trends and ananalysis of how the identified trends & patterns are converted intouseful data and projections for the future.

The invention may generate engagement emails in certain embodiments. Forinstance, the IA server automatically generates and send all members ofthe lacrosse program (at a partner college) an email on a given day(e.g., Friday) asking how they (and/or the college) are doing? It couldbe implemented as a simple 1-10 scan with some face emojis. After aclick, the user is brought to the landing page on the IA server, wherethe user may report an idea or other information, such as complaints,etc. The engagement data is processed, analyzed, scrubbed of privatepersonal information (PPI), particularly when anonymity is desired, andholistically sent to the partner institution. It includes metrics of howthings are going. For example, it may report that the hospital patientsare satisfied with the care received (for example with n=175participates with an average score of 7/10 on their satisfaction ofcare), or employees are satisfied with the company (n=15 with an averagescore of 8/10 for the month of December). Users can also compareprevious reporting statistics as well.

Automated Engagement Metrics

As part of the engagement analysis, the data can be utilized todemonstrate employee engagement, provide metrics to the partner, informpotential consultants/work, and to get users familiar with the reportingfeatures/mechanisms.

In step 40 in FIG. 1 , the participating organization's employees andofficials receive an annual certification through a one-hour (or otherfixed period) “on demand” training video that is specifically designedto work in concert with the platform and promotes the stronger decisionsand maximizes employee engagement through anonymity and inclusivity. Thecompany management also may be coached through more individualizedin-person sessions or virtual classes by IA or third parties that areautomatically identified and selected for this by the software executingon IA server, based on the company's materials provided in steps 10 to30.

In at least one embodiment, IA utilizes AI or other computer program(s)to create a customized letter/email or an outgoing message to thecompany's employees, which may indicate the company's commitment to DEI(diversity, engagement, inclusion), set the desired goals and objectivesand ask for the employees' comments, suggestions, evaluations, etc.

The AI may extract a specific word or keyword, phrase or a combinationfrom the user input, word bank for the company or a global word bank(e.g., a database or files of key works) for the whole industry, andinsert or generate the specific text into a standard template/letterbased on the extracted specific word or keywords. It can also use thedata entered by one or more callers or users, as discussed in theEngagement Analysis section below.

Three-Standard-Word Combination

In step 50, when the stakeholders (e.g., students, athletes, employees)input the unique coding words for the company, organization ordepartment (e.g., a three-standard-word combination) into the generallanding page on the “It's Anonymous” (AI) homepage, they are directed toa new URL that is specific to that company, organization or department.In step 60, the connected users have the option to select from a varietyof reporting features that are preferably available 24/7, with no limit(or some large limit) to the amount or number of entries.

In at least one embodiment, the employees of the company (all or someselected) take a one-hour (or other duration) training course. Uponcompletion of training of all or most employees, the employees and/orthe company may be issued a certificate of completion by IA, which canbe automatically generated and sent by the IA server to the providedemails or other contact information.

Privacy and Anonymity

In Step 70 (not shown in FIG. 1 ), using the computer software that maybe implemented as a self-teaching and learning artificial intelligence(AI), the server and the system processes the information provided bythe individuals, removes the IP addresses from the data and metadata,and automatically identifies certain key words using the pre-storedlists or database with specific key words. The key words and databasemay be updated by the AI and the system as more important key words, orwords referring to a specific situation (or common situations) areidentified.

Reliability Analysis

During the onboarding process, the company [CD] provides IA with zipcodes and locations of all employees. This information iscross-referenced by the AI to determine a level of reliability validity.A specific distance or a geographic distance around the employee'slocation can be generated. This distance can further be utilized by thecomputer program to automatically block as potential spam or give lesserreliability ratings to the user's IP address that is further away fromthe registered user's location.

Zone of Reliability/Validity Rating

In addition, as part of the company's “onboarding” process with IA, thecompany, company employees' names, zip codes, known addresses can beentered into the database accessed by IA server. In at least oneembodiment, a layer of circumferences are established around theinputted data from a user, such as for example the area around theuser's address. This area may establish a geographic zone ofreliability/validity for the future communications from the user withIA, and for launching anonymous complaints.

In step 80, the inputted information (received from the user) isprocessed by the IA and the software calculates the reliability/validitypercentage for the user's communication using the formula andrelationships that are based on the company information, goals, concernsand other data. An example of the reliability/validity percentagecalculation is described further in this specification.

The reliability/validity rating is sent to the CD from IA in step 90.Preferably, the system and connection is designed with a strong dataintegrity and security features, such as, for example, encryption ofpassword and/or userid, double id confirmation functionality, and othersecurity features. Multiple security features are embedded into thesystem to prevent any access of either the sealed (secure and privatepersonal information or PPI of the individual) or the aggregated dataall PPI identification removed. The description of the sealed data andaggregate data (with PPI removed) is described in more details below.

Revenue Allocations

In addition to other benefits, the IA server may also process andautomatically allocate some percentage (e.g., 3 percent) of its revenueback to the victims. As a result, IA is utilizing the system thatempowers the victims and gives them a voice. Another benefit of thepresent invention is that the IA provides consultants and/or arbitratorsbased on the automated source coded AI or software-drive analysis. Thisallows the organizations and companies to engage the best-suitedconsultants and expert in a particular area of concern that isautomatically flagged and reported to the company. The consultantrecommendations may also be automatically included as part of theresults and recommendations to the company or organization.

The specific features and other aspects of the present system arefurther described and illustrated below with reference to specificexamples.

EXAMPLE 1 Processing of Student Complaint

A student receives an email on a Friday, during a particular month.Similar emails are also sent in prior weeks, from the date that theUniversity where the student is studying has partnered with IA. Theemail may ask the student to rate how the University Soccer Team isdoing. The email may include a link to the IA server webpage, where thestudent may be asked to rate the Soccer Team on a 10-point scale.

The student then selects a score of 2 on the 10-point scale and possiblythe associated appropriate emojis. Upon submission, the processor on theserver cross-references and checks the student's prior provided grades.In this case, it may determine that the same student has previouslygiven a much higher grade (e.g., 7 on the 10-point scale) to the sameteam. This then opens up a specific IA landing page (on the IA server)for the student to consider launching a complaint and/or provide anexplanation for why the grade was given.

In one example, the student makes the decision (unlike prior weeks), toreport an incident of harassment by her/his coach. The student clicksthe exemplary option “I want to file a complaint anonymously.” Thesystem then automatically executes the data collection protocol(according to the programmed steps) and sends to the student a Web pagewith an entry space and possibly specific questions or a form to enterthe date of the incident, a text box for data entry, an option to uploadphotos/pictures, and an option to activate her/his webcam to take aphoto. The student then completes the form and clicks “submit.”

In addition, in some embodiments, when the student is connected to theIA server, it may allow the student to turn on the camera and/ormicrophone and enables the person to tell the story into his or hermobile device or a computer. The video and/or audio file is thentransmitted to the IA server, where it is analyzed, processed, andstored by the computer software.

The server then evaluates the received information and sends to thestudent (and the student receives) additional links and resources, witha statement that reassures her/him that the complaint has been filedanonymously, with strict data integrity, and that it will be addressedwith the university officials in a timely fashion.

Data Scrubbing and Securing Privacy

FIG. 4 schematically illustrates the organization and encryption of thedata records with personal data and anonymous reporting options.Referring to FIG. 4 , IA then executes specific computer instructionsthat seal the record 410. For example, the actual data 410 is encodedwith an encryption key and can be decrypted (or unsealed) only by acourt order 440, or specific instructions from the police or otherjudicial or investigatory body. The order or instructions may be furtherevaluated by the company management and/or automatically acted-upon bythe computerized system that maintains and secures data records andcommunications.

In addition, a duplicate “public” copy 420 of the record may be formedand stored by the IA server. The software program executes on the IAserver and scrubs the student's IP address and other private andpersonal information (“PPI”). The actual sealed record 410 and the“public” copy (with PPI removed) can be linked together orcross-referenced by the IA 430, connected via pointers or interrelatedthrough any known programming techniques. The details of the incident,however, are sent as an email or a message to the designated contactfrom the university. For example, in one embodiment, the public (i.e.,anonymous copy) may be sent to the athletic director who received acertification on how to process the complaint information/data.

In addition, the IA server may send an additional notification to theuniversity regarding the incident, with a list of recommendations,reminder of the training video (with a link), and consulting/arbitrationoptions. The IA may use some of the data it has processed from the entryas part of the regular reporting process.

Potential Outcomes

The athletic director (or other designated individual) and universityreceive a generated report and suggestions from IA and/or relatedconsultants who may be connected by IA to provide their analysis andrecommendations. Then the university implements steps to remedy thesituation and the outcome yields (in this particular case) a suspension,required training, and verbal reprimand to the soccer coach. The coachcompletes her/his training and reflects on his/her practices realizingthat his/her behavior may be unintendedly causing difficulties andproblems to the soccer team or some of its member. The coach correctsher/his behavior and continues to have an incredible career.

In another possible outcome, the software operating on IA server crossreferences other complaints and determines that the same coach was alsoreported by three other students during the month of May. The athleticdirector and university receive a generated report and suggestions fromIA and/or related consultants who may be connected by IA to providetheir analysis and recommendations. This time the providedrecommendation (which is acted upon by the athletic director anduniversity) is to terminate the coach for egregious behavior and avoidadditional harm/abuse towards other athletes. IA may also have specificrules and an automated process that will report the coach to the ethicscommission and provides specific consultants that will guide theUniversity through the entire process.

In yet another possible outcome, the athletic director and universitydecide not to take action and ignore the complaint and IA report andrecommendations. The university, despite its training and partnershipwith IA, decides that the complaint lacks validity in an anonymous tool(or that the anonymous complaint is contradictory or has otherquestionable consistency or trustworthiness issues). The coach continuesto sexually harass (or bully) the players. This time a student logs intothe IA system and uses her/his name. The family bring an action againstthe school.

Unsealing Process

During the proceedings a court orders that the records of the incidentand the complaint (which are sealed by the IA server) should beunsealed. Then the IA server executes computer instructions that willdecrypt the stored (sealed) records associated with the anonymouscomplaint by the student.

As part of the unsealing process, the system may execute computerinstructions to evaluate (using, for example, the key event description)whether the sealed anonymous data in the original filing (completedanonymously) matches the facts and data in the complaint that is filedwith the student's name in court or other judicial or executive agency.If the system determines that the original anonymous complaint matchesthe data in the non-anonymous court-filed complaint, the coach isterminated, and the school is exposed for ignoring the complaint.

Issuing Recommendations

In yet another example of possible outcome, the athletic director anduniversity, upon receiving the evaluation and recommendation from the IAautomated system and/or related consultants, investigates the situationthoroughly and determines that the complaint lacks credibility and mayhave been intended to cause harm to the coach (for example, thecomplainant doesn't like her/him due a playing time reduction or otherreason). The IA system has put the coach on notice and shed light thatthe university is taking all matters and incidents seriously. Thevolleyball coach, for example, learns about the situation and reflectson his/her practices and recommends that the university push out a newprogram to ensure student safety.

User Interface with IA and Reliability/Validity Calculation Examples

An example of the user's (for example, employee's, student's, orathlete's) interaction and interfacing with the software operating onthe IA server is provided below. An employee 205 (FIG. 2 ) may connecthis or her computer device (e.g., 270, 271, 272, 273) to the server 210through the Internet 260, or “log into” the IA server on a computernetwork. The user is connected to a specific landing page, eitherthrough a link sent in an email or message sent to the user device270-273. The connection may be established though the Internet or anytype of network (i.e., a LAN, WAN, etc.).

In at least one embodiment, the user 205 is asked to turn off theVPN/ghost IPs on its mobile device in order to allow the server 210 (inFIG. 2 ) to communicate with the user device 270-273, and morespecifically to be able to perform the validation processing.

The server 210 validates the user's interaction by receiving andprocessing the IP address of the user's device 270-273 and matching itwith the zip code or an address that is used. The percentage of thereliability/validity of the communication and any complaint that may belaunched by the user is based at least partially on whether the IPaddress of the user's device matches the zip code of the user (or thatis associated with the user) or the company.

Three-Word-Combination Unique Code

The user also enters the three-word unique code words associated withthe company, and the system uses the three-word code words to find andrecognize the company for which the user intends to provide his or herresponse or information. For example, one company may use a three-wordcombination A (e.g., blue, toilet, soccer), which is entered by the userin order to provide user comments and other data for a specific companyor organization. The IA server distinguishes the three-word combinationA from a combination B (e.g., brush, popsicle), the latter which is usedfor another company or organization.

The three-word combination is processed by the computer software,executing on the IA server to connect the user to the correct webpage,which is used only for the company or organization in which the user isa member, employee, student, etc. The users are also provided withvisual display information, identifying the company, and can doublecheck the access to the correct entity. In another embodiment, the users(like all team players or all employees) are given a specific companycode, or an additional unique identifier, which can further supplementthe process of reliability/validation of the user's input.

FIG. 3 schematically illustrates the data analysis and process flow forcommunicating an idea, reporting or launching a formal complaint orreporting a complaint of another person with verification, and reportingor launching an anonymous complaint.

Referring to FIG. 3 , once a user is connected to the web page that isused by the IA server for the company or organization at issue, the user305 may be presented with several options. For example, option 310 maybe “I have an idea”; option 320 may be “I want to report or launch acomplaint”; and option 330 may be “I want to report a complaintanonymously.”

Option 1—Sharing an Idea (An Anonymous Crowdsourcing Platform w/ AI)

Option 310 may involve having the user enter the user idea as input onthe user device, such as a mobile phone or a computer, using any inputinterface, such as a keyboard or a touch screen. The entered data issent to the IA server through the Interface or any other network andgets processed and analyzed by the AI or software executing on the IAserver.

In at least one embodiment, the AI or software executing on the IAserver analyzes the user input and qualifies it based on a number of keywords stored in the key word bank. The actual storage can involve anycomputer memory, file, database, and internal or external data storagesystem or device. In one example, the IA server performs the comparisonof the user input data to various key words utilized for the company ororganization, or the global key word bank (for the whole industry orsimilar types of organizations). It may assign different weights todifferent keywords, and/or determine the classification of the ideabased on the combination of key word matches and/or a number of matches.

The weights and the qualification of the presented idea can be alsoadjusted based on a number of other users that present the same orsimilar ideas. For example, if multiple users present ideas forencouragement of greater diversity, the overall calculated value givento the presented idea by the IA server can be higher.

In at least one embodiment, the actual text may not be saved on the IAserver, or may be encrypted after the analysis, to assure fullconfidentiality and protection to the user. The decryption of the actualtext may require a key or some identification from the actual user whosubmitted this idea. In at least one embodiment, the IA server may alsosend the inputted text, with its calculated valuation and analysis, tothe company. In some embodiments, all PPI (personal private information)is removed from the inputted text. This could be an option that the userchooses by selecting “An anonymous submission” option whilecommunicating with the IA server.

Engagement Analysis

In addition to the function of submitting the user's ideas, the IAserver also performs and generates an Engagement Analysis. In at leastone embodiment, the engagement analysis include calculating a number ofkey words that are related to the user entry, or number of similar keyword matches or relationship to the global industry key words.

In calculating the engagement analysis, the processor on the IA servermay perform analytics on the company objectives either alone or incombination with the analytics for the overall industry, with or withoututilizing the specific or private information of the user. In at leastone embodiment, the IA server performs metrics analysis for the companyin a particular area, taking multiple ideas from the company'semployees, and compares the company to other organizations in the sameindustry. It may also compare the company or the industry at issue toother industries, with respect to the specific topic that relates to theideas provided by the company employees. The resulting customizedanalysis and report are sent to the company either weekly, monthly or onsome periodic basis.

For example, the IA server may perform metrics comparison of the ACEHardware Store in comparison to other hardware stores in certaingeographic area, where the data is collectively aggregated for theanalysis. The analysis may involve the comparison of the initiative,metrics, grading, goals, achievements, problems, and other criteria inthe area of Diversity Engagement Initiatives (DEI), mismanagement, oranother specific topic.

In another example, a particular hospital is compared to other hospitalsand to the industry average for the specific topics that involve userinput for that hospital. The report may also include additional topicsand analysis in the report, for the areas where there are no user dataor the hospital. For example, if no complaints about management andprices are launched for the specific hospital, it may receive a highergrade in comparison to others in the automated reports generated by theIA software, or AI.

In addition to many reports and information that IA may provide to theindividual companies about the common trends, challenges and problems inthe industry, the IA may also provide the identified areas of concern oraction in the annual or periodic reports to SEC and other governmentalagencies, industry groups and independent organizations.

In at least one embodiment, the IA server report may also includespecific consultant or specialist recommendations. For example, whenreporting on a DEI issue, the IA software will find the properconsultants in this area and the geographic location, and will includethe contact information and recommendations to assist the company intraining/professional development for DEI with the proposed consultants.In addition, the IA server may also generate an additional communication(such as an email or an automated call or text notification) that issent directly to the consultants that are chosen by the IA software fora particular area of work or development for the company. Thedetermination of the proper consultant recommendation may alsoautomatically evaluate the financial ability and consultant rates,availability, and schedule in order to match the company with the properconsultant for the topic at issue.

The engagement analysis and automatic generation of customized reportsmay also involve the AI or software generating specific source codesthat are dependent on the organization/company. Examples may include,but are not limited to, the following informational topics andevaluation of input ideas or comments on various topics, including:

Salaries/compensation

Travel and expense

Favoritism

DEI

Company Communication

Workplace conditions

Idea generation

Regulation/compliance

Talent acquisition

The IA server processes the incoming ideas and may organize and tag themunder a number of categories or topics (see above). In some embodiments,the tags and analysis categories may also involve such additional topicsas: (a) new way to generate revenue; (b) improvement in workplaceefficiency; and (c) process/procedural changes or suggestions. Manyadditional tags and topic areas are possible and contemplated.

During the evaluation of the user input and aggregation of multipleusers in the process of engagement analysis, the IA server may use theAI or software that operates the processor to snag the source code (e.g.T&E) and track the percentage of entry source codes assigned to varioususer entries. For example, during the month of December, Getaway has 40%engagement in the area of work requirements/demands; 20% engagement onDEI; 20% on salaries and compensation; and 10% other. The AI or computersoftware causes the system to alert the consultant and/or leaders inthat particular space and generates a report to be sent to theorganization.

As part of the analysis, IA server may execute computer instructionsthat cause the system to point out (through the automated analysis andgenerated reports) that there is an increase in concerns related to DEI(Diversity Equity and Inclusion) steadily rising from 10% (in October),45% (in November) and now 63% (in December). It may further recommendthat the company management should contact a particular consultantchosen by the IA. The chosen consultant would assist the company withthe ideas on how to further analyze the data and provide embeddedprofessional development/learning. The consultant's name may beautomatically determined by the IA software and the name and contactinformation inserted into the recommendations, reports, andcommunications to the company.

Currently available crowdsource platforms, unlike the present invention,do not provide a truly anonymous mechanism for providing informationflow.

IA also uses AI or computer software to tag source codes and processesinputted data in a fashion that provides for the CD to identifyprevailing trends of inputted information. Using anonymous data andinformation is not intuitive; in fact, the idea of anonymous informationis often discouraged and not treated with value. IA provides aubiquitous, anonymous feedback loop to provide employees an avenue toshare ideas without fear of retaliation, retribution, mocking, and/orfailure. There are no platforms or mechanisms where employers can hear“what needs to be said” or “what is not being said” in the room. Thisrestricts the potential of the organization (cost savings/new revenuestreams) and can also hide potential cases of discrimination (racism,agism, and sexism), harassment and intimidation in the workplacefurthering the disparity of inequality. This avenue helps unleash thehidden potential of organizations and communities by giving a voice tothe silenced, marginalized, and oppressed.

Some of the advantages in operation, organization and functionality ofthe present invention are discussed with reference to FIG. 5 , whichvisually illustrates some of the advantages of the present invention incomparison to currently known and used systems.

The present invention utilizes an automated and comprehensivecomputerized system 510 and anonymous reporting platform that achieves anumber of structural and functional benefits that are not present in thepreviously known and used systems, such as whistleblower hotlines 520,NYAS Report-a-Coach 530, U.S. Center for SAFESPORT 540 and OSHAreporting systems 550.

Unlike the known systems, the present invention implements and achieve anumber of desired objectives to: (1) serve to anonymously crowd sourceinnovative ideas and (when applied) increase workplace productivity; (2)demonstrate and improve leadership's or management's commitment 566 todiversity, equality, and inclusion in the workplace; (3) ensure thatorganization leadership and management hear all voices equally andfairly; not just those with better access or more dominant ininter-organizational discussions; (4) diminish the “gossip at the watercooler” with a direct avenue to the source (leadership); (5) cultivateand improve the healthy work environment 564 that does not tolerateharassment, intimidation and bullying in the workplace; (6) unleash thehidden potential, engagement and idea-generation function of the companystaff, employees or customers, or providing a leadership system and toolfor crowd sourcing important ideas and innovation 568; (7) provideautomated reporting mechanisms 565, which promotes equality, diversityand inclusivity without any fear of negative response or retaliation;(8) provide an anonymous reporting processing 562, with higher level ofreliability; and (9) provide a software-as-a-service (SAAS)implementation 569 of an automated and comprehensive system. The SAASimplementation may further utilize a simplified user interface, AI andsoftware-based processing, reporting and storage of private andsensitive information.

Examples of the Option 1 Applications and Benefits:

A CEO after a staff meeting asks all employees to log into IA to provideinput into an initiative or to provide a generative flow of new ideas.IA identifies source codes and categorizes the information in a reportformat that allows the CEO to see patterns and trends in the inputtedinformation. For example, a CEO can see that employees are strugglingwith a lack of resources allocated to T&E or an employee has an ideathat will cut costs and save the company 25% of overhead. These ideasmay not be shared in open groups for a variety of reasons (e.g.,bureaucracy of the system, hierarchy of the organization chart, fear offailure, fear of not being taken seriously).

In another example, a few staff members are complaining about an officepolicy related to travel. While these dominant voices have the leader'sear, the leader is able to pull up the data from IA to demonstrate thatthe staff is indeed not concerned with said travel policy, but ratherconcerned with how a particular manager processes the information.

In yet another example, an employee has an idea on the weekend whilevisiting friends overseas. S/he/they log into the IA system and share a“gem of an idea” that will save the company millions. Additionalexamples may include (a) a hospital employee has an idea now thehospital can better serve its patients in the cancer ward, or (b) anemployee wants to report another employee who is excessively misusingtheir T&E.

By processing and analyzing the “crowdsourcing ideas” from theemployees, IA allows companies to retain top talent (by giving a voiceto all staff), promotes diversity, equity, and inclusion, and helpsidentify systems, processes and services within the company that can bedone more efficiently and effectively, as well as gauge possibleredesigns and improvements.

Option 2—Reporting a Complaint (with ID)

Referring to FIG. 3 , the use may select option 2 and launch a formalcomplaint with the company, or report a complaint of another person,this option requires the user to input data and provide his mobile phonenumber for contact and/or verification.

In at least one embodiment, the IA server sends a unique code/id/numberto the mobile device of the user, and the user inputs the code on a Webpage allocated by the IA for the company at issue, the latter may beidentified, among other things, by a three-word unique word combination.The user may also be asked to take a photograph or upload images, audio,or videos recordings to the server as part of the complaint launchingprocess. The camera on the user's device may be activated (by the userof remotely by the IA server) in order to enable the user to take and/orupload the images, videos, or other documents.

As discussed above, the IA server may seal the uploaded or transmitteduser data, or encrypt it using a private/public key combination in orderto limit the access or “seal” the records from access by anyone who doesnot obtain a proper authorization from a court or administrative agencythat officially investigates the complaint. The “sealing” option isparticularly critical in protecting the identity of minors, students,team players. It's also important to protect the identity ofwhistleblowers who report criminal activities that may carry significantpenalties and confinement for the involved individuals and my impact thecompany's business (for example, reporting an environmental or aconsumer law violation).

When processing user input, the IA server executes AI or computer server(on one or more computer processors), causing the server to evaluatepresence of certain key words (for example, the words “abuse” or “sexualharassment”), and send an email, generate an automated call, or preparea formal letter to the proper authorities. The choice of the correctauthorities may be analyzed and determined based on the specificinstructions and guidelines provided by the company, federal laws, statelaws, local regulation, industry standards, and/or company policy.

In addition to processing the text, and searching for key words withinthe text, IA software may also execute code that “listens” and analyzesrecorded speech and “listens” and identifies certain key phrases, thetone of voice and the overall context of the recorded conversation. Itthen performs the analysis based on this analysis. For example, the AIor software executing on the IA server may distinguish between the wordsspoken at a party from the same words that are spoken during a footballpractice or game, and may reach different conclusions or assigndifferent priorities based on the context of the recorded video oraudio.

As discussed, there are no currently known anonymous services (operatedby an independent third party) where the offered system protects studentathletes (or students in general). As discussed above, many recentarticles point out to this deficiency and lack of proper resources inthis area. Program officials, universities, and athletic programs may betoo partial to properly implement the required services. One of the maingoals of such self-implemented hotlines is that it often serves the maingoal of protecting the institution (e.g., K-12, college, clubs,Olympics) rather than athletes and students. Any current reportingmechanism is either serving the university/program/school or is aninternal mechanism for coaching certification. Furthermore, none ofthese systems provide anonymity.

In contrast, the present invention implements a completely anonymousreporting mechanism to ensure the safety of students (and studentathletes). The platform is completely anonymous. Reporting someoneanonymous is counter intuitive; it casts a shadow of doubt on thevalidity of the report. Using anonymous reporting mechanisms forathletes is not obvious nor seen as a logical solution to the problemsthat exist. On the contrary, coaches, teachers, and other adultsupervisors are given countless hours of training and certifications.

IA also ensures its validity and removes an identity (IP or otherwise)of the victim. Users can select complete anonymity, or they can chooseto divulge their name. The platform uses a text to cell/device featureas a validity check and has the option (user decision) to activate thedevice's camera. The user has the option to input data, information,dates, and include a photo. (For example, the personal privateinformation may include the identification of “This is me, on this date,at this time, and I was bullied or harassed at this location, by thisperson.” The record of the complaint is then sealed and can only beordered to be opened or decrypted by the court of law or thegovernmental agency that investigates the complaint. Among many otherbenefits, the present invention ensures that all filings are sealed withseveral layers of security and data integrity checks.

Option 3—Reporting an Anonymous Complaint

Another possible option for the user selection is reporting an anonymouscomplaint through the IA automated system. After the user selects “Iwant to report a complaint anonymously”, the user receives aconfirmation that his or her anonymity will be secured and guaranteed.As with the Option 2, the user may be asked to provide a mobiletelephone number in order to confirm the reliability/validity of thecomplaint. Similarly, the user receives a unit code/id/number on themobile device and enters this number in the Web page that is utilizedfor the company on the IA server. The IP address and/or the user's phonenumber may be used by the IA server to confirm that thereliability/validity of the launched anonymous complaint meets therequirements and should be properly processed (i.e., blocking spammersand persons with low reliability/validity scores or metrics).

As with option (2), the user may activate his or her camera and uploadand send videos, audio files and/or other documents. However, afterprocessing the input received form the user, the IA server willimmediately “seal” (for example, encrypt using the private/public keysor other encryption methods) the user data in order to secure theanonymity of the user. The IA software or AI may further remove anypotentially identifiable information from the data that it may utilizefor the aggregate data, overall analytics and reports send to thecompany or organization, or to the proper authorities. The “sealed” datacan then be opened by the IA management after receiving a court order.In at least one embodiment, in order to unseal the “sealed” record, theCEO of the IA has to receive an order from the court that directs the IAto “unseal” the record.

In one example, a student athlete wants to submit an anonymous complaintabout a college team coach. He or she uploads a video or audio file inwhich the team coach uses racial slurs. The video is transmitted fromthe student's mobile phone to the IA server, where it is processed. Aspart of the processing, the video is scrubbed and separated from anyvideo data that contains any information that identifies the athlete.This “anonymous” (i.e., scrubbed) copy is sent to the college. Theoriginal video may be “sealed” by encryption. The information that doesnot identify the athlete remains in the “anonymous” copy. The original“sealed” copy is stored in a database by the IA server (in the encryptedformat) and linked to the “anonymous” copy by a pointer or someidentifier. The “sealed” copy is maintained in the encrypted state untila proper court order is provided to the IA, directing it to unseal thestored records.

One of the benefits of maintaining a direct link between the “sealed”and “anonymous” copy of the submitted complaint is that automaticallyconnects the two files/reports through the automated mechanisms. Itmaintains the student athlete's personal details and account of theharassment incident(s) in a particular area or in a particular sport. Atthe same time, the anonymity of the user/complainant is fully protected.The connection between the two records allows the IA server and systemto verify the facts and alert the arbitrators and state agencies who canassist the institution or organization with both immediate remedialactions and meaningful future changes.

In another example, a company employee wants to submit an anonymouscomplaint about certain sexual harassment incident that the employeeobserved. The same process steps are done by the IA server to “seal” theoriginal report, removing names or the involved individuals, and the“anonymous” (i.e., data scrubbed of all PPI information, names, etc.) isused to generate a written and/or automatically generated report to thecompany. The original data records are encrypted and “sealed” until aproper court order or a subpoena from the DA Office is received.

Additional Examples of Situations When the Anonymous Complaint LaunchingProcess May Be Utilized:

In one example, an employee on the spectrum is constantly teased forher/his/their facial tics and mannerisms during staff meetings.Colleagues have a completely anonymous way to report the injusticewithout fear of retaliation by the aggressor. In another example, ahospital employee or patient observes the mistreatment of a patient byhospital staff.

In another situation, some persons of color in a company do not feelcomfortable sharing their ideas when the entire leadership team in thecompany is white. The leadership team brings in a person of color tospeak during the “Black History Month.” This is thought to be extremelyhurtful by the listeners and they felt unsafe, feeling it was a sense oftokenism rather than any meaningful action on a part of the companymanagement. .The present invention would allow the employees to voicetheir opinion and views anonymously and perhaps gain input into thedecision prior to the scheduled presentation.

In another example, a COO of a company was put in charge of theoperations, while the CEO travelled overseas on company business. TheCEO continually received, “we miss you when you are not here” messagefrom the COO. However, unbeknownst to him, the COO was bullying andharassing the company staff when the CEO was away on business travels.After the COO has bullied the seventh victim, the company had to hire alaw firm to investigate the allegations resulting in 12 confirmed casesof harassment, bullying and intimidation; stories of staff members beingbelittled, left in tears, and many other incidents of inappropriatebehavior by COO. In the meantime, the COO had to be put on a paid leaveduring investigation, and the company incurred significant attorney feecosts. The present invention addresses this situation much moreefficiently and cost-effectively.

In view of the foregoing detailed description of various embodiments ofthe present invention, it readily will be understood by those personsskilled in the art that the present invention is susceptible to broadutility and application. While various aspects have been described inthe context of a preferred embodiment, additional aspects, features, andmethodologies of the present invention will be readily discernible fromthe description herein by those of ordinary skill in the art. Manyembodiments and adaptations of the present invention other than thoseherein described, as well as many variations, modifications, andequivalent arrangements and methodologies, will be apparent from orreasonably suggested by the present invention and the foregoingdescription thereof, without departing from the substance or scope ofthe present invention.

It should be appreciated that the present invention includes any and allpossible combinations of the disclosed subject matter. Thus, even if aparticular embodiment is not discussed as including a feature in adifferent embodiment, the present invention embodies such feature in anysuitable embodiment, and accordingly such particular embodimentoptionally includes said particular features of said differentembodiment. Also, various steps or substeps may be omitted, and variousadditional steps and substeps may be added, as appropriate.

Unless otherwise stated, the singular includes the plural in furthervariations or embodiments, and the plural includes the singular in otherfurther variations or embodiments of any particular describedembodiment, feature, element, step or other thing mentioned herein.

It should also be understood that, although steps of various processesmay be shown and described as being in a preferred sequence or temporalorder, the steps of any such processes are not limited to being carriedout in any particular sequence or order, absent a specific indication ofsuch to achieve a particular intended result. In most cases, the stepsof such processes may be carried out in a variety of different sequencesand orders, while still falling within the scope of the presentinventions. In addition, some steps may be carried out simultaneously.

The foregoing description of the exemplary embodiments has beenpresented only for the purposes of illustration and description and isnot intended to be exhaustive or to limit the inventions to the preciseforms disclosed. Many modifications and variations are possible in lightof the above teaching.

The embodiments were chosen and described in order to explain theprinciples of the inventions and their practical application so as toenable others skilled in the art to utilize the inventions and variousembodiments and with various modifications as are suited to theparticular use contemplated. Alternative embodiments will becomeapparent to those skilled in the art to which the present inventionspertain without departing from their spirit and scope. Accordingly, thescope of the present inventions is defined by the appended claims ratherthan the foregoing description and the exemplary embodiments describedtherein.

While certain exemplary aspects and embodiments have been describedherein, many alternatives, modifications, and variations will beapparent to those skilled in the art. Accordingly, exemplary aspects andembodiments set forth herein are intended to be illustrative, notlimiting. Various modifications may be made without departing from thespirit and scope of the disclosure. Such modifications and alternativesarrangements are not intended invention to be outside the scope of thepresent invention and are intended to be covered by it.

The invention title and abstract are not intended to limit the claimedinvention or cover multiple embodiments and all various features of theclaimed invention.

Having described the present invention including various features andvariations thereof, it is intended that the appended claims beinterpreted as including the embodiments described herein, thealternatives mentioned above, and all equivalents thereto.

What is claimed is:
 1. A method for automatically processing onlinecomplaints, comprising: receiving and processing registrationinformation about an entity; creating and providing a unique codingentry for the identification of the registered entity; generating andpopulating a key word database associated with the registered entity;receiving an input data from a user, comprising an idea, a complaintwith identification information or an anonymous complaint; searching thekey word database in any communications involving the registered entity;automatically analyzing the received user input data and determiningwhether the input data comprises a complaint launched or reported by theuser; preforming a zone of reliability verification analysis on thereceived data; automatically scrubbing and removing private personalinformation (PPI) from the received input data, and storing it in twodatasets, the first dataset including, the PPL and the second datasetstoring data after scrubbing, with all PPI information removed;unsealing and providing access to the dataset with PPI information onlyupon receipt and verification of an unsealing decision or order; andautomatically generating and transmitting one or more reports togovernmental entities, industry groups or independent organizations,based on the analysis of one or more reported complaints and at leastone guideline provided by federal laws, state laws, local regulation,industry standards or entity-specific policy.
 2. The method of claim 1,wherein the unique coding entry, created and provided for theidentification of the registered entity, includes a three-standard-wordscombination and further utilizing the three-standard-words combinationfor identification of the entity during registration, receiving andprocessing communications from the user and reporting.
 3. The method ofclaim 1, further comprising: calculating a rating score to theregistered entity as part of the engagement data; and creating andtransmitting periodic engagement emails that include registered entityrating score and industry rating information, or any changes in therating information.
 4. The method of claim 1, further comprising:creating and maintaining a second industry key word database, andincluding the keywords in a key word database for the registered entityinto the second industry key word database; performing analysis andreporting of the overall industry, without identifying the specific orpersonal registered entity in the report; and transmitting the generatedreports to one or more governmental entities, industry groups orindependent organizations involved with the industry.
 5. The method ofclaim 1, wherein the receiving and processing registration informationabout an entity includes receiving and procession information thatdesignates at least one person as a point-of-contact for the registeredentity, and assigning weight qualification to Me idea entered by theuser at least partially based on a number of other users that present asimilar idea.
 6. The method of claim 1, further comprising providingmultiple pricing options for different offered services, and receivingand processing registration information that reflects at least onselected pricing option and at least one selection of the offeredservices for the registered entity.
 7. The method of claim 1, whereinthe key word database associated with the registered entity comprisesspecial goals and objectives that the entity wants to improve, or one ormore specific problems or challenges that the entity wants to address.8. The method of claim 1, wherein the zone of reliability verificationanalysis of the received complaint data comprises confirming thelocation of the user, who provides complaint data, based on an IPaddress or zip code provided by the user.
 9. The method of claim 1,further comprising: encrypting dataset with PPI using one or moreencryption key; and linking the dataset with PPI with the correspondingdataset where all PPI is removed.
 10. The method of claim 1, furthercomprising: automatically executing a data collection protocol,comprising sending a Webpage with an entry space or a form to enter adate of the incident, a text box for data entry, an option to uploadimages or an option to activate a webcam to take and include an image ofthe user; and receiving and processing data collected from the user aspart of the data collection protocol.
 11. An automated system forprocessing online complaints, comprising: east one processor executingcomputer instructions stored in a tangible, non-transitory computerreadable storage medium causing the processor to: receive and processregistration information about an entity; create and provide a uniquecoding entry for the identification of the registered entity; generateand populate a key word database associated with the registered entity;receive an input data from a user, comprising an idea, a complaint withidentification information or an anonymous complaint; search the keyword database in any communications involving the registered entity;automatically analyze the received user input data and determiningwhether the input data comprises a complaint launched or reported by theuser; preform a zone of reliability verification analysis on thereceived data; automatically scrub and remove private personalinformation (PPI) from the received input data, and store it in twodatasets, the first dataset including the PPI and the second datasetstoring data after scrubbing, with all PPI information removed; unsealand provide access to the dataset with PPI information only upon receiptand verification of an unsealing decision or order; and automaticallygenerate and transmit one or more reports to governmental entities,industry groups or independent organizations, based on the analysis ofone or more reported complaints and at least one guideline provided byfederal laws, state laws, local regulation, industry standards orentity-specific policy.
 12. The system of claim 11, wherein the uniquecoding entry, created and provided for the identification of theregistered entity, includes a three-standard-words combination andfurther executing computer instructions that cause the system to utilizethe three-standard-words combination for identification of the entityduring registration, for receiving and processing communications fromthe user and for reporting.
 13. The system of claim 11, wherein theprocessor executes computer instructions that cause the system to:calculate a rating score to the registered entity as part of theengagement data; and create and transmit periodic engagement emails thatinclude registered entity rating score and industry rating information,or any changes in the rating information.
 14. The system of claim 11,wherein the processor executes computer instructions that cause thesystem to: create and maintaining a second industry key word database,and including the keywords in a key word database for the registeredentity into the second industry key word database; perform analysis andgenerate report on the overall industry, without identifying thespecific or personal registered entity in the report; and transmitgenerated reports to one or more governmental entities, industry groupsor independent organizations involved with the industry.
 15. The systemof claim 11, wherein the processor executes computer instructions thatcause the system to: receive and process information that designates atleast one person as a point-of-contact for the registered entity, andassign weight qualification to the idea entered by the user at leastpartially based on a number of other users that present a similar idea.16. The system of claim 11, wherein the processor executes computerinstructions that cause the system to: provide multiple pricing optionsfor different offered services; and receive and process registrationinformation that reflects at least one selected pricing option and atleast one selection of the offered services for the registered entity.17. The system of claim 11, wherein the key word database associatedwith the registered entity comprises special goals and objectives thatthe entity wants to improve, or one or more specific problems orchallenges that the entity wants to address.
 18. The system of claim 11,wherein the zone of reliability verification analysis of the receivedcomplaint data comprises confirming the location of the user, whoprovides complaint data based on an IP address or zip code provided bythe user.
 19. The system of claim 11, wherein the processor executescomputer instructions that cause the system to: encrypt dataset with PPIusing one or more encryption key; and link the dataset with PPI with thedataset where all PPI is removed.
 20. The system of claim 11, whereinthe processor executes computer instructions that cause the system to:automatically execute a data collection protocol that sends a Webpagewith an entry space or a form to enter a date of the incident, a textbox for data entry, an option to upload images or an option to activatea webcam to take and include an image of the user; and receive andprocess data collected from the user as part of the data collectionprotocol.
 21. A method for automatically processing online complaints,comprising: submitting registration information about an entity;utilizing a unique coding entry for the identification of the registeredentity; providing or receiving one or more key words for storage in adatabase associated with the registered entity; receiving a selectionrequest to enter an idea, launch a complaint with identificationinformation or launch an anonymous complaint; transmitting informationthat designates at least one person as a point-of-contact for theregistered entity; transmitting input data from a user, comprising userselection for enter the idea, launch the complaint with identificationinformation or launch the anonymous complaint; providing data for a zoneof reliability verification analysis on the user-transmitted data;providing verification of an unsealing decision or order, andinstructions for unsealing and providing access to a dataset with PPIinformation; receiving notification of one or more automatically reportsto governmental entities, industry groups or independent organizations;and receiving a rating score to the registered entity as part of theengagement data.
 22. The method of claim 11, further comprisingreceiving multiple pricing options for different offered services;transmitting the selected pricing option and at least one selection ofthe offered services for the registered entity; and receiving periodicengagement emails that include registered entity rating score andindustry rating information, or any changes in the rating information.