Automatic resource ownership assignment system and method

ABSTRACT

A method for automatic folder ownership assignment, including ascertaining which first folders, among a first multiplicity of folders, have at least one of modify and write permissions to non-IT administration entities, adding the first folders to a list of candidates for ownership assignment, defining a second multiplicity of folders which is a subset of the first multiplicity of folders and not including the first folders and descendents and ancestors thereof, ascertaining which second folders among the second multiplicity of folders, have permissions to non-IT administration entities, adding the second folders to the candidates, defining a third multiplicity of folders, which is a subset of the second multiplicity of folders and not including the second folders and descendents and ancestors thereof, ascertaining which third folders among the third multiplicity of folders are topmost folders, adding the third folders to the candidates, and recommending possible assignment of ownership of the candidates.

REFERENCE TO RELATED APPLICATIONS

Reference is made to U.S. patent application Ser. No. 13/014,762, filedJan. 27, 2011, and entitled “AUTOMATIC RESOURCE OWNERSHIP ASSIGNMENTSYSTEMS AND METHODS”, the disclosure of which is hereby incorporated byreference and priority of which is hereby claimed pursuant to 37 CFR1.78(a) (1) and (2)(i).

Reference is also made to the following patents and patent applications,owned by assignee, the disclosures of which are hereby incorporated byreference:

U.S. Pat. Nos. 7,555,482 and 7,606,801;

U.S. Published Patent Application Nos. 2007/0244899, 2008/0271157,2009/0100058, 2009/0119298; 2009/0265780; 2011/0060916 and 2011/0061111;and

U.S. patent application Ser. No. 12/673,691.

FIELD OF THE INVENTION

The present invention relates to automatic resource ownership assignmentsystems and methods.

BACKGROUND OF THE INVENTION

The following patent publications are believed to represent the currentstate of the art:

U.S. Pat. Nos. 5,465,387; 5,899,991; 6,338,082; 6,393,468; 6,928,439;7,031,984; 7,068,592; 7,403,925; 7,421,740; 7,555,482, 7,606,801 and7,743,420; and

U.S. Published Patent Application Nos.: 2003/0051026; 2004/0249847;2005/0108206; 2005/0203881; 2005/0086529; 2006/0064313; 2006/0184530;2006/0184459; 2007/0203872; 2007/0244899; 2008/0271157; 2009/0100058;2009/0119298 and 2009/0265780.

SUMMARY OF THE INVENTION

The present invention provides improved systems and methodologies forautomatic resource ownership assignment.

There is thus provided in accordance with a preferred embodiment of thepresent invention a system for automatic folder ownership assignment inan enterprise computer network, the system including modify/writepermissions scrutinizing functionality operative for ascertaining whichfirst folders, among a first multiplicity of folders in an enterprisecomputer network, have at least one of modify and write permissions toentities other than f1 administration entities, and adding the firstfolders to a list of base-folder candidates for ownership assignment,first pruning functionality operative for defining a second multiplicityof folders, the second multiplicity of folders being a subset of thefirst multiplicity of folders which does not include the first folders,all descendents of the first folders and all ancestors of the firstfolders, permissions scrutinizing functionality operative forascertaining which second folders among the second multiplicity offolders, have permissions to entities other than IT administrationentities and adding the second folders to the list of base-foldercandidates for ownership assignment, second pruning functionalityoperative for defining a third multiplicity of folders, the thirdmultiplicity of folders being a subset of the second multiplicity offolders which does not include the second folders, all descendents ofthe second folders and all ancestors of the second folders, topmostfolder scrutinizing functionality operative for ascertaining which thirdfolders among the third multiplicity of folders are topmost folders andadding the third folders to the list of base-folder candidates forownership assignment, and possible ownership assignment recommendationfunctionality operative for recommending possible assignment ofownership of at least one of the list of base-folder candidates.

Preferably, the possible ownership assignment recommendationfunctionality includes functionality operative for recommending possibleassignment of ownership of at least one of the list of base-foldercandidates to an entity which has been most active with regard to the atleast one of the list of base-folder candidates.

Preferably, the modify/write permissions scrutinizing functionality isalso operative for ascertaining which first additional folders, amongthe first multiplicity of folders in the enterprise computer networkinclude at least sensitive content, and adding the first additionalfolders to the list of base-folder candidates for ownership assignment.Additionally or alternatively, the permissions scrutinizingfunctionality is also operative for ascertaining which second additionalfolders among the second multiplicity of folders include at leastsensitive content, and adding the second additional folders to the listof base-folder candidates for ownership assignment.

There is also provided in accordance with another preferred embodimentof the present invention a system for automatic folder ownershipassignment in an enterprise computer network, the system includingmodify/write permissions scrutinizing functionality operative forascertaining which first folders, among a first multiplicity of foldersin an enterprise computer network, have at least one of modify and writepermissions to entities other than IT administration entities andinclude at least sensitive content, and adding the first folders to alist of base-folder candidates for ownership assignment, first pruningfunctionality operative for defining a second multiplicity of folders,the second multiplicity of folders being a subset of the firstmultiplicity of folders which does not include the first folders, alldescendents of the first folders and all ancestors of the first folders,permissions scrutinizing functionality operative for ascertaining whichsecond folders among the second multiplicity of folders, havepermissions to entities other than IT administration entities andinclude at least sensitive content, and adding the second folders to thelist of base-folder candidates for ownership assignment, second pruningfunctionality operative for defining a third multiplicity of folders,the third multiplicity of folders being a subset of the secondmultiplicity of folders which does not include the second folders, alldescendents of the second folders and all ancestors of the secondfolders, topmost folder scrutinizing functionality operative forascertaining which third folders among the third multiplicity of foldersare topmost folders and adding the third folders to the list ofbase-folder candidates for ownership assignment, and possible ownershipassignment recommendation functionality operative for recommendingpossible assignment of ownership of at least one of the list ofbase-folder candidates.

Preferably, the possible ownership assignment recommendationfunctionality includes functionality operative for recommending possibleassignment of ownership of at least one of the list of base-foldercandidates to an entity which has been most active with regard to the atleast one of the list of base-folder candidates.

There is further provided in accordance with yet another preferredembodiment of the present invention a system for automatic folderownership assignment in an enterprise computer network, the systemincluding actual modification scrutinizing functionality operative forascertaining which first folders, among a first multiplicity of foldersin an enterprise computer network, have been at least actually modifiedby entities other than IT administration entities, and adding the firstfolders to a list of base-folder candidates for ownership assignment,first pruning functionality operative for defining a second multiplicityof folders, the second multiplicity of folders being a subset of thefirst multiplicity of folders which does not include the first folders,all descendents of the first folders and all ancestors of the firstfolders, actual access scrutinizing functionality operative forascertaining which second folders among the second multiplicity offolders, have been at least actually accessed by entities other than ITadministration entities and adding the second folders to the list ofbase-folder candidates for ownership assignment, second pruningfunctionality operative for defining a third multiplicity of folders,the third multiplicity of folders being a subset of the secondmultiplicity of folders which does not include the second folders, alldescendents of the second folders and all ancestors of the secondfolders, topmost folder scrutinizing functionality operative forascertaining which third folders among the third multiplicity of foldersare topmost folders and adding the third folders to the list ofbase-folder candidates for ownership assignment, and possible ownershipassignment recommendation functionality operative for recommendingpossible assignment of ownership of at least one of the list ofbase-folder candidates.

Preferably, the possible ownership assignment recommendationfunctionality includes functionality operative for recommending possibleassignment of ownership of at least one of the list of base-foldercandidates to an entity which has been most active with regard to the atleast one of the list of base-folder candidates.

Preferably, the actual modification scrutinizing functionality is alsooperative for ascertaining which first additional folders, among thefirst multiplicity of folders in the enterprise computer network includeat least sensitive content, and adding the first additional folders tothe list of base-folder candidates for ownership assignment.Additionally or alternatively, the actual access scrutinizingfunctionality is also operative for ascertaining which second additionalfolders among the second multiplicity of folders include at leastsensitive content, and adding the second additional folders to the listof base-folder candidates for ownership assignment.

There is further provided in accordance with yet another preferredembodiment of the present invention a system for automatic folderownership assignment in an enterprise computer network, the systemincluding actual modification scrutinizing functionality operative forascertaining which first folders, among a first multiplicity of foldersin an enterprise computer network, have been at least actually modifiedby entities other than IT administration entities and include at leastsensitive content, and adding the first folders to a list of base-foldercandidates for ownership assignment, first pruning functionalityoperative for defining a second multiplicity of folders, the secondmultiplicity of folders being a subset of the first multiplicity offolders which does not include the first folders, all descendents of thefirst folders and all ancestors of the first folders, actual accessscrutinizing functionality operative for ascertaining which secondfolders among the second multiplicity of folders, have been at leastactually accessed by entities other than IT administration entities andinclude at least sensitive content, and adding the second folders to thelist of base-folder candidates for ownership assignment, second pruningfunctionality operative for defining a third multiplicity of folders,the third multiplicity of folders being a subset of the secondmultiplicity of folders which does not include the second folders, alldescendents of the second folders and all ancestors of the secondfolders, topmost folder scrutinizing functionality operative forascertaining which third folders among the third multiplicity of foldersare topmost folders and adding the third folders to the list ofbase-folder candidates for ownership assignment, and possible ownershipassignment recommendation functionality operative for recommendingpossible assignment of ownership of at least one of the list ofbase-folder candidates.

Preferably, the possible ownership assignment recommendationfunctionality includes functionality operative for recommending possibleassignment of ownership of at least one of the list of base-foldercandidates to an entity which has been most active with regard to the atleast one of the list of base-folder candidates.

There is further provided in accordance with yet another preferredembodiment of the present invention a system for automatic folderownership assignment in an enterprise computer network, the systemincluding sensitive content scrutinizing functionality operative forascertaining which first folders, among a first multiplicity of foldersin an enterprise computer network, include at least sensitive content,and adding the first folders to a list of base-folder candidates forownership assignment, first pruning functionality operative for defininga second multiplicity of folders, the second multiplicity of foldersbeing a subset of the first multiplicity of folders which does notinclude the first folders, all descendents of the first folders and allancestors of the first folders, topmost folder scrutinizingfunctionality operative for ascertaining which second folders among thesecond multiplicity of folders are topmost folders and adding the secondfolders to the list of base-folder candidates for ownership assignment,and possible ownership assignment recommendation functionality operativefor recommending possible assignment of ownership of at least one of thelist of base-folder candidates.

Preferably, the possible ownership assignment recommendationfunctionality includes functionality operative for recommending possibleassignment of ownership of at least one of the list of base-foldercandidates to an entity which has been most active with regard to the atleast one of the list of base-folder candidates.

There is yet further provided in accordance with still another preferredembodiment of the present invention a method for automatic folderownership assignment in an enterprise computer network, the methodincluding maintaining a list of base-folder candidates for ownershipassignment, ascertaining which first folders, among a first multiplicityof folders in an enterprise computer network, have at least one ofmodify and write permissions to entities other than IT administrationentities, and adding the first folders to the list of base-foldercandidates for ownership assignment, defining a second multiplicity offolders, the second multiplicity of folders being a subset of the firstmultiplicity of folders which does not include the first folders, alldescendents of the first folders and all ancestors of the first folders,ascertaining which second folders among the second multiplicity offolders, have permissions to entities other than IT administrationentities and adding the second folders to the list of base-foldercandidates for ownership assignment, defining a third multiplicity offolders, the third multiplicity of folders being a subset of the secondmultiplicity of folders which does not include the second folders, alldescendents of the second folders and all ancestors of the secondfolders, ascertaining which third folders among the third multiplicityof folders are topmost folders and adding the third folders to the listof base-folder candidates for ownership assignment, and recommendingpossible assignment of ownership of at least one of the list ofbase-folder candidates.

Preferably, the recommending includes recommending possible assignmentof ownership of at least one of the list of base-folder candidates to anentity which has been most active with regard to the at least one of thelist of base-folder candidates.

Preferably, the method also includes ascertaining which first additionalfolders, among the first multiplicity of folders in the enterprisecomputer network include at least sensitive content, and adding thefirst additional folders to the list of base-folder candidates forownership assignment. Additionally or alternatively, the method alsoincludes ascertaining which second additional folders among the secondmultiplicity of folders include at least sensitive content, and addingthe second additional folders to the list of base-folder candidates forownership assignment.

There is also provided in accordance with another preferred embodimentof the present invention a method for automatic folder ownershipassignment in an enterprise computer network, the method includingmaintaining a list of base-folder candidates for ownership assignment,ascertaining which first folders, among a first multiplicity of foldersin an enterprise computer network, have at least one of modify and writepermissions to entities other than IT administration entities andinclude at least sensitive content, and adding the first folders to thelist of base-folder candidates for ownership assignment, defining asecond multiplicity of folders, the second multiplicity of folders beinga subset of the first multiplicity of folders which does not include thefirst folders, all descendents of the first folders and all ancestors ofthe first folders, ascertaining which second folders among the secondmultiplicity of folders, have permissions to entities other than ITadministration entities and include at least sensitive content, andadding the second folders to the list of base-folder candidates forownership assignment, defining a third multiplicity of folders, thethird multiplicity of folders being a subset of the second multiplicityof folders which does not include the second folders, all descendents ofthe second folders and all ancestors of the second folders, ascertainingwhich third folders among the third multiplicity of folders are topmostfolders and adding the third folders to the list of base-foldercandidates for ownership assignment, and recommending possibleassignment of ownership of at least one of the list of base-foldercandidates.

Preferably, the recommending includes recommending possible assignmentof ownership of at least one of the list of base-folder candidates to anentity which has been most active with regard to the at least one of thelist of base-folder candidates.

There is further provided in accordance with yet another preferredembodiment of the present invention a method for automatic folderownership assignment in an enterprise computer network, the methodincluding maintaining a list of base-folder candidates for ownershipassignment, ascertaining which first folders, among a first multiplicityof folders in an enterprise computer network, have been at leastactually modified by entities other than IT administration entities, andadding the first folders to the list of base-folder candidates forownership assignment, defining a second multiplicity of folders, thesecond multiplicity of folders being a subset of the first multiplicityof folders which does not include the first folders, all descendents ofthe first folders and all ancestors of the first folders, ascertainingwhich second folders among the second multiplicity of folders, have beenat least actually accessed by entities other than IT administrationentities and adding the second folders to the list of base-foldercandidates for ownership assignment, defining a third multiplicity offolders, the third multiplicity of folders being a subset of the secondmultiplicity of folders which does not include the second folders, alldescendents of the second folders and all ancestors of the secondfolders, ascertaining which third folders among the third multiplicityof folders are topmost folders and adding the third folders to the listof base-folder candidates for ownership assignment, and recommendingpossible assignment of ownership of at least one of the list ofbase-folder candidates.

Preferably, the recommending includes recommending possible assignmentof ownership of at least one of the list of base-folder candidates to anentity which has been most active with regard to the at least one of thelist of base-folder candidates.

Preferably, the method also includes ascertaining which first additionalfolders, among the first multiplicity of folders in the enterprisecomputer network include at least sensitive content, and adding thefirst additional folders to the list of base-folder candidates forownership assignment. Additionally or alternatively, the method alsoincludes ascertaining which second additional folders among the secondmultiplicity of folders include at least sensitive content, and addingthe second additional folders to the list of base-folder candidates forownership assignment.

There is yet further provided in accordance with still another preferredembodiment of the present invention a method for automatic folderownership assignment in an enterprise computer network, the methodincluding maintaining a list of base-folder candidates for ownershipassignment, ascertaining which first folders, among a first multiplicityof folders in an enterprise computer network, have been at leastactually modified by entities other than IT administration entities andinclude at least sensitive content, and adding the first folders to thelist of base-folder candidates for ownership assignment, defining asecond multiplicity of folders, the second multiplicity of folders beinga subset of the first multiplicity of folders which does not include thefirst folders, all descendents of the first folders and all ancestors ofthe first folders, ascertaining which second folders among the secondmultiplicity of folders, have been at least actually accessed byentities other than IT administration entities and include at leastsensitive content, and adding the second folders to the list ofbase-folder candidates for ownership assignment, defining a thirdmultiplicity of folders, the third multiplicity of folders being asubset of the second multiplicity of folders which does not include thesecond folders, all descendents of the second folders and all ancestorsof the second folders, ascertaining which third folders among the thirdmultiplicity of folders are topmost folders and adding the third foldersto the list of base-folder candidates for ownership assignment, andrecommending possible assignment of ownership of at least one of thelist of base-folder candidates.

Preferably, the recommending includes recommending possible assignmentof ownership of at least one of the list of base-folder candidates to anentity which has been most active with regard to the at least one of thelist of base-folder candidates.

There is yet further provided in accordance with still another preferredembodiment of the present invention a method for automatic folderownership assignment in an enterprise computer network, the methodincluding maintaining a list of base-folder candidates for ownershipassignment, ascertaining which first folders, among a first multiplicityof folders in an enterprise computer network, include at least sensitivecontent, and adding the first folders to the list of base-foldercandidates for ownership assignment, defining a second multiplicity offolders, the second multiplicity of folders being a subset of the firstmultiplicity of folders which does not include the first folders, alldescendents of the first folders and all ancestors of the first folders,ascertaining which second folders among the second multiplicity offolders are topmost folders and adding the second folders to the list ofbase-folder candidates for ownership assignment, and recommendingpossible assignment of ownership of at least one of the list ofbase-folder candidates.

Preferably, the recommending includes recommending possible assignmentof ownership of at least one of the list of base-folder candidates to anentity which has been most active with regard to the at least one of thelist of base-folder candidates.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention will be understood and appreciated more fully fromthe following detailed description, taken in conjunction with thedrawings in which:

FIG. 1 is a simplified flowchart indicating steps in the operation of asystem for automatic resource ownership assignment, constructed andoperative in accordance with a preferred embodiment of the presentinvention;

FIG. 2 is a simplified flowchart indicating steps in the operation of asystem for automatic resource ownership assignment, constructed andoperative in accordance with another preferred embodiment of the presentinvention; and

FIG. 3 is a simplified flowchart indicating steps in the operation of asystem for automatic resource ownership assignment, constructed andoperative in accordance with yet another preferred embodiment of thepresent invention.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Reference is made to FIG. 1, which is a simplified flowchart indicatingsteps in the operation of a system for automatic resource ownershipassignment, constructed and operative in accordance with a preferredembodiment of the present invention.

The term “ownership” is used throughout to designate authority andaccountability within an enterprise as distinct to legal ownership inthe normal sense of the word. “Ownership” of a data element, anorganization function, a resource, whether IT related or not, a service,a workflow or any other element in an enterprise designates authorityand accountability with respect thereto within the enterprise. Thedefinitions of “owner” and “owning” are of corresponding meaning.

The automatic folder ownership assignment system of FIG. 1 is preferablysuitable for operating in an enterprise computer network includingmultiple disparate clients, data storage elements, computer hardwareresources and computer software resources, and includes modify/writepermissions scrutinizing functionality, first pruning functionality,permissions scrutinizing functionality, second pruning functionality andtopmost folder scrutinizing functionality.

The modify/write permissions scrutinizing functionality ascertains whichfirst folders, among a first multiplicity of folders in an enterprisecomputer network, have at least one of modify and write permissions toentities other than IT administration entities, and adds the firstfolders to a list of base-folder candidates for ownership assignment.The first pruning functionality defines a second multiplicity offolders, which is a subset of the first multiplicity of folders thatdoes not include the first folders, all descendents of the first foldersand all ancestors of the first folders.

The permissions scrutinizing functionality ascertains which secondfolders among the second multiplicity of folders, have permissions toentities other than IT administration entities and adds the secondfolders to the list of base-folder candidates for ownership assignment.The second pnming functionality defines a third multiplicity of folderswhich is a subset of the second multiplicity of folders that does notinclude the second folders, all descendents of the second folders andall ancestors of the second folders.

The topmost folder scrutinizing functionality ascertains which thirdfolders among the third multiplicity of folders are topmost folders andadds the third folders to the list of base-folder candidates forownership assignment.

The automatic folder ownership assignment system also includes possibleownership assignment functionality for designating possible assignmentof ownership of at least one of the list of base-folder candidates.

As shown in FIG. 1, a list of base-folder candidates for ownershipassignment is preferably initialized (100). Thereafter, the folder treeof an enterprise computer network is preferably scrutinized (101) toidentify a first set of topmost folders, each of which first set havingat least one of modify and write permissions to entities other than ITadministration entities. Each of the first set of topmost folders isadded (102) to the list of base-folder candidates for ownershipassignment.

Subsequently, a second folder tree is defined (104) as a subset of thefolder tree of the enterprise from which the first set of topmostfolders, all descendents of each of the first set of topmost folders andall ancestors of each of the first set of topmost folders are removed.Thereafter, the second folder tree is preferably scrutinized (106) toidentify a second set of topmost folders, each of which second sethaving at least read permissions to entities other than ITadministration entities. Each of the second set of topmost folders isadded (108) to the list of base-folder candidates for ownershipassignment.

Subsequently, a third folder tree is defined (110) as a subset of thesecond folder tree from which the second set of topmost folders, alldescendents of each of the second set of topmost folders and allancestors of each of the second set of topmost folders are removed.Thereafter, the third folder tree is preferably scrutinized (112) toidentify a third set of topmost folders, and each the third set is added(114) to the list of base-folder candidates for ownership assignment.

Thereafter, for each folder in the list of base-folders, the systemidentifies entities who have been most active with regard to the folderand then recommends (116) that ownership of the folder of all descendentfolders thereof be assigned to one of the entities who have been mostactive with regard to the folder.

Reference is now made to FIG. 2, which is a simplified flowchartindicating steps in the operation of a system for automatic resourceownership assignment, constructed and operative in accordance withanother preferred embodiment of the present invention.

The automatic folder ownership assignment system of FIG. 2 is preferablysuitable for operating in an enterprise computer network includingmultiple disparate clients, data storage elements, computer hardwareresources and computer software resources, and includes actualmodification scrutinizing functionality, first pruning functionality,actual access scrutinizing functionality, second pruning functionalityand topmost folder scrutinizing functionality.

The actual modification scrutinizing functionality ascertains whichfirst folders, among a first multiplicity of folders in an enterprisecomputer network, have been at least actually modified by entities otherthan IT administration entities, and adds the first folders to a list ofbase-folder candidates for ownership assignment. The first pruningfunctionality defines a second multiplicity of folders, which is asubset of the first multiplicity of folders that does not include thefirst folders, all descendents of the first folders and all ancestors ofthe first folders.

The actual access scrutinizing functionality ascertains which secondfolders among the second multiplicity of folders, have been at leastactually accessed by entities other than IT administration entities andadds the second folders to the list of base-folder candidates forownership assignment. The second pruning functionality defines a thirdmultiplicity of folders which is a subset of the second multiplicity offolders that does not include the second folders, all descendents of thesecond folders and all ancestors of the second folders.

The topmost folder scrutinizing functionality ascertains which thirdfolders among the third multiplicity of folders are topmost folders andadds the third folders to the list of base-folder candidates forownership assignment.

The automatic folder ownership assignment system also includes possibleownership assignment recommendation functionality for designatingpossible assignment of ownership of at least one of the list ofbase-folder candidates.

As shown in FIG. 2, a list of base-folder candidates for ownershipassignment is preferably initialized (200). Thereafter, the folder treeof an enterprise computer network is preferably scrutinized (201) toidentify a first set of topmost folders, each of which first set havingbeen at least actually modified by entities other than IT administrationentities. Each of the first set of topmost folders is added (202) to thelist of base-folder candidates for ownership assignment.

Subsequently, a second folder tree is defined (204) as a subset of thefolder tree of the enterprise from which the first set of topmostfolders, all descendents of each of the first set of topmost folders andall ancestors of each of the first set of topmost folders are removed.Thereafter, the second folder tree is preferably scrutinized (206) toidentify a second set of topmost folders, each of which second sethaving been at least actually accessed by entities other than ITadministration entities. Each of the second set of topmost folders isadded (208) to the list of base-folder candidates for ownershipassignment.

Subsequently, a third folder tree is defined (210) as a subset of thesecond folder tree from which the second set of topmost folders, alldescendents of each of the second set of topmost folders and allancestors of each of the second set of topmost folders are removed.Thereafter, the third folder tree is preferably scrutinized (212) toidentify a third set of topmost folders, and each the third set is added(214) to the list of base-folder candidates for ownership assignment.

Thereafter, for each folder in the list of base-folders, the systemidentifies entities who have been most active with regard to the folderand then recommends (216) that ownership of the folder of all descendentfolders thereof be assigned to one of the entities who have been mostactive with regard to the folder.

Reference is now made to FIG. 3, which is a simplified flowchartindicating steps in the operation of a system for automatic resourceownership assignment, constructed and operative in accordance with yetanother preferred embodiment of the present invention.

The automatic folder ownership assignment system of FIG. 3 is preferablysuitable for operating in an enterprise computer network includingmultiple disparate clients, data storage elements, computer hardwareresources and computer software resources, and includes sensitivecontent scrutinizing functionality, first pruning functionality andtopmost folder scrutinizing functionality.

The sensitive content scrutinizing functionality ascertains which firstfolders, among a first multiplicity of folders in an enterprise computernetwork, comprise at least sensitive content, and adds the first foldersto a list of base-folder candidates for ownership assignment. Sensitivecontent may be, for example, confidential financial information orconfidential personal information. The first pruning functionalitydefines a second multiplicity of folders, which is a subset of the firstmultiplicity of folders that does not include the first folders, alldescendents of the first folders and all ancestors of the first folders.

The topmost folder scrutinizing functionality ascertains which secondfolders among the second multiplicity of folders are topmost folders andadds the second folders to the list of base-folder candidates forownership assignment.

The automatic folder ownership assignment system also includes possibleownership assignment recommendation functionality for designatingpossible assignment of ownership of at least one of the list ofbase-folder candidates.

As shown in FIG. 3, a list of base-folder candidates for ownershipassignment is initialized (300). Thereafter, the folder tree of anenterprise computer network is preferably scrutinized (301) to identifya first set of topmost folders, each of which first set includingsensitive content. Sensitive content may be, for example, confidentialfinancial information or confidential personal information. Each of thefirst set of topmost folders is added (302) to the list of base-foldercandidates for ownership assignment.

Subsequently, a second folder tree is defined (304) as a subset of thefolder tree of the enterprise from which the first set of topmostfolders, all descendents of each of the first set of topmost folders andall ancestors of each of the first set of topmost folders are removed.Thereafter, the second folder tree is preferably scrutinized (306) toidentify a second set of topmost folders, and each the second set isadded (308) to the list of base-folder candidates for ownershipassignment.

Thereafter, for each folder in the list of base-folders, the systemidentifies entities who have been most active with regard to the folderand then recommends (310) that ownership of the folder of all descendentfolders thereof be assigned to one of the entities who have been mostactive with regard to the folder.

It will be appreciated by persons skilled in the art that the presentinvention is not limited by what has been particularly shown anddescribed hereinabove. Rather, the invention also includes variouscombinations and subcombinations of the features described hereinaboveas well as modifications and variations thereof, which would occur topersons skilled in the art upon reading the foregoing and which are notin the prior art.

1. A system for automatic folder ownership assignment in an enterprisecomputer network, the system comprising: sensitive content scrutinizingfunctionality operative for ascertaining which first folders, among afirst multiplicity of folders in an enterprise computer network,comprise at least sensitive content, and adding said first folders to alist of base-folder candidates for ownership assignment; first pruningfunctionality operative for defining a second multiplicity of folders,said second multiplicity of folders being a subset of said firstmultiplicity of folders which does not include said first folders, alldescendents of said first folders and all ancestors of said firstfolders; topmost folder scrutinizing functionality operative forascertaining which second folders among said second multiplicity offolders are topmost folders and adding said second folders to said listof base-folder candidates for ownership assignment; and possibleownership assignment recommendation functionality operative forrecommending possible assignment of ownership of at least one of saidlist of base- folder candidates.
 2. A system for automatic folderownership assignment in an enterprise computer network according toclaim 1 and wherein said possible ownership assignment recommendationfunctionality comprises: functionality operative for recommendingpossible assignment of ownership of at least one of said list ofbase-folder candidates to an entity which has been most active withregard to said at least one of said list of base-folder candidates.
 3. Amethod for automatic folder ownership assignment in an enterprisecomputer network, the method comprising: maintaining a list ofbase-folder candidates for ownership assignment; ascertaining whichfirst folders, among a first multiplicity of folders in an enterprisecomputer network, comprise at least sensitive content, and adding saidfirst folders to said list of base-folder candidates for ownershipassignment; defining a second multiplicity of folders, said secondmultiplicity of folders being a subset of said first multiplicity offolders which does not include said first folders, all descendents ofsaid first folders and all ancestors of said first folders; ascertainingwhich second folders among said second multiplicity of folders aretopmost folders and adding said second folders to said list ofbase-folder candidates for ownership assignment; and recommendingpossible assignment of ownership of at least one of said list ofbase-folder candidates.
 4. A method for automatic folder ownershipassignment in an enterprise computer network according to claim 3 andwherein said recommending comprises: recommending possible assignment ofownership of at least one of said list of base-folder candidates to anentity which has been most active with regard to said at least one ofsaid list of base-folder candidates.