System for managing risk in employee travel

ABSTRACT

A system for managing risk in employee travel may notify affected users of the travel risk management system of the occurrence of a risk management event during travel. The travel risk management system may store geographic location information for a plurality of users of the travel risk management system, determine the occurrence of a risk management event, determine a geographic location of the risk management event and compare the geographic location of the risk management event to the stored geographic location information for the users. The system may execute a risk management event response in response to determining that a geographic location of at least one of the users is at the geographic location of the risk management event. The response may include transmitting a risk management event notification message to a portable computing device for each user located in the affected area.

TECHNICAL FIELD

This disclosure relates generally to risk management systems and, inparticular, to a travel risk management system for providing informationregarding domestic risk and risk in foreign countries, and for assistingtravelers upon the occurrence of a risk management event.

BACKGROUND

With the expansion and sophistication of commerce and technology,companies located in a particular country or countries are able toconduct business throughout the world. This business diversity includesentry into established and stable countries and into developingcountries were emerging markets present profitable opportunities forconducting business. These diverse countries and markets present equallydiverse cultures, social and economic conditions and climaticdifferences. Consequently, each country or market present differentchallenges and risks to which business travelers may be exposed and forwhich the travelers may not be aware or prepared.

Many aspects are present in the travel risk landscape in both developedand underdeveloped countries. Emerging markets present numerous safetyand medical challenges. As countries develop, widening social andeconomic divisions within the countries can feed increases in violentcrimes, including kidnapping for ransom and extortion. Terrorismcontinues to pose threats, with international travelers being within thetarget group for terrorist attacks. The nature of these crimes canresult in serious injuries and fatalities, long term mental healthproblems that may result from kidnapping or terrorism, loss of propertyand interruption of business activities.

In addition to medical incidents arising out of criminal activity, othermedical risks are present in international travel. Injuries andfatalities may be caused due to road and traffic conditions, and otherdeficiencies in the national infrastructure. Exposure of individuals toforeign agents can result in the contraction of diseases to which theindividuals are not immune. Plague and famine may also impactindividuals and business operations. Similarly, environmental conditionsand events such as earthquakes, hurricanes, tsunamis and floods canarise with minimal warning and cause devastation and loss of human lifeand property.

When sending employees out to work in international destinations,organizations may have a duty of care to ensure, as best as possible,the safety of its employees from these and other travel-related risks.The organization may have a responsibility to perform extensive riskassessments when expanding into emerging markets, and to monitorchanging threat levels where the employees are exposed to risk anddisseminate updated information in a timely and effective manner. Priorto travel, it may be desirable and prudent to prepare personneltraveling to countries having different risk profiles than their routineenvironments. These preparations may include educating the personnel oncultural awareness of issues relating to local religions and tribalcultures, male-female relations, meeting protocols and the like, ongeneral travel safety practices, and on general and immediate safety andwhether issues. The organization may also establish procedures to reactto travel-related incidents ranging from routine issues such as lostbaggage and travel documents to extraordinary circumstances such ascatastrophic weather events and acts of violence perpetrated againstorganizational personnel.

Currently, risk assessments, pre-travel preparation and education, andtravel-related incident response have been handled using traditionaltechnology and knowledge transfer techniques. The outcome of riskassessments may be memorialized in reports or presentations that maythen be conveyed to prospective business travelers at training seminarsor meetings with travel consultants. Developing situations increasingthe risk in a particular country may be communicated to travelingpersonnel via telephone or electronic mail messages, or, in some cases,the traveler may be left to refer to local media or the Internet for thelatest information on conditions within the country in which they aretraveling. These delays in the delivery of the relevant risk informationto an organization's traveling personnel may further increase the riskof being impacted by existing or developing conditions in the foreigncountry placed upon the personnel by the organization. For thesereasons, a need exists for an improved system for travel risk managementwherein organizations may be able to monitor the conditions in foreigncountries and the locations of their personnel in those countries, andto communicate information to the personnel in a timely manner foravoiding adverse impacts of developing high risk situations and forreacting quickly to travel-related incidents in order to mitigate theadverse impact on the organization's personnel and the disruption of theorganization's business.

SUMMARY OF THE DISCLOSURE

In one aspect of the present disclosure, the invention is directed to amethod for notifying affected users of a travel risk management systemof the occurrence of a risk management event during travel. The methodmay include storing geographic location information for a plurality ofusers of the travel risk management system, determining the occurrenceof a risk management event, determining a geographic location of therisk management event, comparing the geographic location of the riskmanagement event to the stored geographic location information for theusers, and executing a risk management event response in response todetermining that a geographic location of at least one of the users isat the geographic location of the risk management event.

In another aspect of the present disclosure, the invention if directedto a computer readable medium with computer executable instructions fornotifying affected users of a travel risk management system of theoccurrence of a risk management event during travel. The computerexecutable instructions may include instructions for storing geographiclocation information for a plurality of users of the travel riskmanagement system, determining the occurrence of a risk managementevent, determining a geographic location of the risk management event,comparing the geographic location of the risk management event to thestored geographic location information for the users, and executing arisk management event response in response to determining that ageographic location of at least one of the users is at the geographiclocation of the risk management event.

Additional aspects of the invention are defined by the claims of thispatent.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram of an employee travel risk managementsystem in accordance with the present disclosure;

FIG. 2 is a block diagram of a computing workstation that may operate inthe system of FIG. 1;

FIG. 3 is a block diagram of a portable computing device that mayoperate in the system of FIG. 1;

FIG. 4 is a system login page for a website application of the system ofFIG. 1;

FIG. 5 is a system home page for a website application of the system ofFIG. 1;

FIG. 6 is a portion of the system home page of FIG. 5 enlarged and witha country search window displayed;

FIG. 7 is an enlarged view of a world risk map area of the system homepage of FIG. 5;

FIG. 8 is the world risk map area of FIG. 7 with the continent of Asiaenlarged;

FIG. 9 is a first portion of a country information page for a websiteapplication of the system of FIG. 1;

FIG. 10 is a second portion of the country information page of FIG. 9;

FIG. 11 is an enlarged view of country features icons of the countryinformation page of FIG. 9;

FIG. 12 is a front view of a portable computing device displaying anactivation page of a mobile application of the system of FIG. 1;

FIG. 13 is a front view of a portable computing device displaying a homepage of the mobile application of the system of FIG. 1;

FIG. 14 is a front view of a portable computing device displaying a riskmap page of the mobile application of the system of FIG. 1;

FIG. 15 is a front view of a portable computing device displaying acountry information page of the mobile application of the system of FIG.1;

FIG. 16 is a front view of a portable computing device displaying a riskfactor page of the mobile application of the system of FIG. 1;

FIG. 17 is a front view of a portable computing device displaying adestination search page of the mobile application of the system of FIG.1;

FIG. 18 is a flow diagram of an employee travel monitoring routine ofthe system of FIG. 1;

FIG. 19 is a flow diagram of a risk management event response routine ofthe system of FIG. 1;

FIG. 20 is an overview page for an administrative application of thesystem of FIG. 1;

FIG. 21 is a portion of the overview screen of FIG. 20 enlarged and withan add new company window displayed;

FIG. 22 is a portion of the overview screen of FIG. 20 enlarged and withan edit company information window displayed;

FIG. 23 is a company overview page for an administrative application ofthe system of FIG. 1;

FIG. 24 is a portion of the company overview screen of FIG. 23 enlargedand with an activation code generation window displayed;

FIG. 25 is a portion of the company overview screen of FIG. 23 enlargedand with a distribute activation codes window displayed; and

FIG. 26 is a manage activation codes page for an administrativeapplication of the system of FIG. 1.

DETAILED DESCRIPTION

Although the following text sets forth a detailed description ofnumerous different embodiments of the invention, it should be understoodthat the legal scope of the invention is defined by the words of theclaims set forth at the end of this patent. The detailed description isto be construed as exemplary only and does not describe every possibleembodiment of the invention since describing every possible embodimentwould be impractical, if not impossible. Numerous alternativeembodiments could be implemented, using either current technology ortechnology developed after the filing date of this patent, which wouldstill fall within the scope of the claims defining the invention.

It should also be understood that, unless a term is expressly defined inthis patent using the sentence “As used herein, the term ‘_’ is herebydefined to mean . . . ” or a similar sentence, there is no intent tolimit the meaning of that term, either expressly or by implication,beyond its plain or ordinary meaning, and such term should not beinterpreted to be limited in scope based on any statement made in anysection of this patent (other than the language of the claims). To theextent that any term recited in the claims at the end of this patent isreferred to in this patent in a manner consistent with a single meaning,that is done for sake of clarity only so as to not confuse the reader,and it is not intended that such claim term be limited, by implicationor otherwise, to that single meaning. Finally, unless a claim element isdefined by reciting the word “means” and a function without the recitalof any structure, it is not intended that the scope of any claim elementbe interpreted based on the application of 35 U.S.C. §112, sixthparagraph.

FIG. 1 illustrates an embodiment of an employee travel risk managementsystem 10 in accordance with the present disclosure. The travel riskmanagement system 10 may have a centralized repository of informationrelating to cultural conditions, environmental forecasts and currentrisk conditions for the countries around the world that is accessible bylocal and remote users for assistance in planning and conducting travelto foreign countries. The system 10 may be implemented by anorganization for the assistance of its employees, or by a providerorganization, such as an insurance company, that may provide theinformation and make it available to its subscribing customers and theiremployees. In either implementation, the travel risk management system10 may include a centralized provider intranet 12 hosting theinformation of the travel risk management system 10 that may beconnected via a firewall 14 to a network 16, such as the Internet, toprovide connectivity for a plurality of remote users 18, 20 using remotecomputing devices 22, 24, 26, 28.

The provider intranet 12 may contain the components necessary for thehosting organization to input and store the information related to thetravel conditions in the various countries, to process the informationas necessary, and to exchange requests and information with the remoteusers 18, 20 over the network 16. The provider intranet 12 may include abusiness application server 30 hosting the application programs of thesystem 10, a database server 32 connected to the business applicationserver 30 and storing the travel condition information, and one or morelocal workstations 34 providing access for local users 36 to theapplications hosted by the server 30 and the information stored in thedatabase server 32. While only a single business application server 30and a single database server 32 are shown, it should be noted that thefunctionality of the servers 30, 32 may be implemented in one or morephysical servers with functions and date distributed across the serversas appropriate. For example, the business application server 30 mayconsist of a web application server providing content and processing forweb-based applications and a mobile application server for interactingwith mobile applications downloaded onto portable computing devices.Moreover, the data of the database server 32 may be distributed acrossmultiple servers and database. Those skilled in the art will understandadditional configurations of servers that may fall within the genericbusiness application server 30 and database server 32 illustrated anddiscussed herein.

The designation of components and users of the system 10 as being“local” or “remote” may be used to refer to the physical proximity ordistance between the components as well as a functional relationship ofthe components to the system 10. For example, a local user 36 may bedisposed within the same physical location as the business applicationserver 30 and database server 32 or at a remote location andcommunicating via the network 16, but may have authorization foraccessing and manipulating the data of the database server 32, performdatabase and application programming and maintenance operations, haveadministrative access for granting access for remote users 18, 20 of thesystem and the like. In contrast, the remote users 18, 20 may be grantedmore limited access to the travel risk information of the system 10whether they are communicating over the network 16 or from within thelocation of the servers 30, 32.

FIG. 2 illustrates an example of a suitable computing system workstation100 on which various components of the travel risk management system 10such as the remote computing devices 22, 24, servers 30, 32 and localworkstations 34, and the steps of the claimed method and apparatus, maybe implemented. Those skilled in the art will understand that thecomputing workstation 100 is only one example of a suitable computingworkstation and is not intended to suggest any limitation as to thecomposition of the components of the travel risk management system 10 orthe scope of use or functionality of the methods or apparatuses of theclaims. The computing workstation 100 should not be interpreted ashaving any dependency or requirement relating to any one or combinationof components illustrated in the exemplary workstation 100.

The steps of the claimed method and apparatus may be described in thegeneral context of computer-executable instructions, such as programmodules, being executed by a computer. Generally, program modulesinclude routines, programs, objects, components, data structures, etc.that perform particular tasks or implement particular abstract datatypes. The methods and apparatus may also be practiced in distributedcomputing environments where tasks are performed by remote processingdevices that are linked through a communications network. In adistributed computing environment, program modules may be located inboth local and remote computer storage media including memory storagedevices.

With reference to FIG. 2, the exemplary system for implementing thetravel risk management system 10, the steps of the claimed methods, andclaimed apparatuses may include the components 22, 24, 30, 32, 34implemented in a general purpose computing device in the form of acomputer 102. Components of computer 102 may include, but are notlimited to, a central processing unit (CPU) 104, a system memory 106,and a communication bus 108 coupling various system components includingthe system memory 106 to the CPU 104. The communication bus 108 may beany of several types of bus structures including a memory bus or memorycontroller, a peripheral bus, and a local bus using any of a variety ofbus architectures.

The computer 102 typically includes a variety of computer readablemedia. Computer readable media can be any available media that can beaccessed by computer 102 and includes both volatile and nonvolatilemedia, removable and non-removable media. By way of example, and notlimitation, computer readable media may comprise computer storage mediaand communication media. Computer storage media includes volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information such as computer readableinstructions, data structures, program modules or other data. Computerstorage media includes, but is not limited to, RAM, ROM, EEPROM, flashmemory or other memory technology, CD-ROM, digital versatile disks (DVD)or other optical disk storage, magnetic cassettes, magnetic tape,magnetic disk storage or other magnetic storage devices, or any othermedium which can be used to store the desired information and which canaccessed by computer 102. Communication media typically embodiescomputer readable instructions, data structures, program modules orother data in a modulated data signal such as a carrier wave or othertransport mechanism and includes any information delivery media. By wayof example, and not limitation, communication media includes wired mediasuch as a wired network or direct-wired connection, and wireless mediasuch as acoustic, RF, infrared and other wireless media. Combinations ofthe any of the above should also be included within the scope ofcomputer readable media.

The system memory 106 may include computer storage media in the form ofvolatile and/or nonvolatile memory such as read only memory (ROM) 110and random access memory (RAM) 112. The ROM 110 may contain the basicroutines that help to transfer information between elements within thecomputer 102, such as during start-up, is typically stored in the ROM110. The RAM 112 typically contains data and/or program modules that areimmediately accessible to and/or presently being operated on by CPU 104.By way of example, and not limitation, the RAM 112 may store theoperating system, application programs, other program modules andprogram data of the computer 102.

The computer 102 may also include other removable/non-removable,volatile/nonvolatile computer storage media. By way of example only,FIG. 2 illustrates the computer 102 including a non-volatile memoryinterface 114 connected to the communication bus 108 that may facilitatecommunications and data exchange with removable and/or non-removablecomputer storage media. Computer storage media connected to thenon-volatile memory interface 114 may include a hard disk drive 116 thatreads from or writes to non-removable, nonvolatile magnetic media, amagnetic disk drive 118 that reads from or writes to removable,nonvolatile magnetic disks (not shown), and an optical disk drive 120that reads from or writes to removable, nonvolatile optical disks (notshown) such as CD ROMs or other optical media. Other non-removablecomputer storage media that can be used in the exemplary operatingenvironment include, but are not limited to, solid state RAM, solidstate ROM, SDRAM, and the like, as well as removable memory media 121such as magnetic tape cassettes, flash memory cards, digital versatiledisks, digital video tape, solid state RAM, solid state ROM, SDRAM, andthe like. The drives and their associated computer storage mediadiscussed above and illustrated in FIG. 2, provide storage of computerreadable instructions, data structures, program modules and other datafor the computer 102. For example, the hard disk drive 116 may store allor a portion of the operating system of the computer 102, applicationprograms, other program modules, and program data. Note that thesecomponents can either be the same as or different from the operatingsystem, application programs, other program modules, and program datastored in the RAM 112 of the system memory 106.

A user may enter commands and information into the computer 102 throughvarious input devices that may be connected to the CPU 104 through auser input interface 122 that may be coupled to the communication bus108. Common input device may include a keyboard 124 and pointing device126, commonly referred to as a mouse, trackball or touch pad. Otherinput devices (not shown) may include a microphone with accompanyingvoice recognition software, joystick, game pad, satellite dish, scanner,or the like. These and other input devices may be connected to the CPU104 by other interfaces or bus structures, such as a parallel port, gameport or a universal serial bus (USB). The computer 102 may also includeperipheral output devices that may be connected to the CPU 104 by anoutput interface 128 connected to the communication bus 108. The outputdevices may include a monitor 130 or other type of video display devicesuch as a CRT display, LCD screen, plasma screen, touchscreen that mayhave an accompanying stylus, or any other appropriate video displaydevice. In addition to the monitor 130, the computer 102 may alsoinclude other peripheral output devices providing visual output ofinformation, such as a printer 132, audio output of information, such asspeakers 134, and other devices providing sensory perceptible output ofinformation from the computer 102.

The computer 102 may operate in a networked environment with the othercomponents of the travel risk management system 10 in the same locationand, depending on the implementation, in remote locations, using logicalconnections to one or more remote computers, such as a remote computer140. The remote computer 140 may be a personal computer, a server, arouter, a network PC, a peer device or other common network node, andtypically includes many or all of the elements described above relativeto the computer 102. The logical connections between the computer 102and the remote computer 140 depicted in FIG. 2 include a local areanetwork (LAN) 142 and a wide area network (WAN) 144, but may alsoinclude other networks. Such networking environments are commonplace inoffices, enterprise-wide computer networks, intranets and the Internet.

When used in a LAN networking environment, the computer 102 is connectedto the LAN 142 through a network interface 146 connected to thecommunication bus 108. When used in a WAN networking environment, thecomputer 102 typically may include a modem 148, or other means forestablishing communications over the WAN 144, such as the Internet. Themodem 148, which may be internal or external, may be connected to thecommunication bus 108 via the network interface 146, or otherappropriate mechanism. In a networked environment, program modulesdepicted relative to the computer 102, or portions thereof, may bestored at remote computers 140 and accessed via the LAN 142 or WAN 144connections. It will be appreciated that the network connections shownare exemplary and other means of establishing a communications linkbetween the computers may be used.

FIG. 3 shows functional components of an embodiment of the portablecomputing devices 26, 28 that may be used by the remote users of thetravel risk management system 10. The remote computing devices 26, 28may be PDAs or similar handheld devices, tablet PCs, cellulartelephones, smartphones or other device owned by the remote user 20 orprovided by the operator of the travel risk management system 10. Theportable computing devices 26, 28 may include a processor 150, a memory152, a display 154, a keyboard 156 or other pushbutton input devices anda communication bus 157 coupling the various system components of theportable computing devices 26, 28. The memory 152 generally includesboth volatile memory (e.g., RAM) and non-volatile memory (e.g., ROM,PCMCIA cards, etc.), and may include both non-removable and removablecomputer storage media such as, where appropriate, those described aboveor the computer 102, as well as SIM cards for cellular phones. Thedisplay 154 may be any portable computing device display, such as an LCDscreen, plasma screen, touchscreen with or without stylus or otherappropriate display device. An operating system 158 is resident in thememory 152 and executes on the processor 150. The portable computingdevices 26, 28 may include an operating system, such as the Windows® CE,Android and iOS operating systems or other operating systems.

One or more application programs 160 are loaded into memory 152 and runon the operating system 158. Examples of applications include emailprograms, scheduling programs, PIM (personal information management)programs, word processing programs, spreadsheet programs, Internetbrowser programs, and so forth along with the travel risk managementsystem applications discussed herein. The portable computing devices 26,28 may also have a notification manager 162 loaded in memory 152, whichexecutes on the processor 150. The notification manager 162 handlesnotification requests from the applications 160.

The portable computing devices 26, 28 may have a power supply 164, whichmay be implemented as one or more batteries or other internal powersource, such as hydrogen cells. The power supply 164 might further oralternatively include an external power source that overrides orrecharges the built-in batteries, such as an AC adapter or a powereddocking cradle.

The portable computing devices 26, 28 are also shown with three types ofexternal notification mechanisms: an LED 166, a vibration device 168,and an audio generator 170. These devices are directly coupled to thepower supply 164 so that when activated, they remain on for a durationdictated by the notification mechanism 162 even though the portablecomputing device processor 150 and other components might shut down toconserve battery power. The LED 166 preferably remains on indefinitelyuntil the user takes action. The current versions of the vibrationdevice 168 and audio generator 170 use too much power for today'sportable computing device batteries, and so they are configured to turnoff when the rest of the system does or at some finite duration afteractivation.

The portable computing devices 26, 28 may also contain communicationsconnection(s) 172 that allow the devices 26, 28 to communicate withother devices, such as the business application server 30.Communications connection(s) 172 is an example of communication media.Communication media typically embodies computer readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism and includesany information delivery media. By way of example, and not limitation,communication media includes wired media such as a wired network ordirect-wired connection, USB port, a serial port for connecting to aninterface cradle, and the like, and wireless media such as acoustic, RF,infrared and other wireless media. The term computer readable media asused herein includes both storage media and communication media.

The steps of the claimed methods and apparatuses are operational withnumerous other general purpose or special purpose computing workstationsor configurations. Examples of well known computing workstations,environments, and/or configurations that may be suitable for use withthe methods or apparatuses of the claims include, but are not limitedto, personal computers, server computers, handheld or laptop devices,implantable devices, multiprocessor systems, microprocessor-basedsystems, nanotechnology devices and/or systems, set top boxes,programmable consumer electronics, network PCs, minicomputers, mainframecomputers, distributed computing environments that include any of theabove systems or devices, and the like.

Computer and Web-Based Applications

The travel risk management system 10 functions to store and to provideusers with travel and risk information for the various countries aroundthe world. The stored information for each country can include, amongother things, general travel related information such as weatherforecast, time zone, local currency, other travel related services andinformation, embassy locations, and cultural information. The storedinformation may further include more specific information related totravel risks that may exist in the countries and advisory informationfor assisting with safe travel within the country. When the travel riskmanagement system 10 is implemented by a company for the use of itsemployees, access to the system 10 may be granted to the employeesthrough the security settings on the employees' login IDs for thecompany's main information system. When the travel risk managementsystem 10 is implemented by a provider and offered on a subscriptionbasis to companies for use by their employees, access to the system 10may be granted to the employees of the individual companies via acorporate login ID or individual activation codes as discussed furtherbelow wherein the subscribing companies and employees may be grantedvarying levels of access to the information in the travel riskmanagement system 10.

FIGS. 4-11 illustrate a series of pages that may be provided at awebsite of the travel risk management system 10 or other graphicalinterface program provided for subscribing companies and individualemployees at remote workstations 22, 24 and local workstations 34 of thesystem 10. When the website or interface program is initially accessedby a user, a login page 200 and shown in FIG. 4 may be displayed at theworkstation 22, 24, 34 at the monitor 130. The login page 200 mayinclude a company identification input box 202 at which the user mayenter the company's login identification information, such as thecompany name or assigned company ID, using an appropriate input device.After entering the company identification information in the box 202,the user may click a login button 204 to cause the companyidentification information to be transmitted to the business applicationserver 30 for verification and authorization for the user to accessinformation stored in the travel risk management system 10.

If the user enters valid customer identification information for asubscribing company, the system 10 may display a system home page 210 asshown in FIG. 5 that may assist the user in navigating to informationabout a country of interest or to other travel related informationstored in the system 10 for access by the users. Informationfunctionality provided on the home page 210 includes a watch list area212, a world risk map area 214, a newsletter update area 216 withhypertext links to current and earlier issues of newsletters providingtravel related information, and a current news area 218 with hypertextlinks to media outlets such as BBC News for travel related news articlesand current events.

The watch list area 212 may allow a user to readily determine countriesthat are high risk for travel, or that are becoming more risky. For eachcountry, the travel risk management system 10 may store a current riskrating and a risk trend for the country based on an analysis of manyfactors related to travel safety. These factors can include street crimeand serious crime, terrorism, civil unrest, regime instability, stateimpunity and corruptibility, espionage and armed conflict. The riskrating may also take into account geological and meteorological eventsand their effects on the country. The factors are weighed and overallrisk ratings and risk trends are assigned to each country.

In the illustrated embodiment, an exemplary rating system may includenumerical ratings from 1 to 5 as shown in the rating system informationarea 220 of the home page 210. In the illustrated rating system, a riskrating of 1 may indicate negligible travel risk in the country, 2 mayindicate low risk, 3 may indicate medium risk, 4 may indicate high riskand 5 may indicate severe risk. The risk ratings may also be color-codedto facilitate graphical illustration of the risk levels and rapididentification of countries with significant travel risk. Consequently,blue may correspond to negligible risk, green may correspond to lowrisk, yellow may correspond to medium risk, orange may correspond tohigh risk, and may correspond to severe risk. The above-described ratingsystem will be used herein for illustration, but those skilled in theart will understand that alternative rating systems may be implementedto assign risk levels along a scale from lowest risk to highest risk andto graphically illustrate assigned risk levels with numeric oralphanumeric characters, icons, color codes and the like, and suchsystems are contemplated by the inventors as having use in travel riskmanagement systems in accordance with the present disclosure.

A risk trend may also be assigned for each country to provide anindication of whether the risk level for the country is forecast toincrease, decrease or remain the same in the foreseeable future.Countries may be assigned an increasing risk trend due to internalfactors, such as growing civil unrest, and external factors, such ashigh-risk situations in adjacent countries that may impact surroundingcountries. Decreasing risk trends may be assigned when presentconditions are expected to stabilize, such as after the election of anew government. The risk trend may be neutral when the relevant factorsgenerally indicate that the conditions in the country are not expectedto change.

The assigned risk level and risk trend may be stored with other countryinformation at the database server 32 and retrieved by the businessapplication server 30 when a user accesses the home page 210. The watchlist area 212 of the home page 210 provides the user with a graphicalillustration of countries with significant travel risks, or increasingrisks for travelers. The watch list area 212 may include a severe riskcountry list 222, a high-risk country list 224, and an increasing riskcountry list 226. The severe risk country list 222 and the high-riskcountry list 224 may include the names of all the countries assignedrisk levels of 5 and 4, respectively. The increasing risk country list226 may include the names of all countries assigned an increasing risktrend. The lists 222, 224, 226 may be dynamically created each time thehome page 210 is loaded so that the most up-to-date risk assignments forthe corresponding countries are presented where the lists 222, 224, 226cannot fit within the space provided, the lists 222, 224, 226 may beprovided with scroll buttons 228 that may be clicked by the user toscroll up and down the lists 222, 224, 226 to see all of thecorresponding country names. Alternative mechanisms for displaying allcountry names in the lists 222, 224, 226 may be provided such as havinga larger window or display area displayed on the page 210 when thecursor is placed over a corresponding one of the lists 222, 224, 226. Ifthe user is interested in viewing additional information for one ofcountries appearing on one of the list 222, 224, 226 the watch list area212, the user may click on the corresponding country name to cause acountry information page to be displayed as will be described furtherbelow.

The home page 210 may provide additional mechanisms for assisting theuser in navigating to country information pages that are of interest.The home page 210 may include a destination speed dial button 230 thatmay allow the user to search for a country based on the first letter inthe country name. The home page 210 may be configured to detect thecursor being placed over the destination speed dial button 230 and torespond by displaying a country search window 232 as shown in FIG. 6.The country search window 232 may include an alphabetic keypad 234 and aprompt 236 instructing the user to choose a letter with which to filterthe country names. When the user moves the cursor and clicks on one ofthe letters, such as “A,” the names of the countries starting with theselected letter are displayed in the country search window 232. If thecountry of interest is shown in the country search window 232, the usermay click on the country name to be directed to the country informationpage. If the user does not find a country of interest, the user mayclick on a different letter to display a list of country names beginningwith the newly selected letter. When the cursor is moved out of thecountry search window 232, the window 232 may close so that the homepage 210 is redisplayed as shown in FIG. 5.

An additional mechanism for navigating to information on a country ofinterest may be provided in the world risk map area 214. When the homepage 210 is first displayed, the world risk map area 214 may display amap of showing all countries, with each country being shown in the colorcorresponding to the assigned risk level. As the cursor is moved overthe map area 214, the map area 214 may identify the continent or othergeographic grouping over which the cursor is positioned as shown in FIG.7. When the cursor is within the boundaries of the geographic grouping,the countries within the grouping may change from their individual risklevel colors to a uniform color, and a geographic groupingidentification window 238 may be displayed, such as the window 238indicating that the cursor is positioned over a country in Asia. Similarwindows 238 may be displayed for North America, South America, Europe,Africa and Oceania, or any other relevant geographic groupings that maybe defined in the system 10.

When the cursor is positioned over the geographic grouping of interestto the user in the world risk map area 214, clicking on the location maycause the map area 214 to zoom in on the geographic grouping to show thecountries of the grouping greater detail as shown in FIG. 8 and thecountries may again be shown in the colors corresponding to theirassigned risk levels. After the map area 214 is zoomed in, individualcountries may be highlighted as the cursor moves over the map area 214and is disposed within the boundaries of the country. The color of thecountry may change from the risk level color to a highlighting color,and a country identification window 240 may be displayed, such as thewindow 240 indicating that the cursor is positioned over Uzbekistan. Ifthe user is interested in viewing additional information for one ofcountries shown in the map area 214, the user may click on the countryto cause a country information page to be displayed in a similar manneras selecting one of the country names in the watch list area 212. Afterzooming in on the geographic grouping, the map area 214 may provideadditional navigation icons 242 allowing the user to zoom in and out toenlarge or reduce the scale of the map area 214, and to pan up and downand from side to side. The user may also be able to click and dragwithin the map area 214 to reposition the map and display a desiredgroup of countries. A return button 244 may also be provided with anassociated prompt message to allow the user to return the map area 214to the world map view.

Once the user selects a country of interest from the watch list area212, the world risk map area 214 or the country search window 232, theselection may cause the business application server 30 to retrieve theinformation for the selected country from the database server 32 anddisplay the information on a country information page 250 as shown inFIGS. 9-12. Referring to FIG. 9, an exemplary country information page250 is shown for the country of Uzbekistan. The country information page250 may include a country overview area 252, the rating systeminformation area 220 reproduced from the home page 210, a risk factorarea 254, a country map area 256, a travel information area 258, and aseries of country features icons 260 each providing specific informationrelevant to travel within the country. The country overview area 252 mayprovide general information regarding the country, the risk levelassociated with the country, and a brief description of thecircumstances causing the assignment of the risk level. The countryoverview area 252 may include a country name 262, a country flag icon264, a risk level icon 266 and a risk level description 268. The risklevel icon 266 may include the risk level number assigned to the countryand be filled in with the corresponding color, and a textual orgraphical in vacation of the risk trend assigned to the country. In theillustrated example, the oppositely facing arrows indicate that the risktrend for Uzbekistan is currently neutral such that the current risklevel of 3 is expected to be maintained. An upward facing arrow for therisk trend may indicate that the travel risk is increasing for thecountry, and a downward facing arrow may indicate that the travel riskfor the country is decreasing.

Specific reasons for the assigned risk level and risk trend may be setforth in the risk level description 268. Graphical indications of a risklevel associated with each of the risk factors used in determining theoverall risk level for a country may be provided in the risk factor area254. The various risk factors may be listed in the risk factor area 254along with corresponding risk factor icons 270 that may be similar inconfiguration to the risk level icon 266 for the country and indicate arisk level and a risk trend assigned to the risk factor in a similarmanner. The country map area 256 may show an enlarged portion of theworld map area 214 centered on the selected country, with the selectedcountry and the surrounding countries being color-coded to correspond totheir assigned risk levels. Similar to the world map area 214, theposition of the cursor within the country map area 256 may be detectedand a country identification window 272 may be displayed with the nameof the country over which the cursor is disposed. For the selectedcountry, a capital city indicator 274 may be displayed on the map at theappropriate location within the selected country, and the text withinthe country identification window 272 may change to the name of thecapital city (Tashkent) when the cursor is disposed at the capital cityindicator 274. The country map area 256 may also include a return toworld map button 276 that may be clicked by the user to return to thehome page 210 for selection of another country.

The travel information area 258 of the country information page 250 mayprovide additional textual information that may be helpful to the usersin managing their risk while in the particular country. A travelersituation brief area 278 may provide additional information regardingthe factors and circumstances causing a particular risk level to beassigned to the country. The area 278 may contain a general descriptionof the risks in the country, and more specific information relating toany of the risk factors identified in the risk factor area 254 aspresenting a high level of risk, such as the state impunity and statecorruptibility factors that present a severe level of risk in theillustrated embodiment. A cultural awareness area 280 is shown in FIG.10 may provide more general information regarding the local culture andcustoms in the country. The area 280 can include information relating toreligious customs, business and social customs, tribal cultures andhonor codes, and the like, that may be encountered during travel withinthe country. A safety advice area 282 may provide additional informationregarding best practices for ensuring traveler safety while in aparticular country. The safety advice may include suggestions as tohiring security or engaging security-trained drivers for travel withinthe country, safe lodging accommodations, effective emergency plans andcommunications arrangements and the like.

The country features icons 260 provide information related to specifictopics that are relevant to travel within the selected country. Thecountry features icons 260 are shown in greater detail in FIG. 11.Twelve specific icons 260 are shown in the illustrated embodiment, butmore or fewer icons 260 may be presented for a selected country as maybe necessary to convey the essential information to the user. A weathericon 284 may provide a brief indication of the current temperature andweather conditions in the country. The weather icon 284 may also includea button 286 that may be clicked to cause a weather detail window 288 tobe displayed with additional information such as an extended forecastfor weather conditions in the country. The weather detail window 288 maydisplay additional weather forecast information, including contentprovided by a third-party weather service. Each of the country featuresicons 260 may include similar functionality to provide a basic level ofinformation on the icon and additional information in a window that maybe displayed by clicking on a corresponding button of the icon.Consequently, a time zone icon 290 displaying the local time relative toGreenwich Mean Time may have a corresponding window that displays thecurrent Greenwich Mean Time and the current local time. A currency icon292 may provide a conversion between the user's currency in the currencyof the selected country, and a currency window may provide additionalinformation on the local currency of the selected country as well asinformation regarding the availability of credit and debit cards andATMs, and the acceptance of Travelers Cheques within the country.

A connectivity icon 294 and accompanying window may provide the userwith information relating to the type of power available for use withelectronic devices and the dialing code for making telephone calls intothe country. An emergency numbers icon 296 and the corresponding windowmay provide telephone numbers and other contact information for police,ambulance, fire and rescue services. The telephone numbers may includeboth landline and mobile emergency numbers and general telephoneavailability information. An immigration and customs icon 298 may open awindow providing visa requirements and other requirements for enteringand exiting the country, along with a list of items that are prohibitedfrom being brought into the country. A health icon 300 and correspondingwindow may provide health-related information such as vaccinationrequirements, a listing of diseases to which travelers may be exposedwhile traveling within the country, and information on water sanitationwith suggestions for avoiding known health risks presented by the watersupply.

A transport icon 302 may open a window providing information regardingtravel into and out of the country as well as travel within the country.A listing of airports within the country may be provided, along withdescriptions of the availability and logistics of traveling viarailways, buses, taxis, subways and other modes of transportation. Awindow associated with an embassy icon 304 may provide a list withcontact details for the embassies for various other countries that arelocated within the selected country. The information for the embassiesmay include the addresses, telephone numbers, e-mail contact informationand business hours of operation. A culture icon 306 and correspondingwindow may provide cultural information such as the language spoken inthe country, the religions practiced within the country, and holidayscelebrated in the country during the year. A window corresponding to amedia icon 308 may provide a listing of newspapers, radio stations,websites and magazines that may be available within the selected countryin the user's native language. Finally, a travel advisory icon 310 andassociated window may provide links to travel advisory webpages offeredby the governments of other countries that may have travel relatedinformation for the selected country.

Mobile Applications

The information available in the travel risk management system 10 mayalso be provided to remote users 20 accessing the system 10 via portablecomputing devices 26, 28. FIGS. 12-17 illustrate a series of pages thatmay be provided in a mobile application (mobile app) of the travel riskmanagement system 10 that may be downloaded and installed on theportable computing devices 26, 28 and used by the remote user 20. Theportable computing device 26 in the form of a smart phone is illustratedin the drawing figures. However, those skilled in the art willunderstand that similar pages and functionalities may be provided byapplications at other types of portable computing devices.

Once the mobile app is installed at the device 26, an icon for themobile app may appear on a screen 350 of the device 26 and allow theuser to launch the mobile app by tapping the icon. The first time themobile app is launched after installation on the device 26, the mobileapp may cause the screen 350 to display an activation page 400 asillustrated in FIG. 12. The activation page 400 may provide fields forentry of information necessary to identify the user and to verify thatthe user is authorized to access the travel risk management system 10.Consequently, the activation page 400 may provide a first name field402, a last name field 404, a company identification field 406, ane-mail address field 408, a telephone number field 410, and anactivation code field 412. For each companies subscribing to the travelrisk management system 10, the company may be assigned a unique companyidentification code and each employee of the company to which access tothe system 10 is provided may be assigned a unique activation code.After the information is entered into the fields 402-412, the user maytap an activate now button 414 to cause the mobile app to execute a userauthorization routine to verify that the company identification andactivation code combination entered by the user match a record found atthe database server 32. If the combination is valid, the mobile app maystore the information entered in the fields 402-412 at the device 26,and may forward the information to the business application server 30for storage at the database server 32, for authorization verificationduring subsequent launches of the mobile app and for use in variousaspects of the functionality described hereinafter.

The users may be restricted in the number of portable devices 26 onwhich an activation code may be used. In such implementations, a counteron the activation code record at the database server 32 may beincremented to reflect the actuation of this additional device. If thecounter is less than or equal to the limit, the system 10 may allowactivation of the mobile app on the device 26. If the user has alreadymet the limit on activations, the system 10 may deny the user theability to activate the mobile app on this device 26.

If the user enters a valid company identification and activation codecombination, the mobile app may cause the device 26 to display a mobileapp home page 420 at the screen 350. The home page 420 may facilitatenavigation by the user through the functionality provided by the mobileapp. In the illustrated embodiment, icons on the home page 420 allow theuser to access the desired functionality. In this example, the home page420 includes a risk map icon 422, a travel safety icon 424, andembassies icon 426, a watch list icon 428, a destination search icon430, a resources icon 432, a media icon 434, a settings icon 436, and asystem provider information icon 438. The home page 420 may also have acurrent news box 440 that may provide the user with travel relatedheadlines from around the world. The box 440 may have arrows allowingthe user to scroll back and forth through the headlines, and the mobileapp may load the complete news story on the page 420 when the user tapsthe displayed headline in the box 440.

Tapping the risk map icon 422 on the home page 420 may cause the mobileapp to load a risk map page 450 as shown in FIG. 14. The risk map page450 may provide a world map 452 similar to the list area 214 of the homepage 210, with the countries having colors corresponding to theirassigned risk levels. A rating system information box 454 of the riskmap page 458 may provide a cross-reference of the risk levels and theircorresponding colors for use by the user in determining the risk levelassigned to the countries on the world map 452. The mobile app may alsoprovide a menu option for alternating the world map 452 between a mapview of the countries and a satellite view. The user may enlarge orreduce the risk map 452 by touching the screen 350 in the mannercommonly used for enlarging and reducing page content in operatingsystems for portable computing devices with touchscreens. The world map452 may be further enhanced by providing graphical pushpins (not shown)for each of the countries having the risk level number assigned to thecountry, the corresponding risk color or both.

When the country or pushpin is tapped by the user, the mobile app maycause a window to be displayed on the screen 350 containing the countryname, the risk level assigned to the country, the risk trend for thecountry and an arrow that may be tapped to display a country informationpage 460 as shown in FIG. 15. The information displayed in the countryinformation page 460 may be similar to that presented in the countryinformation page 250 of the web-based application. Consequently, thecountry information page 460 may display the country name, flag, a risklevel description for the country and a risk level icon 462 having therisk level number and corresponding color along with an indication ofthe risk trend for the country. Tapping the risk level icon 462 maycause a risk factor page 463 is shown in FIG. 16 that may list thevarious risk factors with corresponding risk factor icons indicating arisk level and a risk trend assigned to each risk factor used indetermining the overall risk factor for the country.

Returning to FIG. 15, the page 460 may also include country featuresicons 464 similar to the icons 260 of the page 250 and maybe displayedsuch that the user may scroll left and right through the icons 464 tofind an icon corresponding to the desired information. In addition tothe weather, local time, currency, emergency numbers, and immigrationand customs icons shown in FIG. 15, additional icons for embassies,health information, transportation, culture, native language media,connectivity and foreign travel advisories may be provided and displayedas a user scrolls from side to side through the icons 464. For each ofthe icons 464, the user may tap the icon to have a window displayed orhave a corresponding page displayed with similar information asdescribed above for the icons 260. The country information page 460 mayfurther include a traveler situation brief button 466, a culturalawareness button 468, and a safety advice button 470 that when tapped bythe user may lead to corresponding pages providing similar informationas that shown in the areas 278-282, respectively, of the countryinformation page 250.

The travel safety icon 424 on the home page 420 of FIG. 13 may cause atravel safety page to be displayed on the screen 350 with general travelsafety information for various aspects of travel planning and conductthat are applicable to most countries. The travel safety icon 424 mayalso provide an alternative path for navigating to a country's safetyadvice page than using the risk map page 450 to select a country andthen tap the safety advice button 470 on the country information page460. The travel safety page may include a country search icon that maybe tapped by the user to cause a country listing page to be displayed.Selection of a country from the country listing page may cause thecountry's safety advice page to be displayed in the same way as tappingthe safety advice button 470 of the country information page 460.

The embassies icon 426 on the home page 420 of FIG. 13 may cause anembassy locator page (not shown) to be displayed allowing user to selecta country and have a list of embassies for the selected country orwithin the selected country to be displayed. The embassy locator pagemay allow the user to tap an icon to elect to view a list of embassiesfor a selected country located in other countries. After electing toshow embassies for a selected country, a listing of countries may bedisplayed allowing the user to select one or more countries, or allcountries, for which to view their embassies. After the country orcountries are selected, a list of the embassies for the country orcountries located around the world may be displayed. The embassy locatorpage may also allow the user to tap another icon to elect to view a listof embassies of other countries located within a selected country orcountries. A similar listing of countries may be displayed allowing theuser to select one or more countries having other countries' embassieslocated therein. After selecting the countries, a list of embassieslocated within the countries may be displayed. Each embassy list mayinclude the associated location and contact information for each embassyin the list. The embassy listing may be integrated with thefunctionality of the operating system to automatically dial a telephonenumber of an embassy when a telephone number is tapped by the user, orto access a navigation application to provide directions from the user'scurrent location to an embassy. The embassy listing page may alsoprovide an icon or menu option to switch to a map view on which thelocations of the embassies are identified by pushpins or other graphicalsymbols that can be selected to have the information from thecorresponding embassies displayed on the screen 350.

The watch list icon 428 of the home page 420 may allow user to viewlists of countries having significant travel risks or likely to havesignificant travel list in the future similar to the watch list area 212of the home page 210. When the watch list icon 428 is tapped by theuser, a watch list page (not shown) may be displayed with a severe riskicon, a high-risk icon and an increasing risk icon. When one of theicons is tapped by the user, a list of all countries having thecorresponding risk level or increasing risk trend may be displayed onthe screen 350. The user may scroll up and down the displayed lists andselect one of the countries for displaying its country information, withthe mobile app responding by displaying the corresponding countryinformation page 460 of the selected country.

The destination search icon 430 on the home page 420 may allow a user tonavigate to the country information page 460 for a country via analphabetical listing of countries. The user tapping the destinationsearch icon 430 may cause a destination search page 480 to be displayedon the screen 350 as shown in FIG. 17. The destination search page 480may provide an alphabetical listing of countries along with an icon orother graphical information indicating the risk level and risk trendassigned to each country. A search field 482 may be provided to allowthe user to narrow the displayed list of countries by entering theinitial letter or letters of the country name. As each letter is enteredinto the search field 482, the list of country names may be narroweduntil the user sees a particular country of interest and selects thecountry to display the corresponding country information page 460. As analternative for narrowing the displayed list of countries, thedestination search page 480 may include a letter search area 484 listingthe letters of the alphabet. Tapping one of the letters in the lettersearch area 484 may narrow the list of displayed countries to thosebeginning with the letter tapped by the user. Tapping a different letterbase which the list to display of countries beginning with the newlytapped letter.

The resources icon 432 of the home page 420 may be selected by a user todisplay links to travel related service organizations. A resources page(not shown) may include travel security links for homeland security,travel unsafe advice pages and weather services, health and safety linkstwo organizations such as the Red Cross and the WHO, and links to otherutilities such as currency converters, translators and ATM locators. Themedia icon 434 of the home page 420 may be selected to cause a mediapage (not shown) to be displayed containing information such as date,time, headlines and news sources for one or more countries that may bespecified in user settings in a manner described more fully below. Thedisplayed headlines on the media page may be tapped by the user to causethe source article to be displayed on the screen 350.

The settings icon 436 may navigate the user to a page wherein the usermay select and enter personal information to customize functionalityprovided in the mobile app. Tapping the settings icon 436 may cause asettings page to be displayed on the screen 350 that may allow the userto specify information such as their nationalization, passportinformation, frequent flyer numbers, countries to be saved in the memory152 of the device 26, and for which to display news on the media page,and other travel related information. For each type of information, thesettings page may provide an icon that may be selected by the user tocause a display of a corresponding data entry page for inputting theuser's information. For example, a nationality icon may cause a list ofcountries to be displayed from which the user may select one countrycould be the user's home country. With the user's nationality specified,the mobile app may use the home country, for example, in determining themonetary unit to use for currency conversions and for default embassyselections in the embassy selection routine. Passport information andfrequent flyer number icons may navigate to windows or pages allowingthe user to enter their passport information and information for one ormore frequent flyer programs in which the user participates. A show newsicon may provide a page (not shown) allowing the user to specify one ormore countries for which media information will be displayed when theuser taps the media icon 434. Additional icons and corresponding displaypages may be provided to allow users to input additional personalinformation that may be used to customize the various functions of themobile app to their needs.

User Location Tracking and Risk Management Event Response Applications

An important aspect of managing risks to which employees may be exposedis maintaining information on the location of the employees duringtravel and being able to quickly disseminate information to them whenrisk management events occur. The present risk management system 10provides employers and risk managers with the facilities to monitor anemployee's planned and actual locations during travel, and to respond tothe occurrence of a risk management event and execute a risk managementresponse strategy to provide required information and other resources tothe employees when risk management events occur in their area.

FIG. 18 illustrates a flow diagram for an employee location monitoringroutine 500 in accordance with the present disclosure. The routine 500may begin at a block 502 wherein a travel itinerary for an employee maybe input into the system 10 and stored therein. The input method andstorage location may vary based on the particular implementation of thesystem 10. In one embodiment, an employee's itinerary may be received bya local user 36 and input at a local workstation 34, and stored by thebusiness application server 30 in a database of employee locations anditineraries at the database server 32. The user 36 may receive theitinerary via e-mail or other means of delivery and input the itineraryand employee information via an itinerary entry page (not shown). Asimilar entry page at a remote workstation 22, 24 or portable computingdevice 26, 28 may allow remote users 18, 20 to input itineraries andhave the information transmitted over the network 16 and stored at thedatabase server 32. In additional embodiments, the system 10 may beintegrated with third-party reservation systems such that itinerariesmay be transmitted to the business application server 30 when travelscheduled, and an itinerary loading routine may interpret the itineraryand load the information for the employee into the database server 32.Regardless of the input method, additional functionality may also beprovided to update the information stored in the database server 32 whenchanges are made to the employee's itinerary. The stored information mayinclude employee identification information, dates of travel, city andcountry of travel, flight information, hotel information, contact phonenumbers including cell phone number, e-mail addresses and the like.

The itinerary information provides the risk management system 10 withexpected locations of the employee during particular time periods.However, travel arrangements can change during a trip, and a travelitinerary is not necessarily updated to reflect in-trip variations.Consequently, the system 10 may provide alternative mechanisms forupdating an employee's actual location during travel. At a block 504,the risk management system 10 may determine the actual location of anemployee during travel. In one embodiment, the business applicationserver 30 may be configured to ping the cell phone of a travelingemployee during the trip to cause cell phone to respond with theemployee's current location. At scheduled intervals, and employeelocation routine 500 may query the employee itineraries stored at thedatabase server 32 for a list of employees currently scheduled to betraveling. For each employee, the business application server 30 maytransmit a location request message to the employee cell phone numberstored in the database server 32. When the location request message asreceived at the cell phone, the mobile app of the system 10 on the cellphone may format a location response message containing identifyinginformation for the employee, such as an employee ID number or cellphone number, the company identification and activation code assigned tothe employee, and geographic location information such as GPScoordinates, a postal code or the like. The cell phone may then transmitthe location response message back to the business application server 30over the network 16. Upon receiving the location response message, theemployee location routine 500 may compare the actual location of theemployee from the location response message to the location on theitinerary stored at the database server 32 at a block 506. If the actuallocation matches the expected location of the employee from theitinerary, employee is traveling according to the itinerary, no updatesto the database server 32 are necessary and control may return to theblock 504 for subsequent employee location checks at a later time. Ifthe employee's actual location is different from the expected location,control may pass to a block 508 where the employee location routine 500may update the employee's itinerary stored at the database server 32 toreflect the employee's current actual location.

The above logic may apply where the employees travel as planned and anitinerary may be available for storage in the database server 32. Insome situations, however, employee travel may be unplanned and/or thetravel itinerary may not be available for storage and tracking of theemployee. For these situations, it may be necessary to implementalternative mechanisms for storing the employee's location, and inparticular where the employee travels to high-risk locations. In oneembodiment, the risk management system 10 may have functionality toconstantly monitor the employee's location to be able to determine whichemployees are in a location when a risk management event occurs. Atblock 504, the employee location routine 500 may be configured to sendthe location request message to all employees, and not just to thosewith stored itineraries. When the location response messages arereceived from the cell phones of employees having stored itineraries,the employee location routine 500 may compare the actual location of theemployee to the expected itinerary location at block 506 as discussedabove. For location response messages from cell phones of employeeswithout itineraries, the employee location routine 500 may handle themessage in various ways depending on the particular implementation ofthe risk management system 10. In some implementations, the currentlocation of employees may be constantly monitored and stored, and thelocation from the response message may be used to update the employee'srecord on the database server 32. In other implementations, the system10 may only track employees that are in high-risk (level 4 or 5) areas,and the record in the database server 32 may only be updated when thelocation response message contains a location within a high-riskcountry. Location response messages indicating locations in low-riskcountries may be ignored or discarded by the employee location routine500 unless the currently stored employee location is within a high orsevere risk country, in which case the location in the low risk countrymay be substituted in the database server 32 for the employee.

As an alternative to the server-initiated location updates that requireboth a request message from the business application server 30 and aresponse message from the employee's cell phone, the travel riskmanagement system 10 may perform cell phone-initiated updates. Logic maybe provided in the mobile app of the risk management system 10 to causethe cell phone to automatically transmit a location message with thecurrent location of the cell phone at specified times or upon theoccurrence of specified triggering events. In one embodiment, the mobileapp may be programmed to cause cell phone to transmit location messagesat predetermined intervals such as hourly or daily, or more or lessfrequently, regardless of the employee's location or any other activity.The cell phone may also, or as an alternative, transmit a locationmessage when an event occurs, such as the employee launching the mobileapp or turning on the cell phone. Upon receipt of the location messageat the business application server 30, the location may be processed inan appropriate way, such as through one of the processes describedabove. In an alternative embodiment, the mobile app may store the travelitinerary for the employee traveler and transmit location messagesduring a scheduled trip, or compare the employee's actual location tothe expected location on the itinerary, and transmit location messagesonly when the employee deviates from the trip itinerary. In a furtheralternative, the mobile app may store the country information and risklevel information at the cell phone, and transmit the location messageto the business application server 30 only when the employee istraveling in a high or severe risk country. At regular intervals or uponthe occurrence of a triggering event, the mobile app may check the risklevel for a country in which the cell phone is located and transmit thelocation message when the employee is in a high or severe risk country.

Turning to FIG. 19, with the database server 32 populated with currentlocations of the employees, the risk management system 10 may beconfigured with a risk management event response routine 510 enablingthe system 10 to respond to risk management events occurring incountries where employees are located. At a block 512, the riskmanagement system 10 may determine the occurrence of a risk managementevent, such as a political uprising, invasion, earthquake, tsunami,hurricane or other meteorological event, and the like. The riskmanagement event may be detected by the risk management system 10 viainterfaces with global or local emergency response systems, lawenforcement agencies, news agencies, and the like, or the riskmanagement event may be input into the system 10 by a system user 18,20, 36 upon the occurrence of the event. The information for the riskmanagement event may include the geographic location of the event. Thedetection of the risk management event may trigger a risk managementresponse to the event. At a block 514, the risk management eventresponse routine 510 may query the database server 32 for employeeshaving actual and/or scheduled locations in geographic proximity to therisk management event. The search may be performed for all locationswithin the country of the event or within a specified distance from theevent. Depending on an anticipated duration of the risk management eventand after effects of the event, the routine may perform a prospectivesearch of the stored itineraries for employees scheduled to travel intothe area of the risk management event within a specified time in thefuture. Where the locations of employees traveling in high and severerisk countries are stored, employees may be notified when riskmanagement events occur in countries where issues are expected. Wherelocations for all employees are stored by the risk management system 10,the ability may exist to notify employees traveling in low-riskcountries where risk management events occur without advanced warning.

If no employees are determined to be in, or soon to enter, the affectedlocation at block 514, it may not be necessary to transmit eventnotifications, and control may return to the block 512 for the riskmanagement system 10 to continue monitoring the occurrence of subsequentrisk management events. If employees are found to be in the area of therisk management event, control may pass to a block 516 wherein the riskmanagement event response routine may execute a risk management eventresponse. The characteristics of the risk management event response mayvary based on the type of event that has occurred. At a minimum, theresponse may include transmitting an event notification message to thecell phones of the employees in the affected area via SMS messaging,electronic mail or other electronic means, with an alert regarding theevent, and other information such as the status of the event, theexpected duration of the event, emergency contact information andevacuation routes. For weather related events, the event notificationmessage may include embedded content from third-party providers withcurrent conditions and future forecasts.

The message transmitted to the employee cell phone may be informationalonly, or may require a response. For example, the mobile app may beconfigured to respond to the event notification message with anautomatic reply containing the employee's identification or activationcode and location. The event notification message may also require anemployee initiated response message to acknowledge the employees receiptof the event notification message. Upon receipt of the response message,the risk management event response routine may note the acknowledgmentby the employee and maintain lists of employees that have not respondedto the initial event notification message. For employees that do notrespond, subsequent follow-up messages may be transmitted to theemployee's cell phone, or to local authorities for notification of theemployee's lack of response, or other measures for determining thestatus of the non-responding employees may be. The response strategy mayalso include transmitting information regarding the employees in theaffected area to local resources that may assist in locating theaffected employees, such as local offices of the company, local lawenforcement and emergency responders, government embassies in thecountry and the like. Additional functionality for responding to therisk management event in support of the employees in the area of therisk management event will be apparent to those skilled in the art, andare contemplated by the inventors as having use in risk managementsystems in accordance with the present disclosure.

In one embodiment, the determination of a risk management event at block512 may be provided by an employee that may be victimized by the eventor in the immediate vicinity of the event and in a position to notifythe operators of the system 10 about the event. The mobile app may beconfigured to allow the employee to communicate information about theevent and their location to the business application server 30 byproviding a panic button icon (not shown) on the mobile app home page420. Upon the occurrence of a risk management event, tapping the panicbutton icon may cause the mobile app to format alarm message andtransmit the alarm message to the business application server 30. Thealarm message may include information identifying the employee and theirlocation, and an indication that the message is an alarm message.

The mobile app may transmit the alarm message immediately, or beconfigured to allow the employee provide addition information about therisk management event and the employee's status. When the panic buttonicon is tapped, the mobile app may display a panic button informationpage (not shown) providing fillable fields or other input features. Forexample, the panic button information page may provide check boxes, pulldown boxes and the like with selection options for various types of riskmanagement events that may have occurred. Such events may include streetor violent crimes, terrorist incidents, meteorological or geologicalevents and the like. The panic button page may provide additional inputoptions for allowing the employee to indicate their status after theevent, such as injuries that may have been inflicted, property taken ordamaged, business disruption and the like. After entering the necessarystatus information, the employee may tap a transmit icon (not shown)that may cause the mobile app to add the specified status information tothe alarm message and transmit the alarm message to the businessapplication server 30. Upon receiving the alarm message at the server30, the risk management event response routine 510 may execute the riskmanagement event response at block 516. The specific event response maybe based, at least in part, on the information contained in the alarmmessage.

Administrative Application

As discussed above, in various portions of the functionality of thesystem 10, access to the web applications and mobile apps may be grantedto users with valid client identification codes, activation codes orcombinations thereof, and functionality of the system 10 may be drivenoff of information stored within the system 10 for the logged in users.In implementations of the system 10 where the system 10 is hosted by aprovider and client companies subscribe to the provider for access tothe available functionality, multiple levels of security andauthorization may be provided to ensure only authorized users obtainaccess to the system 10 while also distributing the responsibility forthe authorization process among multiple participants. In oneimplementation of the system 10, a first overarching or superadministrative access level, hereinafter referred to as a super adminuser, may exist at the system provider level with the authority toestablish accessibility to the system 10 for the subscriber companies,and a second company administrative access level, hereinafter referredto as a client admin user, may exist at the client company level withthe authority to grant authority for use of the system 10 to individualemployees of the client company.

Each super admin user may be assigned a username and password havingauthority to access administrative applications of the travel riskmanagement system 10. After the super admin user navigates to the URLfor an administrative application of the system 10 and logs into theadministrative application at one of the workstations 22-28, 34, thebusiness application server 30 may cause an administrative overview page600 as shown in FIG. 20 to be displayed at the workstation. Theadministrative overview page 600 may provide the super admin user with alisting of all existing clients entered into the system 10 and anoverview of the associated licensing information for the client company.The company level information may include the company name, a companyidentification code that may be assigned by the super admin user or bythe administrative application when the company is input, indications ofthe total number of activation codes that may be assigned for thecompany, the number of activation codes that have been assigned and arein use, and the number of available activation codes that have not beenassigned and have not expired, and an indication of the status of thecompany as being active or inactive. The administrative overview page600 may have an inactivate button 602 and an activate button 604 thatmay allow the super admin user to change the authorization status of thecompany. Active status for the client company may allow the client adminusers for the company to generate, distribute and manage licenseactivation codes as described more fully below. Inactive status anddeactivation of the client company may deny the client admin users theability to generate, distribute manage license activation codes, but maynot affect the use of activation codes that have already been generatedand distributed to employees of the client company.

The administrative application may provide the super admin user with theability to add new client companies and company administrators to thesystem 10 by providing an add new company button 606 and an add newcompany administrator button 607 on the administrative overview page600. Clicking one of the buttons 606, 607 may cause an add new companywindow 608 to be displayed over the administrative overview page 600 asshown in FIG. 21. The add new company window 608 may provide prompts andcorresponding fields for inputting the basic information for a newcompany such as company name, company contact name, address and othercontact information. The contact name may be the primary contact for thecompany, but may or may not be assigned as a client admin user. Where anadditional company administrator is being added for an existing company,the super admin user may input the name of the existing company in thecorresponding field of the add new company window 608.

The add new company window 608 may also allow the super admin user toestablish a first package of activation codes that may be assigned toemployees of the company. For inputting the necessary information forthe activation codes, the add new company window 608 may include anumber of activation codes prompt 610, a package effective date prompt612 and a package renewal date prompt 614, along with correspondinginput fields 616-620. As the name suggests, the number of activationcodes field 616 may allow the super admin user to specify the number ofactivation codes that may be assigned in the initial package. The superadmin user may specify the earliest date in which the activation codeswill allow the employees of the company to access the system 10 in thepackage effective date field 618, and a date at which access via theactivation codes of the package will cease if the company does not renewa subscription for the system 10 in the package renewal date field 620.

After the information for the company is input on the add new companywindow 608, the super admin user may click a save and continue button622. In response, the administrative application may cause the businessapplication server 30 to generate a customer identification number for anew company, and to add a company record for the new company at thedatabase server 32. For an existing company, the information for the newcompany administrator may be added to the company's record in thedatabase server 32. At this time, the business application server 30 mayalso assign a package number for the requested activation codes andstore the package number, the number of activation codes, and effectiveand renewal dates for the activation code package with the customerinformation at the database server 32 for later use by the super adminuser or client admin user in assigning activation codes to employees ofthe company as described more fully below. The administrativeapplication may also cause an e-mail message to be sent to the companycontact/client admin user with login credentials for the contact to beable to log into the system 10 with authority to perform client adminuser functions as described more fully below.

After the super user clicks the save and continue button 622, the addnew company window 608 may close and the administration overview page600 of FIG. 20 may be activated to show the list of subscribingcompanies. The newly added company may now be displayed in a companylist 630 with information including the assigned company identificationnumber 632, the company name 634, the total activation codes 636 for thecompany, the number of used activation code 638 and the number ofavailable activation codes 640. After setup of the new company, andbefore activation codes are assigned to employees of the company, thetotal activation codes 636 and the number of available activation codes640 are initially set to the number of activation codes specified duringthe add new company process, and the number of used activation codes 638is set to zero.

When contact information for the company changes or when additionalactivation codes need to be generated, the super admin user may click onan edit icon 642 for the customer on the administrative overview page600. Clicking on the edit icon 642 may cause an added company window 644to be displayed over the administrative overview page 600 is shown inFIG. 22. The edit company window 644 may display the company name andthe current contact information currently stored in the database server32 for the subscribing company. The edit company window 644 may allowthe super admin user to edit any of the company contact information withthe exception of the company name. The edit company window 644 may allowthe super admin user to create a new package of activation codes for thecompany by clicking on a create new package checkbox 646, and filling inthe total number of activation codes to create, and the effective andrenewal dates for the activation codes, in the corresponding fields ofthe edit company window 644. After entering the information, the superadmin user may click on an update button 648 to cause the administrativeapplication to have the business application server 30 make thenecessary updates to the company record stored at the database server 32and, if specified, to create a new package of activation codes for thecompany.

After the super user clicks the update button 648, the edit companyinformation window 644 may close and the administration overview page600 of FIG. 20 may be reactivated. With the company entered into thesystem and activation codes authorized for use by the company'semployees, super admin user and client admin user may be able togenerate and distribute activation codes to the employees. From theadministration overview page 600, a super admin user may click on acompany name from the list of company names 634 to cause a companyoverview page 650 as shown in FIG. 23 to be displayed. For a clientadmin user, the company overview page 650 may be the initial page thatis displayed after the client admin user logs into the administrationapplication of the travel risk management system 10. Consequently, boththe super admin user and the client admin users may have access to allof the functionality relating to the generation and distribution of theactivation codes, and these users will be generically referred to as“admin users” in the following discussion where appropriate.

The company overview page 650 provides a summary of information for thesubscribing company, including an activation code summary area 652, acompany contact details area 654, and an activation code package list656. The activation code summary area 652 may list the total number ofactivation codes assigned to the company, the number of activation codesthat have been generated, the number of activation codes available forassignment to employees, a number of activation codes currently in use,and an indication of the percentage of the available activation codesthat are currently in use. The summary may assist the admin user indetermining whether it may be necessary to request authorization foradditional activation codes from a super admin user. The company contactdetails area 654 may list the information input by the super admin userat the add new company window 608 and/or the edit company informationwindow 644.

The activation code list 656 may provide details for each of theactivation code packages that have been created for the subscribingcompany. The list entry for each activation code package may include thepackage number, the total number of activation codes allocated to thecompany in the package, the number of activation codes of the packagethat have been generated, the number of available activation codes, thenumber of activation codes in use, the remaining number of activationcodes that can be generated for the package, and the activation andexpiration dates for the activation codes of the package. A particularnumber of activation codes may be allocated to a package when a superadmin user creates the package via the add new company window 608 or theedit company information window 644, but the activation codes may notactually be generated until the activation codes are needed forassignment to the employees by an admin user.

The admin user may click on an activation code generate button 658 toinitiate an activation code generation process of the administrativeapplication. Clicking on the button 658 may cause the administrativeapplication to display an activation code generation window 660 on thecompany overview page 650 as shown in FIG. 24. The activation codegeneration window 660 may allow the admin user to generate activationcodes for one of the available activation code packages. The activationcode generation window 660 may provide a drop-down box 662 for selectingthe activation package number from which to generate the activationcodes, and a code number input field 664 for specifying the total numberof activation codes to be generated from the selected activation packagenumber. After the activation package number is selected, the activationcode generation window 660 may be updated to display the activationexpiration dates for the selected package. The admin user may also beable to elect to have the generated activation codes downloaded to adata file, such as an Excel spreadsheet or other data file, by clickinga download checkbox 666 and/or to have the activation codes e-mailed tothe admin user's e-mail address by clicking an e-mail check box 668.

After the information is input on the activation code generation window660, the admin user may click a generate button 670. In response, theadministrative application may cause the business application server 30to generate the number of activation codes specified by the admin userin the input field 664 and store the activation codes at the databaseserver 32 for later distribution to employees of the company by theadmin user as described more fully below. The activation codes may begenerated using a systematic routine, a random number generationroutine, or any other appropriate algorithm or strategy for generatingunique codes for use in user verification and authorization. Thestatistics for the activation code package may also be updated by addingthe number of newly generated activation codes to the number ofactivation codes generated and the number of activation codes available,and subtracting the number from the number of activation codes to begenerated. If the download checkbox 666 is checked, the administrativeapplication may create a data file containing the newly generatedactivation codes and associated information for the subscribing companyand the activation package. The data file may be downloaded to theworkstation 22-28, 34 at which the admin user is logged on, or toanother storage location such as a network drive that may be designatedby the admin user for storage of the data file. If the e-mail box 668 ischecked, the administrative application may also generate and transmitan e-mail message containing the generated activation codes to the adminuser that is generating the activation codes.

After the activation code generation process is initiated by clickingthe generate button 670, the activation code generation window 660 maybe closed and the company overview page 650 of FIG. 23 may bereactivated. The company overview page 650 may be refreshed so that theinformation provided in the activation code summary area 652 and theactivation code list 656 is updated to reflect the generation of the newactivation codes. Consequently, the number of activation codes generatedand available in the area 652 and list 656 may increase, while the usagerate and number of activation codes to be generated may decrease.

With the activation codes generated and available for assignment is tothe employees of the company, the admin user may initiate an activationcode distribution process by clicking on a distribute activation codesbutton 672 on the company overview page 650. In one embodiment where theactivation codes were generated and downloaded to a data file, thedistribute button 672 may cause a distribute activation codes window 674to pop up as shown in FIG. 25. The window 674 may provide a data filename field 676 in which the admin user may specify a file path andfilename for a data file containing the activation codes to bedistributed to employees of the company. The data file may be an updatedversion of the data file downloaded during the activation codegeneration process, or a user generated data file, and may contain theactivation codes to be distributed along with corresponding informationfor the employees to which the activation codes will be distributed,such as the employee's name, e-mail address, contact telephone number,job identification information, and the like. The admin user may typethe path and file name in the data file name field 676, or may use abrowse button 678 to use a directory to find a data file. If desired fornotification purposes, the admin user may click on a checkbox 680 tohave e-mails generated and distributed to the users identified in thedata file with a notification of the activation code to which they havebeen assigned and instructions for accessing the travel risk managementsystem 10.

After the data file is specified, the admin user may click on a bulkdistribute button 682 of the distribute activation code window 674 tocause the administrative application to upload the designated data fileto the business application server 30. The administrative applicationmay cause the business application server 30 update the records storedat the database server 32 for each of the activation codes with theemployee information from the file. If the e-mail check box 680 waschecked by the admin user on the distribute activation code window 674,the business application server 30 may also format and transmit e-mailmessages to all the employees in the data file containing the assignedactivation code and any other information and instructions necessary forthe employee to login to the travel risk management system 10, such asby entering the required information into the fields 402-412 of themobile app application window 400 of FIG. 12 as described above.

Use of a data file for the bulk assignment and distribution of theactivation codes to company employees may be one mechanism for assigninggenerated activation codes to employees provided in the system 10. Theadministrative application may provide additional functionality forassigning and monitoring the activation codes for a company. The companyoverview page 650 of FIG. 23 may include a manage activation codesbutton 684 that may be clicked by the admin user to cause a manageactivation codes page 690 such as that shown in FIG. 26 to be displayed.The manage activation codes page 690 may display a list 692 of theactivation codes 694 that have been generated for the company, alongwith the identification information for employees that have beenassigned to the various activation codes 694. As discussed above, thesystem 10 may limit the number of devices 26 on which the mobile app maybe activated using an assigned activation code. The list 692 may includean activation code uses column 695 providing the number of actual usesof the activation code by the employee and the total number of usesallowed for the activation code. If the actual uses are less than theallowed uses, the employee can activate the mobile app on additionaldevices 26. If the actual uses equal the allowed uses, the employee hasmaxed out the number of devices on which the mobile app may beactivated.

By default, the list 692 may include all of the activation codesgenerated for the company. The administrative application may also allowthe admin user to view particular subsets of the activation code 694.The page 690 may provide an in-use button 696 that when clicked by theadmin user may cause the list 692 to only display the activation codesthat have been assigned to employees, and an available button 698 thatmay be clicked to show only the activation codes that do not have anassigned employee in the list 692. A show all button 700 may eliminateany filtering and again show all activation codes generated for thecompany in the list 692 when the button 700 is clicked. Additionalfiltering options may be provided for showing only activation codes ofinterest to the admin user in the list 692, such as filtering byapplication code number ranges, employee names and e-mail addresses,employee job description information, and the like as will be apparentto those skilled in the art.

The manage activation codes page 690 may allow the admin user to performvarious management tasks on the displayed activation codes 694 for thecompany. When the admin user identifies an activation code 694 on whichan action may be performed, the admin user may click on a correspondingcheckbox 702 to select the activation code. Once selected, the adminuser may click on an edit button 704 to allow the user to edit theinformation for the activation code either by activating thecorresponding employee information fields in the list 692 for editing,or by opening an activation code edit window (not shown) that mayprovide editable fields for the information associated with theactivation code. The admin user may update the information as necessary,which may include entering employee information for an activation codethat was not previously assigned, or updating the employee informationfor a previously assigned activation code, and then click on acorresponding update button to cause the administrative application tohave the business application server 30 update the information stored inthe database server 32 for the activation code.

The manage activation codes window 690 may also provide the admin userwith the ability to disable and re-enable one or more of the activationcodes 694 to further manage employee access to the system 10. Afterselecting one or more activation codes 694 by clicking on thecorresponding checkbox(es) of 702, the admin user may click a disablebutton 706 to cause the administrative application to update the statusof selected activation code(s) 694 stored with the activation coderecord in the database server 32 to prevent the activation code frombeing used to access the system 10. The status may be shown in the list692, and an additional enable button (not shown) may be provided on thepage 690 to re-enable activation codes that may have previously beendisabled. The page 690 may provide additional functionality forgenerating and transmitting e-mail messages to employees to whichactivation codes 694 have been assigned via an e-mail button 708 thatmay generate and transmit notification e-mail messages to employees in asimilar manner as described above for the bulk distribution processusing data files.

While the preceding text sets forth a detailed description of numerousdifferent embodiments of the invention, it should be understood that thelegal scope of the invention is defined by the words of the claims setforth at the end of this patent. The detailed description is to beconstrued as exemplary only and does not describe every possibleembodiment of the invention since describing every possible embodimentwould be impractical, not impossible. Numerous alternative embodimentscould be implemented, using either current technology or technologydeveloped after the filing date of this patent, which would still fallwithin the scope of the claims defining the invention.

What is claimed is:
 1. A method for notifying affected users of a travelrisk management system of an occurrence of a risk management eventduring travel, the method comprising: storing travel itineraryinformation for each user of a plurality of users of the travel riskmanagement system, wherein the travel itinerary information of each userincludes user identification information, travel date information for atravel time period in which the respective user is traveling, andgeographic location information for at least one destination of therespective user during the travel time period; determining, by aprocessor of a computing device, the occurrence of the risk managementevent, a geographic location of the risk management event, and ananticipated duration of the risk management event; determining, by theprocessor, whether a future destination of the at least one destinationof one or more users of the plurality of users has a geographic locationthat corresponds with the geographic location of the risk managementevent and the respective travel time period for the future destinationis within a time period from a current time to the anticipated durationof the risk management event; determining, by the processor, whether apresent destination of the at least one destination of at least one userof the plurality of users at the current time has a geographic locationcorresponding to the geographic location of the risk management event;and executing, by the processor, a risk management event response inresponse to determining that the present destination or futuredestination of a subset of the plurality of users corresponds to thegeographic location of the risk management event during the anticipatedduration of the risk management event, wherein executing the riskmanagement event response comprises causing transmission of a riskmanagement event notification message from a business application serverof the travel risk management system to a respective portable computingdevice of each respective user of the subset of users, receiving a riskmanagement event notification response message from the respectiveportable computing device of one or more users of the subset of users atthe business application server, wherein the risk management eventnotification response message contains user identification informationfor the respective user, updating, for each user of the one or moreusers, respective user information stored at a database server of thetravel risk management system with an indication of the receipt of therisk management event notification response message in response toreceiving the respective risk management event notification responsemessage, and receiving a notification, at the business applicationserver, regarding at least one user of the subset of users who has notresponded to the risk management event notification message, whereinrespective user identification information including contact informationfor each user of the at least one user of the subset of users isaccessible via the business application server.
 2. The method of claim1, wherein determining the occurrence of the risk management eventcomprises receiving input information for the risk management event froma user at a computing device of the travel risk management system. 3.The method of claim 1, wherein determining the occurrence of the riskmanagement event comprises receiving risk management event informationfrom an emergency response system external to the travel risk managementsystem at the business application server of the travel risk managementsystem.
 4. The method of claim 1, wherein determining that thegeographic location of the future destination or the present destinationcorresponds with the geographic location of the risk management eventcomprises determining that the geographic location of the futuredestination or the present destination is within the boundaries of asame country as the geographic location of the risk management event. 5.The method of claim 1, wherein determining that the future destinationor the present destination corresponds with the geographic location ofthe risk management event comprises determining that the the futuredestination or the present destination is within a predetermineddistance from the geographic location of the risk management event. 6.The method of claim 1, wherein the travel itinerary information isstored in a user location database of the travel risk management system.7. The method of claim 1, further comprising determining, by theprocessor responsive to receiving the notification regarding the atleast one user who has not responded, a status of the at least one user.8. The method of claim 7, wherein determining the status of the at leastone user comprises causing notification of local authorities regardingeach user of the at least one user.
 9. The method of claim 1, whereindetermining the occurrence of the risk management event comprisesreceiving a user event notification message containing risk managementevent information from a portable computing device of a user of thetravel risk management system.
 10. The method of claim 9, wherein theuser event notification message includes user identification informationfor the user, geographic location information and risk management eventtype information.
 11. A non-transitory computer readable medium withcomputer executable instructions stored thereon for notifying affectedusers of a travel risk management system of the occurrence of a riskmanagement event during travel, wherein the computer executableinstructions, when executed by a processor, cause the processor to:store travel itinerary information for each user of a plurality of usersof the travel risk management system, wherein the travel itineraryinformation of each user includes user identification information,travel date information for a travel time period in which the respectiveuser is traveling, and geographic location information for at least onedestination of the respective user during the travel time period;determine the occurrence of the risk management event, a geographiclocation of the risk management event, and an anticipated duration ofthe risk management event; determine whether a future destination of theat least one destination of one or more users of the plurality of usershas a geographic location that corresponds with the geographic locationof the risk management event and the respective travel time period forthe future destination is within a time period from a current time tothe anticipated duration of the risk management event; determine whethera present destination of the at least one destination of at least oneuser of the plurality of users at the current time has a geographiclocation corresponding to the geographic location of the risk managementevent; and execute a risk management event response in response todetermining that the present destination or future destination of asubset of the plurality of users corresponds to the geographic locationof the risk management event during the anticipated duration of the riskmanagement event, wherein executing the risk management event responsecomprises causing transmission of a risk management event notificationmessage from a business application server of the travel risk managementsystem to a respective portable computing device of each respective userof the subset of users, receiving a risk management event notificationresponse message from the respective portable computing device of one ormore users of the subset of users at the business application server,wherein the risk management event notification response message containsuser identification information for the respective user, updating userinformation stored at a database server of the travel risk managementsystem with an indication of the receipt of the risk management eventnotification response message in response to receiving the riskmanagement event notification response message, and receiving anotification, at the business application server, regarding at least oneuser of the subset of users who has not responded to the risk managementevent notification message, wherein respective user identificationinformation including contact information for each user of the at leastone user of the subset of users is accessible via the businessapplication server.
 12. The non-transitory computer readable medium ofclaim 11, wherein determining the occurrence of the risk managementevent comprises receiving input information for the risk managementevent from a user at a computing device of the travel risk managementsystem.
 13. The non-transitory computer readable medium of claim 11,wherein determining the occurrence of the risk management eventcomprises receiving risk management event information from an emergencyresponse system external to the travel risk management system at thebusiness application server of the travel risk management system. 14.The non-transitory computer readable medium of claim 11, whereindetermining that the geographic location of the future destination orthe present destination corresponds with the geographic location of therisk management event comprises determining that the geographic locationof the future destination or the present destination is within theboundaries of the same country as the geographic location of the riskmanagement event.
 15. The non-transitory computer readable medium ofclaim 11, wherein determining that the geographic location of the futuredestination or the present destination corresponds with the geographiclocation of the risk management event comprises determining that thegeographic location of the future destination or the present destinationis within a predetermined distance from the geographic location of therisk management event.
 16. The non-transitory computer readable mediumof claim 11, wherein the travel itinerary information is stored in auser location database of the system.
 17. The non-transitory computerreadable medium of claim 11, wherein determining the occurrence of therisk management event comprises receiving a user event notificationmessage containing risk management event information from a portablecomputing device of a user of the travel risk management system.
 18. Thenon-transitory computer readable medium of claim 17, wherein the userevent notification message includes user identification information forthe user, geographic location information and risk management event typeinformation.
 19. The non-transitory computer readable medium of claim11, wherein the instructions, when executed by the processor, furthercause the processor to determine, responsive to receiving thenotification regarding the at least one user who has not responded, astatus of the at least one user.
 20. The non-transitory computerreadable medium of claim 19, wherein determining the status of the atleast one user comprises causing notification of local authoritiesregarding each user of the at least one user.