In a method and arrangement for control of the access to sensitive data stored in a first apparatus a first user of a first apparatus is notified of an access by the second apparatus to sensitive data stored in the first apparatus, and the notification is transmitted to the second apparatus. A first unique identification of the first user is requested by the first apparatus. A second unique identification of a second user of the second apparatus by the second apparatus. A check of the constellation (acquired via the requests) of the first and second users is made using a predetermined association file, the association file associating one or more allowed second users with each first user. Enablement of access of the second apparatus to the sensitive data stored in the first apparatus is prevented when the check of the association establishes an allowed constellation of first and second users. Access of the second apparatus to the sensitive data stored in the first apparatus is prevented when the check of the association establishes no allowed constellation of first and second users or access of the second apparatus to the sensitive data stored in the first apparatus has not been declared by the first user.

 
Web www.patentalert.com

< Deploying and receiving software over a network susceptible to malicious communication

> Method and apparatus for applying locale behaviors to regions of a form

> System and method for the composition, generation, integration and execution of business processes over a network

~ 00553