Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
CLOUD BASED PLATFORM FOR MANAGING LICENSES
Document Type and Number:
WIPO Patent Application WO/2023/132976
Kind Code:
A1
Abstract:
A compliance management system includes a processor, a personal information database, and executable instructions. The instructions include a dashboard module to receive personal information related to a licensee and store it in the database, a document request module that automatically retrieves a license form from a website or remote database, a document preparation module configured to identify each field within the license form and map that field to corresponding information in the database, a document generation module to retrieve the mapped information and it in corresponding fields of the license form to generate a completed form, and an overflow module to identify a field within the selected license form with insufficient capacity to accommodate the requested information and to generate an attachment for the license form including the requested information exceeding the capacity of that field.

Inventors:
OLTYAN CHRIS (US)
NEIL BEN (US)
MERJANIAN ISABELLA (US)
MCKNIGHT TIMOTHY SEAN (US)
Application Number:
PCT/US2022/073077
Publication Date:
July 13, 2023
Filing Date:
June 22, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
REBRIC INC DBA COMPLIABLE (US)
International Classes:
G06F40/166; G06Q10/10; G06Q10/06
Foreign References:
US8364604B12013-01-29
US20060200754A12006-09-07
US8965868B22015-02-24
US8984393B22015-03-17
KR20150021161A2015-03-02
Attorney, Agent or Firm:
HOYER MCCARTHY, William T. et al. (US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1. A compliance management system comprising: one or more processors; a personal information database; and a non-transitory computer-readable storage medium storing instructions, wherein the instructions, when executed by the one or more processors, cause the one or more processors to provide a plurality of functional modules including: a dashboard module configured to receive personal information related to a licensee, and to store the personal information in the personal information database; a document request module configured to automatically retrieve a license form from a website or remote database, wherein the license form comprises a plurality of fields; a document preparation module configured to identify each field within the license form and map that field to corresponding information for the licensee within the personal information database; a document generation module configured to retrieve the mapped information for each field within the license form for the selected licensee from the information storage unit and to place the retrieved requested information in corresponding fields of the license form to generate a completed form; and an overflow module to identify a field within the selected license form with insufficient capacity to accommodate the requested information from the information storage unit and to generate, based on a user input, an attachment for the license form including, for the identified field, the requested information exceeding the capacity of that field.

2. The system of claim 1, further comprising instructions to cause the one or more processors to provide a submit module configured to transmit the completed form and the attachment to a licensing authority.

24

3. The system of any of claims 1-2, further comprising instructions to cause the one or more processors to provide a refresh module configured to, when personal information for the licensee stored in the personal information database is altered, repopulate the form using the populate module and resubmit the form using the submit module.

4. The system of any of claims 1-3, wherein the dashboard module is configured to receive personal information related to a licensee through a single application form displayed on a display, wherein the personal information is entered with a keyboard and a pointing device.

5. The system of any of claims 1-4, further comprising instructions to cause the one or more processors to provide: an encryption module configured to encrypt the personal information stored in the personal information database; and a decryption module configured to decrypt the personal information retrieved from the personal information database.

6. The system of any of claims 1-5, wherein the personal information related to the licensee includes an image.

7. The system of any of claims 1-6, wherein the personal information database is a nosql database.

8. The system of any of claims 1-7, wherein the personal information database is cloudbased.

9. The system of any of claims 1-8, wherein the license module is configured to retrieve at least one license form of a plurality of different license forms.

10. The system of any of claims 1-9, further comprising instructions to cause the one or more processors to provide a user interface comprising: an employee portal configured to accept first user inputs regarding a selected employee; a compliance officer portal configured to accept second user inputs regarding at least one of a new employee, a plurality of new employees, an existing employee, an employee type, or a business contact.

11. The system of claim 10, wherein the first user inputs comprise at least one of personal information, personal statements information, license information, license history information, employee tags, or notes.

12. The system of any of claims 10-11, wherein the second user inputs comprise at least one of: a name of the employee type; a selection of forms associated with the employee type; employee information associated with an employee, the employee information comprising personal information, personal statements information, license information, license history information, employee tags, or notes; or business contact information associated with a business contact, the business contact information comprising name, contact information, business address, or mailing address.

13. A method comprising: receiving personal information related to a licensee, and storing the personal information in the personal information database; automatically retrieving a license form from a website or remote database, wherein the license form comprises a plurality of fields; identifying each field within the license form and map that field to corresponding information for the licensee within the personal information database; and retrieving the mapped information for each field within the license form for the selected licensee from the information storage unit; generating a completed form, including placing the retrieved requested information in corresponding fields of the license form.

14. The method of claim 13 further comprising: identifying a field within the selected license form with insufficient capacity to accommodate the requested information from the information storage unit and generating, based on a user input, an attachment for the license form including, for the identified field, the requested information exceeding the capacity of that field.

15. The method of claim 14 further comprising: transmitting the completed form and the attachment to a licensing authority.

16. The method of any of claims 13-15, further comprising: accepting first user inputs regarding a selected employee, wherein the first user inputs comprise at least one of personal information, personal statements information, license information, license history information, employee tags, or notes; accepting second user inputs regarding at least one of a new employee, a plurality of new employees, an existing employee, an employee type, or a business contact.

17. The method of claim 16, wherein the second user inputs comprise at least one of: a name of the employee type; a selection of forms associated with the employee type; employee information associated with an employee, the employee information comprising personal information, personal statements information, license information, license history information, employee tags, or notes; or business contact information associated with a business contact, the business contact information comprising name, contact information, business address, or mailing address.

18. A computer program product having a non-transitory computer readable medium tangibly recording computer program logic for managing license application compliance, the computer program product comprising: code to receive personal information related to a licensee, and to store the personal information in the personal information database; code to automatically retrieve a license form from a website or remote database, wherein the license form comprises a plurality of fields;

27 code to identify each field within the license form and map that field to corresponding information for the licensee within the personal information database; and code to retrieve the mapped information for each field within the license form for the selected licensee from the information storage unit and to place the retrieved requested information in corresponding fields of the license form to generate a completed form. computer program product of claim 18 further comprising: code to identify a field within the selected license form with insufficient capacity to accommodate the requested information from the information storage unit and to generate, based on a user input, an attachment for the license form including, for the identified field, the requested information exceeding the capacity of that field. computer program product of claim 19 further comprising: code to transmit the completed form and the attachment to a licensing authority. ethod comprising: receiving personal information related to a licensee, and storing the personal information in a personal information database; automatically retrieving a license form that comprises a plurality of fields; identifying each field of the plurality of fields, including mapping a first field to corresponding personal information within the personal information database; retrieving the corresponding personal information; and generating a completed form, including placing the corresponding personal information in the first field of the license form.

28

Description:
CLOUD BASED PLATFORM FOR MANAGING LICENSES

TECHNICAL FIELD

[0001] The subject matter described herein relates to a method for collecting applicant data required for license applications and populating that data into license application forms. This method has particular but not exclusive utility for the gambling industry.

BACKGROUND

[0002] The concept of filling out forms using stored data (e.g., autofill) is known, and used for example in web payments and other applications. However, such systems may expose user data in unencrypted forms, and may not be broadly applicable to multiple types of forms, or to the mass-submission of forms for multiple users.

[0003] Applying for gaming licenses can be a time- intensive and labor-intensive process, particularly when multiple individuals (e.g., multiple employees of an online gaming site) need to apply simultaneously for gaming licenses in multiple states or jurisdictions. In such cases, similar but not identical data must be entered into multiple forms, for multiple users. Existing autofill solutions are not effective in such applications. Accordingly, long-felt needs exist for systems that address the forgoing and other concerns.

[0004] The information included in this Background section of the specification, including any references cited herein and any description or discussion thereof, is included for technical reference purposes only and is not to be regarded as subject matter by which the scope of the disclosure is to be bound.

SUMMARY

[0005] Disclosed is a compliance management system which includes methods and/or devices for capturing data and translating that data to appropriate fields across a variety of different forms, for example to streamline the process of applying for gaming licenses. The system allows to fill in personal data on a standardized form. The system collects and stores this data securely in an encrypted format, translates the collected data to the appropriate forms required to acquire the licenses, and constructs a packet of all required forms that will contain the latest information available, and then deletes unencrypted personal data from memory. The compliance management system disclosed herein has particular, but not exclusive, utility for creating and submitting gaming (e.g., gambling) licenses for multiple users.

[0006] A system of one or more computers can be configured to perform particular operations or actions by virtue of having software, firmware, hardware, or a combination of them installed on the system that in operation causes or cause the system to perform the actions. One or more computer programs can be configured to perform particular operations or actions by virtue of including instructions that, when executed by data processing apparatus, cause the apparatus to perform the actions. One general aspect includes a compliance management system that includes one or more processors; a personal information database; and a non-transitory computer-readable storage medium storing instructions. The instructions include: a dashboard module configured to receive personal information related to a licensee, and to store the personal information in the personal information database; a document request module configured to automatically retrieve a license form from a website or remote database, where the license form includes a plurality of fields; a document preparation module configured to identify each field within the license form and map that field to corresponding information for the licensee within the personal information database; a document generation module configured to retrieve the mapped information for each field within the license form for the selected licensee from the information storage unit and to place the retrieved requested information in corresponding fields of the license form to generate a completed form; and an overflow module to identify a field within the selected license form with insufficient capacity to accommodate the requested information from the information storage unit and to generate, based on a user input, an attachment for the license form including, for the identified field, the requested information exceeding the capacity of that field. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.

[0007] Implementations may include one or more of the following features. In some embodiments, the system further including a submit module configured to transmit the completed form and the attachment to a licensing authority. In some embodiments, the system further included a refresh module configured to, when personal information for the licensee stored in the personal information database is altered, repopulate the form using the populate module and resubmit the form using the submit module. In some embodiments, the dashboard module is configured to receive personal information related to a licensee through a one-page application form displayed on a display, where the personal information is entered with a keyboard and a pointing device. In some embodiments, the system further includes: an encryption module configured to encrypt the personal information stored in the personal information database; and a decryption module configured to decrypt the personal information retrieved from the personal information database. In some embodiments, the personal information related to the licensee includes an image. In some embodiments, the personal information database is a NOSQL database. In some embodiments, the personal information database is cloud-based. In some embodiments, the license module is configured to retrieve at least one license form of a plurality of different license forms. Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium.

[0008] One general aspect includes a method. The method includes receiving personal information related to a licensee, and storing the personal information in the personal information database; automatically retrieving a license form from a website or remote database, where the license form includes a plurality of fields; identifying each field within the license form and map that field to corresponding information for the licensee within the personal information database; and retrieving the mapped information for each field within the license form for the selected licensee from the information storage unit and to place the retrieved requested information in corresponding fields of the license form to generate a completed form. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.

[0009] Implementations may include one or more of the following features. In some embodiments, the method further included: identifying a field within the selected license form with insufficient capacity to accommodate the requested information from the information storage unit and generating, based on a user input, an attachment for the license form including, for the identified field, the requested information exceeding the capacity of that field. In some embodiments, the method further includes: transmitting the completed form and the attachment to a licensing authority. Implementations of the described techniques may include hardware, a method or process, or computer software on a computer- accessible medium.

[0010] One general aspect includes a computer program product having a non-transitory computer readable medium tangibly recording computer program logic for managing license application compliance. The computer program product also includes code to receive personal information related to a licensee, and to store the personal information in the personal information database; code to automatically retrieve a license form from a website or remote database, where the license form includes a plurality of fields; code to identify each field within the license form and map that field to corresponding information for the licensee within the personal information database; and code to retrieve the mapped information for each field within the license form for the selected licensee from the information storage unit and to place the retrieved requested information in corresponding fields of the license form to generate a completed form. Other embodiments of this aspect include corresponding computer systems, apparatus, and computer programs recorded on one or more computer storage devices, each configured to perform the actions of the methods.

[0011] Implementations may include one or more of the following features. The computer program product further including: code to identify a field within the selected license form with insufficient capacity to accommodate the requested information from the information storage unit and to generate, based on a user input, an attachment for the license form including, for the identified field, the requested information exceeding the capacity of that field. Implementations of the described techniques may include hardware, a method or process, or computer software on a computer-accessible medium.

[0012] This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to limit the scope of the claimed subject matter. A more extensive presentation of features, details, utilities, and advantages of the compliance management system, as defined in the claims, is provided in the following written description of various embodiments of the disclosure and illustrated in the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

[0013] Illustrative embodiments of the present disclosure will be described with reference to the accompanying drawings, of which:

[0014] Figure 1 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management system in accordance with at least one embodiment of the present disclosure.

[0015] Figure 2 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management system in accordance with at least one embodiment of the present disclosure. [0016] Figure 3 is an exemplary representation, in block diagram form, of at least a portion of an example compliance management system in accordance with at least one embodiment of the present disclosure.

[0017] Figure 4 is an exemplary representation, in block diagram form, of at least a portion of an example compliance management system in accordance with at least one embodiment of the present disclosure.

[0018] Figure 5 is a schematic diagram of a processor circuit, according to embodiments of the present disclosure.

[0019] Figure 6 shows an “Add Employees” screen of an example compliance management system, in accordance with at least one embodiment of the present disclosure. [0020] Figure 7 shows a “Manage Employees” screen of an example compliance management system, in accordance with at least one embodiment of the present disclosure.

[0021] Figure 8 shows a “Manage Employees” screen of an example compliance management system, in accordance with at least one embodiment of the present disclosure. [0022] Figure 9 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management method in accordance with at least one embodiment of the present disclosure.

[0023] Figure 10 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management method, in accordance with at least one embodiment of the present disclosure.

[0024] Figure 11 shows a personal statement selector screen of an example compliance management system, in accordance with at least one embodiment of the present disclosure.

[0025] Figure 12 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management method, in accordance with at least one embodiment of the present disclosure.

[0026] Figure 13 is an employee profile screen of an example compliance management system, in accordance with at least one embodiment of the present disclosure.

[0027] Figure 14 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management method, in accordance with at least one embodiment of the present disclosure.

[0028] Figure 15 is a completed personal statement selector screen of an example compliance management system, in accordance with at least one embodiment of the present disclosure. [0029] Figure 16 is a side navigation and completion indicators screen of an example compliance management system, in accordance with at least one embodiment of the present disclosure.

DETAILED DESCRIPTION

[0030] In accordance with at least one embodiment of the present disclosure, a compliance management system is provided which streamlines the process of applying for licenses (e.g., gaming licenses) by allowing a centralized server to send out requests to a variety of people, whether employees or external vendors, to fill in various personal data in a standardized form. The system collects and stores this data securely, and tracks the status of the entire license application process. After all information is collected, there is a translation of the collected data to the appropriate forms (e.g., state or federal government forms, insurance forms, etc.) required to acquire licenses. This translation intelligently interprets and maps the personal data to the forms, e.g., by converting the word “Brown” describing hair color to an appropriate checkbox in a form as needed, since different jurisdictions will require different forms of input of the same information. Likewise, “Address” could be a single line in one form, and could be four separate lines in another (i.e. Address line 1, City, State, Zip). After the system translates the data to the appropriate forms, the system can construct a packet of all required forms that will contain the latest information available, and then, after downloading, will delete that unencrypted data from the system, so that the system does not retain any instances of private information in an unencrypted state.

[0031] The present disclosure may aid in filing license applications for multiple applicants, or applicants in multiple jurisdictions, by improving both the security of personally identifying information (PII) and the efficiency with which licenses can be applied for. Implemented on one or more processors in communication with one or more databases, the compliance management system disclosed herein provides practical, secure translation of stored PII into field data for license application forms. This streamlined and augmented process transforms a plurality of license applications into a single PII form for each user or applicant, without the normally routine need to copy and paste fields into multiple forms, to adapt information manually to different numbers and sizes of fields, or to store or handle PII in an insecure manner, as would occur in a manual process. This unconventional approach improves the functioning of computer systems used for compliance management, by centralizing and automating critical functions, while intelligently adapting stored data to fit a variety of different application forms in real time or near real time. With the system described herein, PII may be stored only in encrypted formats, and may be encrypted and decrypted on the fly, in real time or near real time, to prevent PII from being exposed except in the generated license application form itself.

[0032] The compliance management system improves the functioning of a computer system in several ways. First, it allows all the forms required for a given employee to be downloaded once, from multiple remote sources (e.g., the websites of government agencies or certifying authorities), into a single computer (e.g., local to a particular workplace) so the forms are available when needed. This may reduce the need for multiple downloads of the same forms, thus reducing network usage. Second, for a given employee or other entity, the compliance management system allows a user to fill out all the required fields for all required forms by answering questions on a single, unified form, which may reduce the amount of time the local computer is tied up with form completions, thus freeing up the computer for other uses. Third, the compliance management system automates many processes as described below, thus reducing the time required to complete applications. Fourth, the compliance management system stores key data in an encrypted format, thus increasing the security of critical user data, while also decrypting specific data items in real time, as needed, to improve accessibility of the encrypted data. Still other advantages will be apparent in the descriptions provided below.

[0033] The compliance management system may be implemented as a single-page application (SPA) viewable on a display, and operated by a control process executing on a processor that accepts user inputs from a keyboard, mouse, or touchscreen interface, and that is in communication with one or more servers or databases, whether local or remote. In that regard, the control process performs certain specific operations in response to different inputs or selections made at different times. Other operations may be performed in parallel. Certain structures, functions, and operations of the processor, display, sensors, and user input systems are known in the art, while others are recited herein to enable novel features or aspects of the present disclosure with particularity.

[0034] These descriptions are provided for exemplary purposes only, and should not be considered to limit the scope of the compliance management system. Certain features may be added, removed, or modified without departing from the spirit of the claimed subject matter. [0035] For the purposes of promoting an understanding of the principles of the present disclosure, reference will now be made to the embodiments illustrated in the drawings, and specific language will be used to describe the same. It is nevertheless understood that no limitation to the scope of the disclosure is intended. Any alterations and further modifications to the described devices, systems, and methods, and any further application of the principles of the present disclosure are fully contemplated and included within the present disclosure as would normally occur to one skilled in the art to which the disclosure relates. In particular, it is fully contemplated that the features, components, and/or steps described with respect to one embodiment may be combined with the features, components, and/or steps described with respect to other embodiments of the present disclosure. For the sake of brevity, however, the numerous iterations of these combinations will not be described separately.

[0036] Figure 1 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management system 100 in accordance with at least one embodiment of the present disclosure. The compliance management system 100 may for example include compilable or executable application code stored on a non-volatile computer-readable medium, to support web services and a single -page application (SPA) involved in allowing a client to sign in and create a pdf document from a desired downloadable form such as a gaming license application form.

[0037] In the example shown in Figure 1, the compliance management system 100 includes three layers: a front end layer, front end module, or dashboard module 110, an authentication layer or authentication nodule 120, and a portable document format (PDF) generation layer or module 130.

[0038] The front end layer, front end module, or dashboard module 110 includes a user sign- in step 111, which enables an authorized user to access the functionality of the compliance management system 100. Execution then proceeds to step 124. The front end layer 110 further includes an input step 112, wherein the user enters personal information through the dashboard module or other front-end module/device. Execution may then proceed to step 124. The front end layer 110 further includes an access step 113, wherein the PDF generation module 130 provides the user with a link for accessing a generated document such as a license application form. The user may then return to step 112, or proceed to step 114. The front end layer 110 further includes an “arrived at link” step, from which execution then proceeds to step 126. The front end layer 110 further includes a “deny” step or endpoint 115, wherein the user is not allowed to access the link. The front end layer 110 further includes a “download PDF” step or endpoint 116, wherein the completed PDF application form and any associated documents are downloaded from the document microservice 204 for viewing, saving, emailing, uploading, printing, or other access by a user of the compliance management system 100. In some embodiments, this step may include or be at least partially implemented by a submit module configured to transmit the completed form and the attachment to a licensing authority (e.g., the authority from which the blank form was downloaded).

[0039] The authentication layer 120 includes an authentication service 122 to confirm that the signed-in user has presented valid credentials. Execution then proceeds to step 112. The authentication layer 124 further includes a secret key access step 124, wherein the authentication module 120 accesses an encryption key (e.g., an Advanced Encryption Standard or AES key), for example with a “jenkins/auth” plugin module or similar tool. In an example, when the auth service is deployed, a special key in jenkins is deployed alongside. This key is used to encrypt/decrypt the employee AES token, which is used to encode/decode the employee’s personal information. Execution then proceeds to step 131. The authentication layer 120 further includes a branch to determine whether the user has been allowed access to a provided link to a PDF document. If yes, execution proceeds to step 137. If no (e.g., because it is the wrong user), execution proceeds to step 115.

[0040] The PDF generation layer or PDF generation module 130 includes an encryption step 131, wherein the user’s personal information is encrypted using the key (e.g., an AES key) obtained in step 124. Execution then proceeds to step 210. In an example, all microservice communication is not done on a peer-to-peer basis between modules or layers, but through a network address translation system (NATS) message bus. In an example, user/employee information may be moved into database tables such as DynamoDB tables. [0041] The PDF generation layer 130 also includes a branch 132 where it is determined (e.g., based on a user input, or the completeness of the personal information) whether or not to generate an application form from the personal information. If yes, execution proceeds to step 133. If no, execution proceeds to step 112. Step 133 calls step 220 as a subroutine, and then decrypts the personal information necessary to populate a desired license application form. In step 134, the PDF generation module 130 downloads documents from a remote source, such as for example license application documents from a website or server.

Execution them proceeds to step 135. In step 135, the downloaded documents are prepared for PDF adoption, for example by populating the fields of each document with data from the personal information. This step may include or may be implemented by a document preparation module (e.g., configured to identify each field within the license form and map that field to corresponding information for the licensee within the personal information database). Execution then proceeds to step 136, wherein the completed PDF document is generated. This step may include or be implemented by a document generation module (e.g., configured to retrieve (e.g., from memory in an unencrypted state or from encrypted storage, with a decryption step) the mapped information for each field within the license form for the selected licensee and to place the retrieved requested information in corresponding fields of the license form to generate a completed form. This step may also include or be partially implemented by an overflow module configured to identify fields within the selected license form that are too small to accommodate the corresponding personal information, and to generate (e.g., based on a user input) an attachment for the license form including the corresponding personal information. Execution then proceeds to step 230. In step 137, the completed PDF form containing the personal information is unmarshaled (e.g., decoded from the marshaled state) such that it is available for download by the front end 110. Execution then proceeds to step 116 and/or step 240.

[0042] Before continuing, it should be noted that the examples described above are provided for purposes of illustration, and are not intended to be limiting. Other devices and/or device configurations may be utilized to carry out the operations described herein.

[0043] Figure 2 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management system 100 in accordance with at least one embodiment of the present disclosure. In the example shown in Figure 2, the compliance management system 100 further includes two additional layers or modules: a remote dictionary server (redis) layer or module 202, and a document service layer or module 204. [0044] The redis layer 202 may for example include steps 210, 220, 230, and 240. The document service layer or module 204 may for example include steps 250, 260, 270, and 280. In step 210, encrypted values of the personal information are saved, for example in a local database or cloud database. In step 220, encrypted values of the personal information are retrieves from the local database or cloud database. In step 230, the PDF of the populated document (e.g., a filled-out license application form) is saved as a style array for a set “time to live” or TTE. Execution then proceeds to step 137. When the TTE has expired the style array is deleted from memory. In step 240, the consumable information regarding the AES token is saved to a user database (e.g., element 380 of Figure 3).

[0045] In the example shown in Figure 2, the document service layer or document service module 204 includes a step 250, wherein encrypted personal information about the applicant (e.g., identification(s), personal documents, etc.) is pulled from a file store (e.g., from S3, a file store in Amazon Web Services). Execution then proceeds to step 260. In step 260, the document service module 204 gets a use token (e.g., a personal token used to decrypt the encrypted documents) from the file store. In step 270, the downloaded document(s) are decrypted, if necessary. Execution them proceeds to step 280 and/or step 124. In step 280, documents (e.g., license application forms) are requested from a remote source (e.g., a website, server, cloud database, or other database). In some embodiments, this step may be referred to or be implemented by a document request module. Execution then proceeds to step 250.

[0046] It is understood that the steps shown in Figures 1 and 2 may be performed in a different order than shown, additional steps can be provided before, during, and after the steps, and/or some of the steps described can be replaced or eliminated in other embodiments. One or more of the steps can be carried by one or more devices and/or systems described herein, such as components of the compliance management system 100, and/or processor circuit 550.

[0047] Figure 3 is an exemplary representation, in block diagram form, of at least a portion of an example compliance management system 100 in accordance with at least one embodiment of the present disclosure. The compliance management system 100 includes a single page application (SPA) 310, which may for example be implemented in Glimp and may be accessible through a web browser or other application. The SPA 310 may for example be a client portal that allows the end user to work with the different features of the compliance management system 100, including sign in, form management and document export in pdf form. The SPA 310 may run on or be hosted on a hosting service 320 such as Amazon Web Services Swarm (AWS Swarm). The hosting service 320 may for example include a docker swarm routing mesh that is used via an application program interface (API) or web socket to allow communication with the backend services and to accommodate the frontend application. A number of layers, modules, or microservices 235 may underlie the SPA, including the authentication microservice, layer, or module 120, the PDF microservice, layer, or module 130, the document service microservice, layer, or nodule 204 (all described above in Figures 1 and 2), an auditing microservice, layer, or module 260, and a monitoring stack 370.

[0048] In an example, the authentication or auth microservice 120 may be used for authentication and authorization of users, and for encryption and decryption of personal information saved on behalf of users. In an example, the PDF generation microservice 130 is used to pull information from the document microservice 204 and internal translation/rules engine within the PDF generation microservice 130, and create PDFs in real time or near real time that are then stored in Dynamo database. In an example, the document microservice 204 is responsible for uploading, encryption and decryption of personal documents used on behalf of the PDF microservice 130.

[0049] In an example, the auditing microservice, layer, or module 360 is used to track the users of the system through different events that the user evokes, in communication with an internal database 390 such as a Postgres, PostgreSQL, or structured query language (SQL) relational database, which can be used for example to track the company table and time series information for the monitoring stack 370. In an example, the PDF microservice, layer, or module performs as described above in Figures 1 and 2, in communication with a user database 380 such as a DynamoDB or other NoSQL database. AWS DynamoDB is a noSQL key value database where employee, user, authentication, etc. information can be stored. All personally identifiable information (PII) data may be secured (e.g., encrypted) at rest in the respective tables of the database.

[0050] In an example, the internal monitoring stack 370 can serve to keep track of container and nodes information, including but not limited to CPU, memory and disk space allocation information. The monitoring stack 370 may also track individual alerting events from within the codebase such as connectivity loss for the command query responsibility segregation (CQRS) event bus.

[0051 ] Figure 4 is an exemplary representation, in block diagram form, of at least a portion of an example compliance management system 100 in accordance with at least one embodiment of the present disclosure. In the example shown in Figure 4, the compliance management system 100 includes a dashboard module 410, and encryption module 420, a personal information database 430, a document request module 440, a licensing authority 450, a document preparation module 460, a decryption module 470, a document generation module 480, an overflow module 485, and a submit module 490.

[0052] In some embodiments, the dashboard module 410 may be configured to receive personal information from or related to a licensee or applicant 405, and to store the personal information in the personal information database 430 after encryption by the encryption module 420. The dashboard module 410 may for example be part of the front end layer, service, or module 110 of Figure 1. The document request module 440 may be configured to automatically retrieve a blank license form 455 from a website or remote database of the licensing authority 450. Typically, the license form will comprise multiple fields 457 for entering personal information of the applicant. The document preparation module 460 may be configured to identify each field within the license form and map that field to corresponding information for the licensee or applicant 405 within the personal information database 430. The document generation module 480 may be configured to retrieve the mapped information for each field within the license form for the licensee or applicant 405 from the information storage unit 430 after decryption by the decryption module 470, and to place the retrieved requested information in corresponding fields 457 of the license form 457 to generate a completed form. In some embodiments, the overflow module 485 may be configured to identify a field 457 within the license form 455 that is too small to contain the requested personal information and to generate, based on a user input, an attachment for the license form including the requested information that exceeds the capacity of that field. In some embodiments, the submit module 490 is configured to transmit the completed form and the attachment to the licensing authority 450. The completed form may be transient in memory, such that the user’s personal information is not stored indefinitely in an unencrypted format. In other embodiments, a user may email the completed form to the licensing authority, or print out the competed form and ship it to the licensing authority.

[0053] The encryption module 420 and decryption module 470 may for example be parts of the authentication layer, service, or module 120 of Figure 1. The document preparation module, document generation module, and overflow module may for example be parts of the PDF generation layer 130 of Figure 1. The document request module 440 may for example be part of the document service layer 204 of Figure 1. Other arrangements are possible, and fall within the scope of the present disclosure.

[0054] Figure 5 is a schematic diagram of a processor circuit 550, according to embodiments of the present disclosure. The processor circuit 550 may be implemented in the compliance management system 100, or other devices or workstations (e.g., third-party workstations, network routers, etc.), or on a cloud processor or other remote processing unit, as necessary to implement the method. As shown, the processor circuit 550 may include a processor 560, a memory 564, and a communication module 568. These elements may be in direct or indirect communication with each other, for example via one or more buses.

[0055] The processor 560 may include a central processing unit (CPU), a digital signal processor (DSP), an ASIC, a controller, or any combination of general-purpose computing devices, reduced instruction set computing (RISC) devices, application-specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), or other related logic devices, including mechanical and quantum computers. The processor 560 may also comprise another hardware device, a firmware device, or any combination thereof configured to perform the operations described herein. The processor 560 may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.

[0056] The memory 564 may include a cache memory (e.g., a cache memory of the processor 560), random access memory (RAM), magnetoresistive RAM (MRAM), read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read only memory (EPROM), electrically erasable programmable read only memory (EEPROM), flash memory, solid state memory device, hard disk drives, other forms of volatile and nonvolatile memory, or a combination of different types of memory. In an embodiment, the memory 564 includes a non-transitory computer-readable medium. The memory 564 may store instructions 566. The instructions 566 may include instructions that, when executed by the processor 560, cause the processor 560 to perform the operations described with respect to the Figures 1-4 and 6-16. Instructions 566 may also be referred to as code. The terms “instructions” and “code” should be interpreted broadly to include any type of computer- readable statement(s). For example, the terms “instructions” and “code” may refer to one or more programs, routines, sub-routines, functions, procedures, etc. “Instructions” and “code” may include a single computer-readable statement or many computer-readable statements. [0057] The communication module 568 can include any electronic circuitry and/or logic circuitry to facilitate direct or indirect communication of data between the processor circuit 550, and other processors or devices. In that regard, the communication module 568 can be an input/output (I/O) device. In some instances, the communication module 568 facilitates direct or indirect communication between various elements of the processor circuit 550 and/or the compliance management system 100. The communication module 568 may communicate within the processor circuit 550 through numerous methods or protocols.

Serial communication protocols may include but are not limited to US SPI, I2C, RS-232, RS- 485, CAN, Ethernet, ARINC 429, MODBUS, MIL-STD-1553, or any other suitable method or protocol. Parallel protocols include but are not limited to ISA, ATA, SCSI, PCI, IEEE- 488, IEEE-1284, and other suitable protocols. Where appropriate, serial and parallel communications may be bridged by a UART, USART, or other appropriate subsystem.

[0058] External communication (including but not limited to software updates, firmware updates, preset sharing between the processor and central server, or readings from different components of the compliance management system) may be accomplished using any suitable wireless or wired communication technology, such as a cable interface such as a USB, micro USB, Lightning, or FireWire interface, Bluetooth, Wi-Fi, ZigBee, Li-Fi, or cellular data connections such as 2G/GSM, 3G/UMTS, 4G/LTE/WiMax, or 5G. For example, a Bluetooth Low Energy (BLE) radio can be used to establish connectivity with a cloud service, for transmission of data, and for receipt of software patches. The controller may be configured to communicate with a remote server, or a local device such as a laptop, tablet, or handheld device, or may include a display capable of showing status variables and other information. Information may also be transferred on physical media such as a USB flash drive or memory stick.

[0059] Figure 6 shows an “Add Employees” screen 600 of an example compliance management system 100, in accordance with at least one embodiment of the present disclosure. The “Add Employees” screen includes a top menu 605, middle menu 610, a file drop area 620, and manual data entry area 630. The file drop area 620 permits a user to drag and drop files (e.g., from a file system executing on the processor circuit). In an example, the system may be configured to receive Comma Separated Values (CSV) files through the file drop area 620, where each line of the CSV file includes comma-delimited, tab-delimited, or otherwise delimited personal data, or other data, about a list of new employees to be added to the system. In an example, data received from a file dragged and dropped into the file drop area 620 may automatically populate the manual data entry area 630, where the data may be reviewed and, if necessary, edited by the user.

[0060] The manual data entry area 630 includes a variable number of records or rows 1040. Each record or row 640 describes a single new employee to be added to a database (e.g., the personal information database 430 of Figure 4), and includes a number of fields 650 such as, for example, “First Name”, “Last Name”, “Email Address”, and “Employee Type. For each record or row 1040, data can be manually entered or edited in each of the fields 650 (e.g., by clicking on them with a mouse and then entering or removing text with a keyboard, although other methods may be used instead or in addition). The manual data entry area 630 also includes an “Add Row” button 660, which can be used to create additional records 640. Also visible is an “Add Employees” button 670, which, when data entry, data upload, or data correction is complete, can be used to copy the records 640 into the personal information database.

[0061] Figure 7 shows a “Manage Employees” screen 700 of an example compliance management system 100, in accordance with at least one embodiment of the present disclosure. The employee type form assignment screen 700 includes an “Add New Employees” section 710, which includes an “Add Manually” button 730 and an “Upload CSV” button 740. The “Add Manually” button 730 may for example trigger a method such as, or similar to, method 1400 of Figure 14. The “Upload CSV” button 740 may for example trigger a method such as, or similar to, method 1000 of Figure 10.

[0062] The “Manage Employees” screen 700 also includes a “Manage Employee Types” section 720, which includes a “Create New Type” button 750 and an “Edit Existing Type” button 760. The functioning of the “Create New Type” button 750 and “Edit Existing Type” button 760 may for example be described by a method such as method 900 of Figure 9. [0063] In the example shown in Figure 7, the “Create New Type” button 750 has been selected, which has brought up input fields including a “Name Employee Type” field 780 and an “Assign Forms” selector 780. The “Assign Forms” selector 780 may for example allow a user to select all the forms that will be associated with the new user type.

[0064] Figure 8 shows a “Manage Employees” screen 700 of an example compliance management system 100, in accordance with at least one embodiment of the present disclosure. The “Manage Employees” screen 700 shown in Figure 8 is similar to the “Manage Employees” screen 700 shown in Figure 7. However, in the example shown in Figure 8, the “Edit Existing Type” button 760 of the “Manage Employee Types” section 720 has been selected, which has brought up input fields including an “Employee Type” selector 870 and an “Assign Forms” selector 880. The “Assign Forms” selector 880 may for example allow a user to change the selection of forms that will be associated with the selected user type.

[0065] Figure 9 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management method 900 in accordance with at least one embodiment of the present disclosure. The method 900 may for example be a method for editing or creating employee types.

[0066] In step 910, based on user input, the system enters compliance officer portal (as shown for example in Figure 6). Execution then proceeds to step 920.

[0067] In step 920, based on user input (e.g., through the top menu 605 or middle menu 610 of the screen display 600 of Figure 6), the system navigates to a “Manage Employees” page, screen, menu, or pop-up window (e.g., screen 700 of Figure 7 or Figure 8). Execution then proceeds to step 930.

[0068] In step 930, based on user input, the system navigates to an “Employee Types” or “Manage Employee Types” page, screen, menu, or pop-up window (e.g., section 720 of Figure 7 or Figure 8). Execution then proceeds to step 950.

[0069] In step 950, from the “Employee Types” page, based on user input, the system chooses between navigating to a “Create New Employee Type” page, screen, menu, or pop- up window (in which case execution proceeds to step 960), or an “Edit Employee Type” page, screen, menu, or pop-up window (in which case execution proceeds to step 994). [0070] In step 960, the system navigates to the “Create New Employee Type” page, screen, menu, or pop-up window. Execution then proceeds to step 970.

[0071] In step 970, the system displays a name field and all available forms for the new employee type. Execution then proceeds to step 980.

[0072] In step 980, based on user input, the system creates a name for the new employee type and selects all forms to assign to that employee type. Execution then proceeds to step 990.

[0073] In step 990, the system creates the new employee type. When employees are assigned this Employee Type, their portal is automatically updated to include all the form sections for that user type. The method is now complete.

[0074] In step 994, the system navigates to the “Edit Employee Type” page, screen, menu, or pop-up window. Execution then proceeds to step 996.

[0075] In step 996, based on user input, the system updates the employee type (e.g., the name, assigned forms, or assigned form sections). The employee portal for users of this type is then automatically updated to include appropriate forms or form sections associated with the user type. The method is now complete.

[0076] Figure 10 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management method 1000, in accordance with at least one embodiment of the present disclosure. The method 1000 may for example be a method for adding multiple users to the system via a “comma separated values” or CSV file.

[0077] In step 1010, based on user input, the system enters compliance officer portal (as shown for example in Figure 6). Execution then proceeds to step 1020.

[0078] In step 1020, based on user input (e.g., through the top menu 605 or middle menu 610 of the screen display 600 of Figure 6), the system navigates to a “Manage Employees” page, screen, menu, or pop-up window (e.g., screen 700 of Figure 7 or Figure 8).

[0079] In step 1030, the system displays the “Add Employees” page, screen, menu, or pop-up window (as shown for example in Figure 6), where input can then be received from the user indicating a CSV file to be uploaded. Execution then proceeds to step 740.

[0080] In step 1040, the system uploads the CSV file containing employee data. Execution then proceeds to step 1050.

[0081] In step 1050, the system populates the “Add Employees” section of the “Add Employees” screen (e.g., section 630 of screen 600 of Figure 6) with all of the employees listed in the CSV file, along with their personal and identifying information stored in the CSV file. Execution then proceeds to step 1060.

[0082] In step 1060, based on user inputs, the system assigns an employee type to each of the new employees. In some embodiments, employee data for the new employees can be manually edited at this step. Execution then proceeds to step 1070.

[0083] In step 1070, the system adds the new employees to a database (e.g., the Personal Information Database 430 of Figure 4), sends an invitation email to each employee, and populates each employee’s form sections based on their employee types. The method is now complete.

[0084] Figure 11 shows a personal statement selector screen 1100 of an example compliance management system 100, in accordance with at least one embodiment of the present disclosure. Visible is a top menu 1105, statements menu 1110, and a plurality of statements 1120. A user, upon entering the personal statement selector screen 1100, may for example click on any or all of the statements 1120 that apply to a particular employee. In some cases, the particular employee and the user are the same person, although this may not always be the case. Possible statements include, but are not limited to, “I was born in the US”, “I have a child or am legally a parent”, “I have been arrested”, “I have a current or previous gaming license”, “I have another type of license”, “I currently or previously have owned a business”, “I have served as a director of a business”, “I have filed for personal bankruptcy”, “I have been involved in an investigation”, and/or “I have been involved in a lawsuit”. Depending on the implementation, other statements, other types of statements, other numbers of statements may be used instead or in addition. In some embodiments, some or all of the statements 1120 may include a “More Information” button 1130, which may (e.g., when clicked) activate a pop-up display, information screen, or other display providing the user with additional information about that particular statement.

[0085] Figure 12 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management method 800, in accordance with at least one embodiment of the present disclosure. The method 800 may for example be a method for displaying and functionalizing a personal statement selector and completion indicator.

[0086] In step 1210, based on user input, the system enters the employee portal (as shown for example in Figure 11). Execution then proceeds to step 1220.

[0087] In step 1220, the system displays a selection of personal statement tiles that are selectable by the user (e.g., an employee, or a user operating the system on behalf of the employee). Execution then proceeds to step 830. [0088] In step 1230, based on user input, the system selects which statements apply to the employee. Execution may proceed temporarily to step 850 to update a progress indicator, return. When all applicable statements have been selected execution then proceeds to step 1240 based on a user input.

[0089] In step 1240, the system infers data based on the selected personal statements, and auto-completes form sections where possible. In some embodiments, execution may then proceed temporarily to step 1250 temporarily, to update a progress indicator, and then return. In some embodiments, a side navigation block (e.g., element 1510 of Figure 15 or Figure 16) is updated to show completed sections and/or sections that still need to be completed by the user. Execution then proceeds to step 1260.

[0090] In step 1250, the system updates a progress bar or other progress indicator to indicate a percent completion of the current section. Execution then returns to the step from which step 1250 was called.

[0091] In step 1260, based on user input, the system proceeds to complete any remaining form sections. In some embodiments, execution may proceed temporarily to step 1250 to update a progress indicator, return. Execution then proceeds to step 1270.

[0092] In step 1270, field inputs and section backgrounds of the side navigation block change color to reflect whether they are complete, incomplete, or contain errors. If any sections are incomplete or contain errors, execution may return to step 1260. If all sections are complete, then the method is complete.

[0093] Figure 13 is an employee profile screen 1300 of an example compliance management system 100, in accordance with at least one embodiment of the present disclosure. The employee profile screen 1300 includes an employee information section 1310, which includes fields 1315 containing identifying information, personal information, employee type, and other information as needed to describe the employee. In some embodiments, the fields 1315 may be edited directly on the employee profile screen 1300. In other embodiments, the fields 1315 are populated using information obtained in other portions of the system, and are not editable from within the employee profile screen 1300.

[0094] The employee profile screen 1300 also includes an application status section 1320, which includes a form progress indicator 1322 and a fixed or variable number of records 1324 pertaining to licenses applied for by the employee. The progress indicator 1322 may for example show the percent completed for a form in a selected record 1324 or, if no record 1324 is selected, a percent completed for all of the forms for which records 1324 are displayed. [0095] The employee profile screen 1300 also includes a license history section 1330, which includes a variable number of records 1334, each containing information (e.g., fields) pertaining to a specific license currently or previously held by the employee.

[0096] The employee profile screen 1300 also includes an employee tags section 1340, in which text can be displayed and/or edited that describes specific (e.g., employer- specific) information about the employee.

[0097] The employee profile screen 1300 also includes a notes section 1350, in which text can be displayed and/or edited that does not fit into any other defined fields of the employee profile screen 1300.

[0098] The employee profile screen 1300 may for example trigger, or be called by, the method of Figure 14.

[0099] Figure 14 is an exemplary representation, in flow diagram form, of at least a portion of an example compliance management method 1400 in accordance with at least one embodiment of the present disclosure. The method 1400 may for example be an employee profile input or editing method.

[00100] In step 1410, based on user inputs, the system enters the compliance officer portal (as shown for example in Figure 6, Figure 7, or Figure 8). In some embodiments, based on user inputs, the system enters the employee portal instead of the compliance officer portal. Execution then proceeds to step 1415.

[00101] In step 1415, based on user input (e.g., through the top menu 605 or middle menu 610 of the screen display 600 of Figure 6), the system navigates to a “Manage Employees” page, screen, menu, or pop-up window (e.g., screen 700 of Figure 7 or Figure 8). In embodiments where the system entered the employee portal in step 1410, this step may not occur. Execution then proceeds top step 1420.

[00102] In step 1420, the system receives a user input selecting the name of an employee whose profile will be viewed. Execution then proceeds to step 1430.

[00103] In step 1430, the system displays the “Employee Profile” page (e.g., Employee Profile Page 1300 of Figure 13). Step 1430 can be reached from step 1420, or from step 1450 of Figure 12. Execution may proceed temporarily to step 1250 and then return. Based on user inputs, execution then proceeds to step 1450, step 1460, step 1470, step 1480, or step 1490. If the user inputs indicate that all the desired information has been entered or edited, then the method is complete. [00104] In step 1250, the system updates a progress bar or other progress indicator to reflect a percent completion for the current section. Execution then returns to the step that called step 1250.

[00105] In step 1450, based on user inputs, the system edits the contact information for the selected employee. Execution then returns to step 1430.

[00106] In step 1460, based on user inputs, the system edits forms and license status or statuses for the selected employee. Execution then proceeds to step 1495.

[00107] In step 1470, based on user inputs, the system adds or edits license history information in the profile for the selected employee. Execution then returns to step 1430. [00108] In step 1480, based on user inputs, the system adds tags to the profile for the selected employee. Example tags may include, but are not limited to managers of the employee, team names, hiring date, cohort or class. Execution then returns to step 1430. [00109] In step 1490, based on user inputs, the system adds notes to the profile for the selected employee. Example notes may include, but are not limited to concerns about the application, follow ups needed to be taken on the employee, or information regarding the unique condition of that employee. Execution then returns to step 1430.

[00110] In step 1495, the system flags incomplete form sections within the employee portal, and/or form sections that contain errors. In some embodiments, such flagging may for example take the form of a color-coded list, where completed form sections are indicated by a first color, incomplete sections are indicated by a second color, and sections that contain an error are indicated by a third color. In other embodiments, such flagging may be accomplished through text, icons, symbols, shading, flashing, or otherwise. Execution then returns to step 1430.

[00111] Figure 15 is a completed personal statement selector screen 1500 of an example compliance management system 100, in accordance with at least one embodiment of the present disclosure. Visible is a list of forms 1510 that have been determined to be required for a given employee. Forms 1510 may be added to the list based on personal information, personal statements, state or country of residence, state or country of employment, or other information depending on the implementation. Some forms 1510 in the list include a check box 1520 or similar indicator, indicating that that particular form 1510 has already been completed. In an example, the check box 1520 may indicate that all available fields, all required fields, or all mandatory fields of the particular form 1510 have been populated with information pertaining to the given employee. Also visible is a status indicator and instruction box 1520, which includes information relevant to the user for completion of the forms 1510.

[00112] Figure 16 is a side navigation and completion indicators screen of an example compliance management system 100, in accordance with at least one embodiment of the present disclosure. Visible is a list of forms 1510 that have been determined to be required for the employee. Some forms 1510 in the list include a check box 1520 or similar indicator, indicating that that particular form 1510 has already been completed. Other forms 1510 include an “X” 1620 or similar indicator, indicating that that particular form has not been completed or contains an error or missing information. Some forms 1510 include a “grayed out” indicator, indicating information in that section may not be required in order to enable a check box or similar indicator.

[00113] A number of variations are possible on the examples and embodiments described above. For example, the technology described herein may be applied to downloadable documents of numerous sorts, including gaming license applications, liquor license applications, tasting room license applications, insurance, and others. The personally identifying information (PII) may be stored in an encrypted, unencrypted, doubly encrypted, or multiply encrypted state. Some microservices may run on separate processors (e.g., connected over a network), or may be combined into a smaller number of services or layers. Multiple databases may be employed, or the functions of databases 380 and 390 of Figure 3 may be combined into a single database.

[00113] Accordingly, the logical operations or elements making up the embodiments of the technology described herein are referred to variously as operations, steps, objects, elements, components, modules, services, microservices, or layers. Furthermore, it should be understood that these may occur or be performed or arranged in any order, unless explicitly claimed otherwise or a specific order is inherently necessitated by the claim language.

[00114] All directional references e.g., upper, lower, inner, outer, upward, downward, left, right, lateral, front, back, top, bottom, above, below, vertical, horizontal, clockwise, counterclockwise, proximal, and distal are only used for identification purposes to aid the reader’s understanding of the claimed subject matter, and do not create limitations, particularly as to the position, orientation, or use of the compliance management system. Connection references, e.g., attached, coupled, connected, and joined are to be construed broadly and may include intermediate members between a collection of elements and relative movement between elements unless otherwise indicated. As such, connection references do not necessarily imply that two elements are directly connected and in fixed relation to each other. The term “or” shall be interpreted to mean “and/or” rather than “exclusive or.” The word "comprising” does not exclude other elements or steps, and the indefinite article “a” or “an” does not exclude a plurality. Unless otherwise noted in the claims, stated values shall be interpreted as illustrative only and shall not be taken to be limiting.

[00115] The above specification, examples and data provide a complete description of the structure and use of exemplary embodiments of the compliance management system as defined in the claims. Although various embodiments of the claimed subject matter have been described above with a certain degree of particularity, or with reference to one or more individual embodiments, those skilled in the art could make numerous alterations to the disclosed embodiments without departing from the spirit or scope of the claimed subject matter.

[00116] Still other embodiments are contemplated. It is intended that all matter contained in the above description and shown in the accompanying drawings shall be interpreted as illustrative only of particular embodiments and not limiting. Changes in detail or structure may be made without departing from the basic elements of the subject matter as defined in the following claims.