Computerized methods and systems are presented for facilitating
identification, management and/or protection of proprietary information.
Data can be received that is descriptive of proprietary information,
entities involved in creating, conveying, receiving or accessing the
proprietary information as well as any information that will be created,
conveyed, received or accessed. The system receives data and generates
suggested actions and artifacts to aid in the identification, management
and/or protection of proprietary information that may result from the
circumstances described by the data received. Embodiments can also
include receiving data descriptive of a process and determining potential
proprietary information that may be involved. Relevant suggested actions
and artifacts can also be generated.