Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
How can EMM help with GDPR compliance?
1. How can EMM help with
GDPR compliance?
February 2018
2. GDPR in a nutshell
• The General Data Protection Regulation comes into effect May 25, 2018.
• Designed to keep the personal data of EU’s 510+ million residents safe.
• Holds organisations accountable for any data breaches.
• In serious cases, notifies individuals of breaches of their personal info.
• Businesses who fail to comply can be fined up to EUR 20 million, or 4% of
their annual global turnover.
• Gives individuals the right to know what information of theirs is stored, and
allows them to request that this information be erased.
• May require the appointment of a Data Protection Officer within the
organisation.
3. Mobile devices and your organisation?
• Our organisations undoubtedly rely heavily on the use
of smartphones, tablets and laptops.
• The workforce is also becoming increasingly mobile,
accessing data on the move and carrying devices 24
hours per day...outside of the work setting.
• While this offers new opportunities that our
businesses can’t live without, it also presents a new
host of threats, specific to GDPR.
• Mobile Device Management and Enterprise Mobility
Management will be key factors in helping you
achieve real-world compliance.
4. 9 ways how EMM helps to achieve GDPR compliance
1. Enforce passcode requirements
2. Encrypt data
3. Separate work and private data and apps
4. Be prepared to wipe sensitive information
5. Control the applications running on your devices
6. Deploy and enforce settings
7. Know your software
8. Create reports for data security purposes
9. Be ready to act, if a device is lost or stolen
5. 1. Lock screens and passcodes
• It sounds simple, because it is. This is your first line of defence when it comes to protecting
the data contained in your devices, especially if lost or stolen.
• GDPR requires you to prove that you’re in control of user data and that you’ve taken steps
to protect it.
• Miradore’s EMM allows you to lock an open device, easily enforce passcode requirements
on your devices, and remotely check to ensure compliance.
6. 2. Unencrypted data is a liability
• It’s important to understand how encryption works on your devices.
• iOS devices have encryption built in, but only when a passcode is enabled.
• Android devices may or may not come encrypted, so it’s important to be able to audit and
enforce your corporate devices.
• Use of an EMM product will enable you to enforce the use of Encryption across your fleet.
7. 3. Separate work and private data
• Administrators can create a ”work profile” in an
Android device, which is separated from the
user’s ”personal profile”. Data in the work profile
can be wiped without deleting the user’s
personal information stored on the device.
• On iOS devices you can enable the Secure
Email to separate company and personal data.
8. 4. Destroying sensitive data
• There will be times when you will need to wipe the device of
all sensitive data.
• Recommissioning a device for a new user.
• Employee is leaving the organisation.
• Device has gone missing.
• Doing so at the press of a button is key to preventing
breaches of information.
9. 5. Control applications and data
• Applications are great, and we typically have a lot of
work and personal apps on our devices.
• With EMM you can control your apps by:
• Whitelisting specific apps that you want to allow on
the devices.
• Blacklisting inappropriate apps, or ones that use
excessive data.
• Setting a device into single app mode (kiosk mode).
• Creating your own corporate App Store, consisting
only of apps that you approve, and hiding the rest.
• Protecting your Contacts by permitting apps based
access to the Contacts.
10. 6. Remotely deploy and enforce settings
• Ease of use (or lack thereof) can be a real
difference-maker when it comes to whether or
not policies and settings are enforced across
your network when using a third party EMM
tool.
• We feel that this shouldn’t be a pain point, and
make it easier than ever to remotely deploy and
enforce settings.
• Examples are configuring approved wifi
networks, and distributing VPN profiles.
• In addition, save time and money by deploying
company email configurations, monitoring data
usage and mitigating roaming charges, to name
a few.
11. 7. Know your software versions
• Cyber attacks, malware and ransomware like WannaCry and Petya are not just threats to your PC’s. Old
versions of applications and applications from untrusted sources need to be updated with the latest
security patches or restricted.
• Having a central place to view the OS versions of your devices and push the latest app updates is an
important step in protecting yourself.
• Knowing this information, and using it in conjunction with anti-malware tools is a great way to stay ahead
of the threats.
12. 8. Reporting and logging capabilities
• Your companies may have appointed a Data
Protection Officer. This role is an important part of the
GDPR, and this person must keep a watchful eye on
company policies and affairs.
• The Data Protection Officer will have to prove what
steps have been taken to improve data security and
protect personal data.
• We recommend using an EMM tool to produce an
extensive list of reports that add reassurance of
compliance, and also weed out threats, such as
applications that are potentially harmful. Being able to
monitor everything from a central dashboard makes it
much easier!
13. 9. Protect yourself from theft
• And we don’t mean wearing a fanny pack or a
neck wallet around day to day...but it would
help!
• We’ve touched on this threat already, but it’s
worth repeating because it is so simple, yet so
easily overlooked.
• The small size and portability of mobile devices
makes them an easy target for theft. Even
honest people that come across a misplaced
iPhone might be inclined to keep it or sell it.
• Even though you may never see your device
again, ensuring your devices are protected with
a passcode, encrypted and able to be wiped
are so essential, that Miradore offers this for
free.
14. 9 ways how EMM helps to achieve GDPR compliance
1. Enforce passcode requirements
2. Encrypt data
3. Separate work and private data and apps
4. Be prepared to wipe sensitive information
5. Control the applications running on your devices
6. Deploy and enforce settings
7. Know your software
8. Create reports for data security purposes
9. Be ready to act, if a device is lost or stolen
15. For more information
• https://www.miradore.com/enterprise-mobility-management/
• https://www.miradore.com/gdpr/
• Key Terms
• Mobile Device Management (MDM)
• Enterprise Mobility Management (EMM)
• Unified Endpoint Management (UEM)
• Bring Your Own Device (BYOD)
• Choose Your Own Device (CYOD)
• Corporate Owned Personally Enabled (COPE)