SlideShare a Scribd company logo
1 of 15
How can EMM help with
GDPR compliance?
February 2018
GDPR in a nutshell
• The General Data Protection Regulation comes into effect May 25, 2018.
• Designed to keep the personal data of EU’s 510+ million residents safe.
• Holds organisations accountable for any data breaches.
• In serious cases, notifies individuals of breaches of their personal info.
• Businesses who fail to comply can be fined up to EUR 20 million, or 4% of
their annual global turnover.
• Gives individuals the right to know what information of theirs is stored, and
allows them to request that this information be erased.
• May require the appointment of a Data Protection Officer within the
organisation.
Mobile devices and your organisation?
• Our organisations undoubtedly rely heavily on the use
of smartphones, tablets and laptops.
• The workforce is also becoming increasingly mobile,
accessing data on the move and carrying devices 24
hours per day...outside of the work setting.
• While this offers new opportunities that our
businesses can’t live without, it also presents a new
host of threats, specific to GDPR.
• Mobile Device Management and Enterprise Mobility
Management will be key factors in helping you
achieve real-world compliance.
9 ways how EMM helps to achieve GDPR compliance
1. Enforce passcode requirements
2. Encrypt data
3. Separate work and private data and apps
4. Be prepared to wipe sensitive information
5. Control the applications running on your devices
6. Deploy and enforce settings
7. Know your software
8. Create reports for data security purposes
9. Be ready to act, if a device is lost or stolen
1. Lock screens and passcodes
• It sounds simple, because it is. This is your first line of defence when it comes to protecting
the data contained in your devices, especially if lost or stolen.
• GDPR requires you to prove that you’re in control of user data and that you’ve taken steps
to protect it.
• Miradore’s EMM allows you to lock an open device, easily enforce passcode requirements
on your devices, and remotely check to ensure compliance.
2. Unencrypted data is a liability
• It’s important to understand how encryption works on your devices.
• iOS devices have encryption built in, but only when a passcode is enabled.
• Android devices may or may not come encrypted, so it’s important to be able to audit and
enforce your corporate devices.
• Use of an EMM product will enable you to enforce the use of Encryption across your fleet.
3. Separate work and private data
• Administrators can create a ”work profile” in an
Android device, which is separated from the
user’s ”personal profile”. Data in the work profile
can be wiped without deleting the user’s
personal information stored on the device.
• On iOS devices you can enable the Secure
Email to separate company and personal data.
4. Destroying sensitive data
• There will be times when you will need to wipe the device of
all sensitive data.
• Recommissioning a device for a new user.
• Employee is leaving the organisation.
• Device has gone missing.
• Doing so at the press of a button is key to preventing
breaches of information.
5. Control applications and data
• Applications are great, and we typically have a lot of
work and personal apps on our devices.
• With EMM you can control your apps by:
• Whitelisting specific apps that you want to allow on
the devices.
• Blacklisting inappropriate apps, or ones that use
excessive data.
• Setting a device into single app mode (kiosk mode).
• Creating your own corporate App Store, consisting
only of apps that you approve, and hiding the rest.
• Protecting your Contacts by permitting apps based
access to the Contacts.
6. Remotely deploy and enforce settings
• Ease of use (or lack thereof) can be a real
difference-maker when it comes to whether or
not policies and settings are enforced across
your network when using a third party EMM
tool.
• We feel that this shouldn’t be a pain point, and
make it easier than ever to remotely deploy and
enforce settings.
• Examples are configuring approved wifi
networks, and distributing VPN profiles.
• In addition, save time and money by deploying
company email configurations, monitoring data
usage and mitigating roaming charges, to name
a few.
7. Know your software versions
• Cyber attacks, malware and ransomware like WannaCry and Petya are not just threats to your PC’s. Old
versions of applications and applications from untrusted sources need to be updated with the latest
security patches or restricted.
• Having a central place to view the OS versions of your devices and push the latest app updates is an
important step in protecting yourself.
• Knowing this information, and using it in conjunction with anti-malware tools is a great way to stay ahead
of the threats.
8. Reporting and logging capabilities
• Your companies may have appointed a Data
Protection Officer. This role is an important part of the
GDPR, and this person must keep a watchful eye on
company policies and affairs.
• The Data Protection Officer will have to prove what
steps have been taken to improve data security and
protect personal data.
• We recommend using an EMM tool to produce an
extensive list of reports that add reassurance of
compliance, and also weed out threats, such as
applications that are potentially harmful. Being able to
monitor everything from a central dashboard makes it
much easier!
9. Protect yourself from theft
• And we don’t mean wearing a fanny pack or a
neck wallet around day to day...but it would
help!
• We’ve touched on this threat already, but it’s
worth repeating because it is so simple, yet so
easily overlooked.
• The small size and portability of mobile devices
makes them an easy target for theft. Even
honest people that come across a misplaced
iPhone might be inclined to keep it or sell it.
• Even though you may never see your device
again, ensuring your devices are protected with
a passcode, encrypted and able to be wiped
are so essential, that Miradore offers this for
free.
9 ways how EMM helps to achieve GDPR compliance
1. Enforce passcode requirements
2. Encrypt data
3. Separate work and private data and apps
4. Be prepared to wipe sensitive information
5. Control the applications running on your devices
6. Deploy and enforce settings
7. Know your software
8. Create reports for data security purposes
9. Be ready to act, if a device is lost or stolen
For more information
• https://www.miradore.com/enterprise-mobility-management/
• https://www.miradore.com/gdpr/
• Key Terms
• Mobile Device Management (MDM)
• Enterprise Mobility Management (EMM)
• Unified Endpoint Management (UEM)
• Bring Your Own Device (BYOD)
• Choose Your Own Device (CYOD)
• Corporate Owned Personally Enabled (COPE)

More Related Content

What's hot

Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidentsbelsis
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityBitglass
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : ProductivityAGILLY
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : ProvisionAGILLY
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
Fixico presentation
Fixico presentationFixico presentation
Fixico presentationFixico IT
 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home StaffArt Ocain
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementDarryl Miles
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key FindingsSymantec
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001CUNIX INDIA
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Napier University
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 

What's hot (20)

Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Mobile security
Mobile securityMobile security
Mobile security
 
Bank security
Bank securityBank security
Bank security
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Fixico presentation
Fixico presentationFixico presentation
Fixico presentation
 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 

Similar to How can EMM help with GDPR compliance?

Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesMidmarketIBM
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices Troy C. Fulton
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device CooperTechnologiesInc
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore Seclore
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmares5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmaresSprint Business
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
The unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityThe unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityClaus Cramon Houmann
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Securitynexxtep
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 

Similar to How can EMM help with GDPR compliance? (20)

Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices
 
3 steps security
3 steps security3 steps security
3 steps security
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmares5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmares
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
The unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityThe unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 

Recently uploaded

Choosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasChoosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasBrandy Austin
 
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseRich Bergeron
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicableSaraSantiago44
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Rich Bergeron
 
1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in SalesMelvinPernez2
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.2020000445musaib
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxjennysansano2
 
Labour legislations in India and its history
Labour legislations in India and its historyLabour legislations in India and its history
Labour legislations in India and its historyprasannamurthy6
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklosbeduinpower135
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesChesley Lawyer
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideillinoisworknet11
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Centerejlfernandez22
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxJFSB1
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSRoshniSingh312153
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxBharatMunjal4
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxAnto Jebin
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksFinlaw Associates
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsRich Bergeron
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21vasanthakumarsk17
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfssuser3e15612
 

Recently uploaded (20)

Choosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in TexasChoosing the Right Business Structure for Your Small Business in Texas
Choosing the Right Business Structure for Your Small Business in Texas
 
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment CaseTown of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
Town of Haverhill's Summary Judgment Motion for Declaratory Judgment Case
 
citizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicablecitizenship in the Philippines as to the laws applicable
citizenship in the Philippines as to the laws applicable
 
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
Town of Haverhill's Statement of Material Facts For Declaratory Judgment Moti...
 
1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales1990-2004 Bar Questions and Answers in Sales
1990-2004 Bar Questions and Answers in Sales
 
Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.Analysis on Law of Domicile under Private International laws.
Analysis on Law of Domicile under Private International laws.
 
Guide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docxGuide for Drug Education and Vice Control.docx
Guide for Drug Education and Vice Control.docx
 
Labour legislations in India and its history
Labour legislations in India and its historyLabour legislations in India and its history
Labour legislations in India and its history
 
Hungarian legislation made by Robert Miklos
Hungarian legislation made by Robert MiklosHungarian legislation made by Robert Miklos
Hungarian legislation made by Robert Miklos
 
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los AngelesAre There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
Are There Any Alternatives To Jail Time For Sex Crime Convictions in Los Angeles
 
Illinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guideIllinois Department Of Corrections reentry guide
Illinois Department Of Corrections reentry guide
 
PPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training CenterPPT Template - Federal Law Enforcement Training Center
PPT Template - Federal Law Enforcement Training Center
 
RA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptxRA. 7432 and RA 9994 Senior Citizen .pptx
RA. 7432 and RA 9994 Senior Citizen .pptx
 
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTSTHE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
THE INDIAN CONTRACT ACT 1872 NOTES FOR STUDENTS
 
Grey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptxGrey Area of the Information Technology Act, 2000.pptx
Grey Area of the Information Technology Act, 2000.pptx
 
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptxSarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
Sarvesh Raj IPS - A Journey of Dedication and Leadership.pptx
 
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal FrameworksUnderstanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
Understanding Cyber Crime Litigation: Key Concepts and Legal Frameworks
 
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC CounterclaimsTown of Haverhill's Motion for Summary Judgment on DTC Counterclaims
Town of Haverhill's Motion for Summary Judgment on DTC Counterclaims
 
Right to life and personal liberty under article 21
Right to life and personal liberty under article 21Right to life and personal liberty under article 21
Right to life and personal liberty under article 21
 
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdfWurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
Wurz Financial - Wealth Counsel to Law Firm Owners Services Guide.pdf
 

How can EMM help with GDPR compliance?

  • 1. How can EMM help with GDPR compliance? February 2018
  • 2. GDPR in a nutshell • The General Data Protection Regulation comes into effect May 25, 2018. • Designed to keep the personal data of EU’s 510+ million residents safe. • Holds organisations accountable for any data breaches. • In serious cases, notifies individuals of breaches of their personal info. • Businesses who fail to comply can be fined up to EUR 20 million, or 4% of their annual global turnover. • Gives individuals the right to know what information of theirs is stored, and allows them to request that this information be erased. • May require the appointment of a Data Protection Officer within the organisation.
  • 3. Mobile devices and your organisation? • Our organisations undoubtedly rely heavily on the use of smartphones, tablets and laptops. • The workforce is also becoming increasingly mobile, accessing data on the move and carrying devices 24 hours per day...outside of the work setting. • While this offers new opportunities that our businesses can’t live without, it also presents a new host of threats, specific to GDPR. • Mobile Device Management and Enterprise Mobility Management will be key factors in helping you achieve real-world compliance.
  • 4. 9 ways how EMM helps to achieve GDPR compliance 1. Enforce passcode requirements 2. Encrypt data 3. Separate work and private data and apps 4. Be prepared to wipe sensitive information 5. Control the applications running on your devices 6. Deploy and enforce settings 7. Know your software 8. Create reports for data security purposes 9. Be ready to act, if a device is lost or stolen
  • 5. 1. Lock screens and passcodes • It sounds simple, because it is. This is your first line of defence when it comes to protecting the data contained in your devices, especially if lost or stolen. • GDPR requires you to prove that you’re in control of user data and that you’ve taken steps to protect it. • Miradore’s EMM allows you to lock an open device, easily enforce passcode requirements on your devices, and remotely check to ensure compliance.
  • 6. 2. Unencrypted data is a liability • It’s important to understand how encryption works on your devices. • iOS devices have encryption built in, but only when a passcode is enabled. • Android devices may or may not come encrypted, so it’s important to be able to audit and enforce your corporate devices. • Use of an EMM product will enable you to enforce the use of Encryption across your fleet.
  • 7. 3. Separate work and private data • Administrators can create a ”work profile” in an Android device, which is separated from the user’s ”personal profile”. Data in the work profile can be wiped without deleting the user’s personal information stored on the device. • On iOS devices you can enable the Secure Email to separate company and personal data.
  • 8. 4. Destroying sensitive data • There will be times when you will need to wipe the device of all sensitive data. • Recommissioning a device for a new user. • Employee is leaving the organisation. • Device has gone missing. • Doing so at the press of a button is key to preventing breaches of information.
  • 9. 5. Control applications and data • Applications are great, and we typically have a lot of work and personal apps on our devices. • With EMM you can control your apps by: • Whitelisting specific apps that you want to allow on the devices. • Blacklisting inappropriate apps, or ones that use excessive data. • Setting a device into single app mode (kiosk mode). • Creating your own corporate App Store, consisting only of apps that you approve, and hiding the rest. • Protecting your Contacts by permitting apps based access to the Contacts.
  • 10. 6. Remotely deploy and enforce settings • Ease of use (or lack thereof) can be a real difference-maker when it comes to whether or not policies and settings are enforced across your network when using a third party EMM tool. • We feel that this shouldn’t be a pain point, and make it easier than ever to remotely deploy and enforce settings. • Examples are configuring approved wifi networks, and distributing VPN profiles. • In addition, save time and money by deploying company email configurations, monitoring data usage and mitigating roaming charges, to name a few.
  • 11. 7. Know your software versions • Cyber attacks, malware and ransomware like WannaCry and Petya are not just threats to your PC’s. Old versions of applications and applications from untrusted sources need to be updated with the latest security patches or restricted. • Having a central place to view the OS versions of your devices and push the latest app updates is an important step in protecting yourself. • Knowing this information, and using it in conjunction with anti-malware tools is a great way to stay ahead of the threats.
  • 12. 8. Reporting and logging capabilities • Your companies may have appointed a Data Protection Officer. This role is an important part of the GDPR, and this person must keep a watchful eye on company policies and affairs. • The Data Protection Officer will have to prove what steps have been taken to improve data security and protect personal data. • We recommend using an EMM tool to produce an extensive list of reports that add reassurance of compliance, and also weed out threats, such as applications that are potentially harmful. Being able to monitor everything from a central dashboard makes it much easier!
  • 13. 9. Protect yourself from theft • And we don’t mean wearing a fanny pack or a neck wallet around day to day...but it would help! • We’ve touched on this threat already, but it’s worth repeating because it is so simple, yet so easily overlooked. • The small size and portability of mobile devices makes them an easy target for theft. Even honest people that come across a misplaced iPhone might be inclined to keep it or sell it. • Even though you may never see your device again, ensuring your devices are protected with a passcode, encrypted and able to be wiped are so essential, that Miradore offers this for free.
  • 14. 9 ways how EMM helps to achieve GDPR compliance 1. Enforce passcode requirements 2. Encrypt data 3. Separate work and private data and apps 4. Be prepared to wipe sensitive information 5. Control the applications running on your devices 6. Deploy and enforce settings 7. Know your software 8. Create reports for data security purposes 9. Be ready to act, if a device is lost or stolen
  • 15. For more information • https://www.miradore.com/enterprise-mobility-management/ • https://www.miradore.com/gdpr/ • Key Terms • Mobile Device Management (MDM) • Enterprise Mobility Management (EMM) • Unified Endpoint Management (UEM) • Bring Your Own Device (BYOD) • Choose Your Own Device (CYOD) • Corporate Owned Personally Enabled (COPE)