SlideShare a Scribd company logo
1 of 38
1
aMS Aachen
15.11.2022
Personal and
confidential data
How to manage them in M365
(EN)
Sébastien PAULET
Thanks to our SPONSORs
Vielen Dank an unsere Partner!
2
Organizing sponsor
Organisatorischer
Partner
Sponsors
aMS Aachen 15/11/2022 @SP_twit 3
About me
• 15+ years experience in SharePoint, M365, Content Services,
Compliance
• Speaker and event organizer for aMS Community and MWCP
• Founding member of the Open-Source Project Harden 365
• Microsoft MVP “Enterprise Mobility” + “M365 Apps & Services” since
2017
• Follow me on Twitter @SP_twit or LinkedIn
aMS Aachen 15/11/2022 @SP_twit
Today
• CDO, ISSO, DPO share same risks about data and documents
Security Compliance
aMS Aachen 15/11/2022 @SP_twit
Sensitive data breach cost
• Source IBM and Ponemon
Institute's annual "Cost of a
Data Breach" report
• “Companies that had security
automation technologies
deployed experienced around
half the cost of a breach”
+20% / 5Y
aMS Aachen 15/11/2022 @SP_twit
Personnal data regulations
2010 – PDPA Personal Data Protection Act
Applies to all Malaysian citizen / companies
Fine: 500K MYR / 3Y jail
2018 – GDPR General Data Protection Regulation
Applies to all european citizen personal data
Fine: 20M€/4% consolidated worldwide revenue
2020 - CCPA California Consumer Privacy Act
Personnal data of californian residents
750$ / californian resident impacted + 7,5K$/violation
2021 – PIPL Personal Information Protection Law
Personal information
Fine : RMB 50M / 5% annual revenue + additional penalties
aMS Aachen 15/11/2022 @SP_twit
Discovery and data management is a challenge
8
KNOW YOUR DATA
aMS Aachen 15/11/2022 @SP_twit
Personnal data
« Personal data is any information that relates to an identified or identifiable living individual. Different pieces of
information, which collected together can lead to the identification of a particular person, also constitute personal data.
Personal data that has been de-identified, encrypted or pseudonymised but can be used to re-identify a person remains
personal data and falls within the scope of the GDPR.”
EU Commission
Examples :
• a name and surname; a home address;
• an email address such as name.surname@company.com;
• an identification card number;
• location data (for example the location data function on a mobile phone)*;
• an Internet Protocol (IP) address;
• data held by a hospital or doctor, which could be a symbol that uniquely identifies a person.
aMS Aachen 15/11/2022 @SP_twit
See existing with “Purview Content Explorer”
• Are those data sensitiv
aMS Aachen 15/11/2022 @SP_twit
3 ways to detect
SIT
Sensitive Info Types
200+ OOTB SIT
Includes Named
Entities
Includes Credentials
Can create your own
based on key words or
patterns (RegEx)
EDM
Exact Data Match
Input .csv .tsv files with:
Up to 100 million rows
Up to 32 columns (fields)
Up to 5 searchable
columns (fields)
TC
Trainable classifiers
~45 pre-trained
classifiers
Can create custom
ones (10.000 samples
required)
Supports 8 languages
including German
13
PROTECT YOUR
DATA
aMS Aachen 15/11/2022 @SP_twit
Retention labels
Sensitivity Labels
aMS Aachen 15/11/2022 @SP_twit
Sensitivity Labels
• Can be applied manually of Automatically
• Encrypt your data
• Impossible to access for non-authenticated users
• Restrict actions
• Block Copy/Paste, Printing, Screenshots, etc...
• Watermark
• On Word & Excel files
• [EMS] Block copy to USB key or use on non O365 services
• Windows information protection & Intune required
aMS Aachen 15/11/2022 @SP_twit
Demo creating & using Sensitivity Labels
aMS Aachen 15/11/2022 @SP_twit
Apply sentivity label new UX
aMS Aachen 15/11/2022 @SP_twit
How it works
• Brings “permissions” at file level
• Can be organized with labels / sub labels
• Public/private key system and on-the-fly encryption
(public keys RSA 2048 bits, and SHA-256 for signatures)
See https://docs.microsoft.com/fr-fr/information-protection/
understand-explore/how-does-it-work
• For most sensitive contents:
• Use DKE (Double Key Encryption) to use your own HSM (Hardware Security Module)
• Use a third-party key management system so even Microsoft is unable to decrypt file content
• Beware of service limitations (antimalware, eDiscovery, search, Office Web Apps)
aMS Aachen 15/11/2022 @SP_twit
Demo creating & using Sensitivity Labels
20
DATA LIFECYCLE
aMS Aachen 15/11/2022 @SP_twit
Retention policies
• Define & deploy
strategies for your
tenant
◦ By sharepoint sites
◦ By mailboxes
◦ By Office365 usergroups
• Adaptive scope the new features that will help you maintain those strategies
aMS Aachen 15/11/2022 @SP_twit
Retention Labels
• Configure retention labels at tenant level to manage
retention rules on email and documents
• Personal data, Finances etc..
• Automatic classification , suppress or archive a the end of the
retention period
• (ex : last modification + XX years)
• Applying a Retention Label can also be used to prevent wrongful user suppression
aMS Aachen 15/11/2022 @SP_twit
Retention Labels in Teams
aMS Aachen 15/11/2022 @SP_twit
Demo creating a retention label
aMS Aachen 15/11/2022 @SP_twit
Trigger Power Automate Workflow
aMS Aachen 15/11/2022 @SP_twit
Auto-applying rules & Policy
aMS Aachen 15/11/2022 @SP_twit
Disposition reviews
• Compliance administrator can review (with proper permissions) all
records pending disposition
• A 1 to 5 steps workflow
• More infos https://docs.microsoft.com/en-us/microsoft-
365/compliance/disposition?view=o365-worldwide#
disposition-reviews
aMS Aachen 15/11/2022 @SP_twit
Document Retention
• If user deletes or adds a version to a file
labeled as record :
• A version of the document is sent to the
Preservation Hold Library
• The document will be stored until the end of its retention label
or strategy
• This PHL is only accessible
by admin and compliance admin
• More infos https://docs.microsoft.com/en-us/microsoft-
365/compliance/retention-policies-sharepoint?view=o365-
worldwide
aMS Aachen 15/11/2022 @SP_twit
Event based retention
• Retention based on organisational events :
• Employee leaving the organisation
• Contract expiring
• Enforcing product lifecycle and documentation
• Existing Graph API
33
PREVENT DATA
LOSS
aMS Aachen 15/11/2022 @SP_twit
DLP Applies to
• Exchange Online email
• SharePoint Online sites
• OneDrive accounts
• Teams chat and channel messages
• Microsoft Defender for Cloud Apps
• Windows 10, Windows 11, and macOS (three latest released versions)
devices
• On-premises repositories
• PowerBI sites (preview)
aMS Aachen 15/11/2022 @SP_twit
Based on
• Properties
• SIT
• Sensitivity labels
• Trainable classifiers
• Retention labels
• Can use logical operators (AND/ OR) and exceptions
• Allow or not end users to override policy
aMS Aachen 15/11/2022 @SP_twit
Actions
• show a pop-up policy tip to the user that warns them that they
may be trying to share a sensitive item inappropriately
• block the sharing and, via a policy tip, allow the user to override
the block and capture the users' justification
• block the sharing without the override option
• for data at rest, sensitive items can be locked and moved to a
secure quarantine location
• for Teams chat, the sensitive information will not be displayed
aMS Aachen 15/11/2022 @SP_twit
Actions
aMS Aachen 15/11/2022 @SP_twit
DLP policies applied through Edge
aMS Aachen 15/11/2022 @SP_twit
Get Alerts / reports
40
LICENSING
aMS Aachen 15/11/2022 @SP_twit
Licensing (thanks Aaron Dinnage)
42
THANK YOU!
MERCI !

More Related Content

Similar to aMS Aachen -Personal and confidential data - how to manage them in M365 2022-11-15

B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...aOS Community
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Amazon Web Services
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarRobert Crane
 
Augmentation, Collaboration, Governance: Defining the Future of Self-Service BI
Augmentation, Collaboration, Governance: Defining the Future of Self-Service BIAugmentation, Collaboration, Governance: Defining the Future of Self-Service BI
Augmentation, Collaboration, Governance: Defining the Future of Self-Service BIDenodo
 
Microsoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMicrosoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMike Brannon
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptxTrack 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptxAmazon Web Services
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSAmazon Web Services
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseEvan Hodges
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestAdrian Dumitrescu
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...☁️ Gustavo Magella
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedAlbert Hoitingh
 
Company Profile - NPC with TIBCO Spotfire solution
Company Profile - NPC with TIBCO Spotfire solution  Company Profile - NPC with TIBCO Spotfire solution
Company Profile - NPC with TIBCO Spotfire solution Sirinporn Setworaya
 
Scottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveScottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveAlbert Hoitingh
 
Top tips for successfully migrating from SharePoint and file servers to Micro...
Top tips for successfully migrating from SharePoint and file servers to Micro...Top tips for successfully migrating from SharePoint and file servers to Micro...
Top tips for successfully migrating from SharePoint and file servers to Micro...Alistair Pugin
 
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLaboraDK
 
2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics2022 Trends in Enterprise Analytics
2022 Trends in Enterprise AnalyticsDATAVERSITY
 

Similar to aMS Aachen -Personal and confidential data - how to manage them in M365 2022-11-15 (20)

B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
2018-10-23 4 B - Data leakage prevention and rights management in Office 365 ...
 
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...Top five configuration security errors and how to avoid them - DEM09-S - Chic...
Top five configuration security errors and how to avoid them - DEM09-S - Chic...
 
June 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know WebinarJune 2020 Microsoft 365 Need to Know Webinar
June 2020 Microsoft 365 Need to Know Webinar
 
Augmentation, Collaboration, Governance: Defining the Future of Self-Service BI
Augmentation, Collaboration, Governance: Defining the Future of Self-Service BIAugmentation, Collaboration, Governance: Defining the Future of Self-Service BI
Augmentation, Collaboration, Governance: Defining the Future of Self-Service BI
 
Microsoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptxMicrosoft Security Advice ISSA Slides.pptx
Microsoft Security Advice ISSA Slides.pptx
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptxTrack 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
Track 1 Session 6_建立安全高效的資料分析平台加速金融創新_HC+EMQ Cliff(已檢核,上下無黑邊).pptx
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWS
 
SharePoint Online vs. On-Premise
SharePoint Online vs. On-PremiseSharePoint Online vs. On-Premise
SharePoint Online vs. On-Premise
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & Cyberquest
 
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
[IGNITE2018] [BRK2495] What’s new in Microsoft Information Protection solutio...
 
CollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystifiedCollabDaysBE - Microsoft Purview Information Protection demystified
CollabDaysBE - Microsoft Purview Information Protection demystified
 
Company Profile - NPC with TIBCO Spotfire solution
Company Profile - NPC with TIBCO Spotfire solution  Company Profile - NPC with TIBCO Spotfire solution
Company Profile - NPC with TIBCO Spotfire solution
 
Scottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep diveScottish Summit - Sensitivity labels deep dive
Scottish Summit - Sensitivity labels deep dive
 
Top tips for successfully migrating from SharePoint and file servers to Micro...
Top tips for successfully migrating from SharePoint and file servers to Micro...Top tips for successfully migrating from SharePoint and file servers to Micro...
Top tips for successfully migrating from SharePoint and file servers to Micro...
 
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange ArchivingCoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
CoLabora Nov 2015 - Ofice 365 Compliance and Exchange Archiving
 
2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics
 

More from Sébastien Paulet

aMS Southeast Asia - Security and compliance M365 with labels 16102021
aMS Southeast Asia - Security and compliance M365 with labels 16102021aMS Southeast Asia - Security and compliance M365 with labels 16102021
aMS Southeast Asia - Security and compliance M365 with labels 16102021Sébastien Paulet
 
aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021Sébastien Paulet
 
Teams Nation - Syntex dans Teams
Teams Nation - Syntex dans TeamsTeams Nation - Syntex dans Teams
Teams Nation - Syntex dans TeamsSébastien Paulet
 
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021Sébastien Paulet
 
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020Sébastien Paulet
 
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020Sébastien Paulet
 
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content ServicesaOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content ServicesSébastien Paulet
 
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365Sébastien Paulet
 
aOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teamsaOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teamsSébastien Paulet
 
aOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teamsaOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teamsSébastien Paulet
 
aOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rushaOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rushSébastien Paulet
 
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usagesaOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usagesSébastien Paulet
 
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...Sébastien Paulet
 
Cyber security and microsoft 365 in action
Cyber security and microsoft 365 in actionCyber security and microsoft 365 in action
Cyber security and microsoft 365 in actionSébastien Paulet
 
All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020Sébastien Paulet
 
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...Sébastien Paulet
 
Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Sébastien Paulet
 
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...Sébastien Paulet
 
Back from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortexBack from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortexSébastien Paulet
 
MWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en actionMWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en actionSébastien Paulet
 

More from Sébastien Paulet (20)

aMS Southeast Asia - Security and compliance M365 with labels 16102021
aMS Southeast Asia - Security and compliance M365 with labels 16102021aMS Southeast Asia - Security and compliance M365 with labels 16102021
aMS Southeast Asia - Security and compliance M365 with labels 16102021
 
aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021aMS Strasbourg Cybersec et M365 en action 14102021
aMS Strasbourg Cybersec et M365 en action 14102021
 
Teams Nation - Syntex dans Teams
Teams Nation - Syntex dans TeamsTeams Nation - Syntex dans Teams
Teams Nation - Syntex dans Teams
 
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
Microsoft Syntex - Digitalisez vos contenus d'entreprise @MWCP21 20/01/2021
 
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
Cortex -Syntex Digitalize your company info @M365 California 22/01/2020
 
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020 Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
Cortex/Syntex : Digitalize your company information -aOS South Asia 24/10/2020
 
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content ServicesaOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
aOS Nice 2020 : Les nouveautés du MS Ignite 2020 sur les Content Services
 
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
M365 Gurgaon 2020 - How to manage sensitive and personal data in M365
 
aOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teamsaOS Solidarite NC - Aller plus loin dans teams
aOS Solidarite NC - Aller plus loin dans teams
 
aOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teamsaOS Solidarite NC - Gouvernance teams
aOS Solidarite NC - Gouvernance teams
 
aOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rushaOS solidarite NC - Teams, apres le rush
aOS solidarite NC - Teams, apres le rush
 
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usagesaOS Solidarite NC M365 Virtual Marathon - O365 par les usages
aOS Solidarite NC M365 Virtual Marathon - O365 par les usages
 
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
M365 Virtual Marathon - Retour Ignite et Build sur les content services et pr...
 
Cyber security and microsoft 365 in action
Cyber security and microsoft 365 in actionCyber security and microsoft 365 in action
Cyber security and microsoft 365 in action
 
All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020All about documents in O365 - M365 May 2020
All about documents in O365 - M365 May 2020
 
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
Télétravail et collaboration avec Microsoft Teams - aOS Solidarité Calédonie ...
 
Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020Cybersecurité dans M365 - aOS Noumea 28-02-2020
Cybersecurité dans M365 - aOS Noumea 28-02-2020
 
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...MS ignite : les nouveautés autour des content services et projet cortex - aOS...
MS ignite : les nouveautés autour des content services et projet cortex - aOS...
 
Back from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortexBack from MS Ignite 2019 content service projet cortex
Back from MS Ignite 2019 content service projet cortex
 
MWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en actionMWCP19 Cybersécurité et M365 en action
MWCP19 Cybersécurité et M365 en action
 

Recently uploaded

Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

aMS Aachen -Personal and confidential data - how to manage them in M365 2022-11-15

  • 1. 1 aMS Aachen 15.11.2022 Personal and confidential data How to manage them in M365 (EN) Sébastien PAULET
  • 2. Thanks to our SPONSORs Vielen Dank an unsere Partner! 2 Organizing sponsor Organisatorischer Partner Sponsors
  • 3. aMS Aachen 15/11/2022 @SP_twit 3 About me • 15+ years experience in SharePoint, M365, Content Services, Compliance • Speaker and event organizer for aMS Community and MWCP • Founding member of the Open-Source Project Harden 365 • Microsoft MVP “Enterprise Mobility” + “M365 Apps & Services” since 2017 • Follow me on Twitter @SP_twit or LinkedIn
  • 4. aMS Aachen 15/11/2022 @SP_twit Today • CDO, ISSO, DPO share same risks about data and documents Security Compliance
  • 5. aMS Aachen 15/11/2022 @SP_twit Sensitive data breach cost • Source IBM and Ponemon Institute's annual "Cost of a Data Breach" report • “Companies that had security automation technologies deployed experienced around half the cost of a breach” +20% / 5Y
  • 6. aMS Aachen 15/11/2022 @SP_twit Personnal data regulations 2010 – PDPA Personal Data Protection Act Applies to all Malaysian citizen / companies Fine: 500K MYR / 3Y jail 2018 – GDPR General Data Protection Regulation Applies to all european citizen personal data Fine: 20M€/4% consolidated worldwide revenue 2020 - CCPA California Consumer Privacy Act Personnal data of californian residents 750$ / californian resident impacted + 7,5K$/violation 2021 – PIPL Personal Information Protection Law Personal information Fine : RMB 50M / 5% annual revenue + additional penalties
  • 7. aMS Aachen 15/11/2022 @SP_twit Discovery and data management is a challenge
  • 9. aMS Aachen 15/11/2022 @SP_twit Personnal data « Personal data is any information that relates to an identified or identifiable living individual. Different pieces of information, which collected together can lead to the identification of a particular person, also constitute personal data. Personal data that has been de-identified, encrypted or pseudonymised but can be used to re-identify a person remains personal data and falls within the scope of the GDPR.” EU Commission Examples : • a name and surname; a home address; • an email address such as name.surname@company.com; • an identification card number; • location data (for example the location data function on a mobile phone)*; • an Internet Protocol (IP) address; • data held by a hospital or doctor, which could be a symbol that uniquely identifies a person.
  • 10. aMS Aachen 15/11/2022 @SP_twit See existing with “Purview Content Explorer” • Are those data sensitiv
  • 11. aMS Aachen 15/11/2022 @SP_twit 3 ways to detect SIT Sensitive Info Types 200+ OOTB SIT Includes Named Entities Includes Credentials Can create your own based on key words or patterns (RegEx) EDM Exact Data Match Input .csv .tsv files with: Up to 100 million rows Up to 32 columns (fields) Up to 5 searchable columns (fields) TC Trainable classifiers ~45 pre-trained classifiers Can create custom ones (10.000 samples required) Supports 8 languages including German
  • 13. aMS Aachen 15/11/2022 @SP_twit Retention labels Sensitivity Labels
  • 14. aMS Aachen 15/11/2022 @SP_twit Sensitivity Labels • Can be applied manually of Automatically • Encrypt your data • Impossible to access for non-authenticated users • Restrict actions • Block Copy/Paste, Printing, Screenshots, etc... • Watermark • On Word & Excel files • [EMS] Block copy to USB key or use on non O365 services • Windows information protection & Intune required
  • 15. aMS Aachen 15/11/2022 @SP_twit Demo creating & using Sensitivity Labels
  • 16. aMS Aachen 15/11/2022 @SP_twit Apply sentivity label new UX
  • 17. aMS Aachen 15/11/2022 @SP_twit How it works • Brings “permissions” at file level • Can be organized with labels / sub labels • Public/private key system and on-the-fly encryption (public keys RSA 2048 bits, and SHA-256 for signatures) See https://docs.microsoft.com/fr-fr/information-protection/ understand-explore/how-does-it-work • For most sensitive contents: • Use DKE (Double Key Encryption) to use your own HSM (Hardware Security Module) • Use a third-party key management system so even Microsoft is unable to decrypt file content • Beware of service limitations (antimalware, eDiscovery, search, Office Web Apps)
  • 18. aMS Aachen 15/11/2022 @SP_twit Demo creating & using Sensitivity Labels
  • 20. aMS Aachen 15/11/2022 @SP_twit Retention policies • Define & deploy strategies for your tenant ◦ By sharepoint sites ◦ By mailboxes ◦ By Office365 usergroups • Adaptive scope the new features that will help you maintain those strategies
  • 21. aMS Aachen 15/11/2022 @SP_twit Retention Labels • Configure retention labels at tenant level to manage retention rules on email and documents • Personal data, Finances etc.. • Automatic classification , suppress or archive a the end of the retention period • (ex : last modification + XX years) • Applying a Retention Label can also be used to prevent wrongful user suppression
  • 22. aMS Aachen 15/11/2022 @SP_twit Retention Labels in Teams
  • 23. aMS Aachen 15/11/2022 @SP_twit Demo creating a retention label
  • 24. aMS Aachen 15/11/2022 @SP_twit Trigger Power Automate Workflow
  • 25. aMS Aachen 15/11/2022 @SP_twit Auto-applying rules & Policy
  • 26. aMS Aachen 15/11/2022 @SP_twit Disposition reviews • Compliance administrator can review (with proper permissions) all records pending disposition • A 1 to 5 steps workflow • More infos https://docs.microsoft.com/en-us/microsoft- 365/compliance/disposition?view=o365-worldwide# disposition-reviews
  • 27. aMS Aachen 15/11/2022 @SP_twit Document Retention • If user deletes or adds a version to a file labeled as record : • A version of the document is sent to the Preservation Hold Library • The document will be stored until the end of its retention label or strategy • This PHL is only accessible by admin and compliance admin • More infos https://docs.microsoft.com/en-us/microsoft- 365/compliance/retention-policies-sharepoint?view=o365- worldwide
  • 28. aMS Aachen 15/11/2022 @SP_twit Event based retention • Retention based on organisational events : • Employee leaving the organisation • Contract expiring • Enforcing product lifecycle and documentation • Existing Graph API
  • 30. aMS Aachen 15/11/2022 @SP_twit DLP Applies to • Exchange Online email • SharePoint Online sites • OneDrive accounts • Teams chat and channel messages • Microsoft Defender for Cloud Apps • Windows 10, Windows 11, and macOS (three latest released versions) devices • On-premises repositories • PowerBI sites (preview)
  • 31. aMS Aachen 15/11/2022 @SP_twit Based on • Properties • SIT • Sensitivity labels • Trainable classifiers • Retention labels • Can use logical operators (AND/ OR) and exceptions • Allow or not end users to override policy
  • 32. aMS Aachen 15/11/2022 @SP_twit Actions • show a pop-up policy tip to the user that warns them that they may be trying to share a sensitive item inappropriately • block the sharing and, via a policy tip, allow the user to override the block and capture the users' justification • block the sharing without the override option • for data at rest, sensitive items can be locked and moved to a secure quarantine location • for Teams chat, the sensitive information will not be displayed
  • 33. aMS Aachen 15/11/2022 @SP_twit Actions
  • 34. aMS Aachen 15/11/2022 @SP_twit DLP policies applied through Edge
  • 35. aMS Aachen 15/11/2022 @SP_twit Get Alerts / reports
  • 37. aMS Aachen 15/11/2022 @SP_twit Licensing (thanks Aaron Dinnage)