SlideShare a Scribd company logo
Data privacy: How do you protect
and delete data in the cloud
M: +91 9611 171 345 Email: sales@salesbabu.com
Data privacy: How do
you protect and delete
data in the cloud.
Protecting our customer data has always been the top
priority for our businesses. But in today’s world of
technology, doing this is increasingly extending beyond
moral responsibility and taking on the form of legal
requirement.
.
Different marketing and CRM softwares collect and
maintain various customer data in cloud environment to
use it on a daily basis for processing and marketing
purposes. These client details are used for customer
tracking, marketing and sales campaigning purposes.
Every customer wants to keep individuals’ personal data
secure and private.
M: +91 9611 171 345 Email: sales@salesbabu.com
Introduction
M: +91 9611 171 345 Email: sales@salesbabu.com
Personal data collected on the customers can include names, id numbers, location data, online identifiers,
profiling data and almost any data about a client. The processing of this data includes any operation
performed on personal data e.g. collection, recording, storage, adaption, altering, transmitting, erasure,
destruction. Various regulations are added to these processing to maintain the integrity of these collected
data.
Few regulations that are being followed by different companies while collecting and processing their
customers’ data are as follows:
● General Data Protection Regulation (GDPR), European Union
● Personal Information Protection Act (PIPA), Japan
● Health Insurance Portability and Accountability Act (HIPAA), United States
● Privacy Act, Australia
● Personal Information Protection and Electronic Documents Act (PIPEDA), Canada.
Data Security measures
M: +91 9611 171 345 Email: sales@salesbabu.com
Additional security measure are implemented by various cloud service vendors like Amazon Web
Services, Google Cloud Platform, IBM cloud and many more. These security measures gives users
ownership and control over their content through various user friendly and powerful tools. These cloud
security tools allow users to determine where their content will be stored and mode of data management.
Flexibility of choosing the kind of cloud deployment like – private, public, or multi-cloud will allow users to
pick the best suited security system for their business model. Along with these measures, data owners
can also choose the kind of network encryption solutions which will be best suited for their needs. Usually
either virtual or hardware-based encryption is used to ensure that data is protected as it is transferred
across the network cloud.
To ensure that the customer data is truly secure, cloud data encryption combined with strong key
management is implemented for storing regulated data in the cloud. This combination of encryption and
data key, will allow users to protect sensitive data outside of their control as it is transferred, shared or
used for various cloud based environments.
To further secure the data in the cloud, it’s recommended to own both the generation and administration
of the data encryption keys. Data owners can utilize a physical or a virtual key system along with
hardware storage mechanism to manage the key lifecycle.
Data Protection methods
M: +91 9611 171 345 Email: sales@salesbabu.com
Secure the online CRM data servers
The first step for data protection is to make sure that individuals and businesses outside of your organization
can’t get access to your customer data. In today’s world, we have the option of keeping our CRM customer
data in the cloud. With the level of security in a cloud based CRM solution, all your customer data is well
secured and backed up using these cloud based security measures.
We should also keep in mind that in a cloud environment, the hardware and configuration of the CRM
software, is only part of your security protocols. Regardless of the CRM hosting location, we need to
establish documented procedures for login protocols, password resets, employee access, and physical
acquisition to server hardware.
Data Protection methods continues...
M: +91 9611 171 345 Email: sales@salesbabu.com
Role based data Access
Protecting the online server access is very important to restrict any outside invasion to your customer data.
While creating various data access restriction, we should analyze below questions for each role before
granting access for them:
● Does this user or role need access to this form or data for their regular job?
● Will this user need to frequently extract data from CRM, or sync it with another device or gadget, in
order to do their job?
● Will there be a privacy concern for either our customers or the employees if this user has access to this
information?
Once we have clear answers to all the above questions, we can easily make various filtered access to each
employee and keep the data security as simple as it can get. With required access levels, there are negligible
options of data leakage and misuse.
Data Protection methods continues...
M: +91 9611 171 345 Email: sales@salesbabu.com
Regular auditing
Regular auditing and verification of employees access control versus the accessed data by them, will keep a
check on any security breaches which might happen in regular workflows. List of employees who are at a
high risk of damaging the organization, needs to flagged and immediately terminated before they end up
making any major damage to the company’s or customer data.
Regular auditing and screening of security measures and other processes, projects any flaws or reworks that
might be present in the current business operations. This help in formulating proactive and futuristic measure
for effective customer data protection.
Data Protection methods continues...
M: +91 9611 171 345 Email: sales@salesbabu.com
Employment Agreement
An employment agreement is majorly a clear communication about expected employee behavior, and legal
protection to the organization if those expectations are not met.
Both the company’s management and employee should be well aware of these employment agreements to
understand the mode of conduct of an employee with its employer. In an event of agreement violation, the
aggressive measure should be taken to protect not only the customer and company’s property but also make
a benchmark for the working procedure of the agreement clauses.
In today’s world of diversified working cultures and employee’s background, it's very important to have
common ground rules which will not only facilitate confidentiality of customer and company' property but also
help employees to understand the expectations set for each of them.
Data Protection methods continues...
M: +91 9611 171 345 Email: sales@salesbabu.com
Customer Agreement
Once we start on a long term relationship with our customers, it's very important for both the parties to have
clear expectations from each other. With a clear set of legal agreements on the data protection and usability
norms, customers are well aware of the data protection processes and procedures that are followed as per
the company’s policies. Also, customers can define and customize the data privacy clauses to understand
what level of data sharing is done. Some of the major queries which can be included in the agreement
document can be as follows:
● Which customer information is being collected?
● Who is collecting this information?
● How and which mode is used to collect this data?
● Why particular information is being collected?
● Whom the data can be shared with?
● What is the intent of the data usage?
With above and more customised user agreement details , it gives a clear picture of which level of data
protection and sharing needs to be maintained by the company.
Data Deletion
M: +91 9611 171 345 Email: sales@salesbabu.com
The concept of a “right to be forgotten” is not an entirely new legal notion, but is being followed in all the mainstream CRM
softwares across the globe. The principal understanding of this right is to enable an individual or company to request the
deletion or removal of one's personal data where there is no conclusive reason for its continued processing.
When does the “right to be forgotten” or erasure apply?
Every Individual or company have a right to have personal data erased and to prevent processing in specific circumstances:
• Where the personal data is no longer needed in intend to the purpose for which it was originally collected/processed;
• When the individual withdraws consent or agreement.
• When the individual objects or have concerns to the current or further processing of data and there is no other legal ground for
the relevant processing activity to continue.
• When the personal data was unlawfully processed or shared.
• Where the personal data has to be erased in order to comply with a legal agreement.
A system administrator (individual user acting on behalf of their organization) can delete data from their data center and server
storage. This data is deleted from the system with immediate effect and cannot be recovered by any users or company’s
employees after a current or future point of the agreement date. Personal and company’s private data which has been deleted
or otherwise destroyed should not be recovered at any time. Sufficient warning should be given to the account administrator
before they permanently delete anything related to an individual or company’s profile.
Conclusion
M: +91 9611 171 345 Email: sales@salesbabu.com
To summarize, it is hard work to protect your customer data. Formulating agreements and setting up data
security routines are the best ways to achieve a mirror view of your customer requirements. Your CRM
system and business practices should be playing a pivotal role in protecting your customers and maintaining
the integrity of data sharing and deletion.
All Right Reserved © 2007- 2019
SalesBabu Business Solutions Pvt. Ltd

More Related Content

What's hot

Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
Constantine Karbaliotis
 
SAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | Symmetry
Symmetry™
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix LLC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
EMC
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
Juan Niekerk
 
The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018
Shane Gray
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
Network Intelligence India
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
Eryk Budi Pratama
 
Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)
Gerson Trigueiros
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
Ulf Mattsson
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Eryk Budi Pratama
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
RSIS International
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
Juan Niekerk
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
Product Marketing Services
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Eryk Budi Pratama
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
Cathy Gilmartin
 
Big data - The next best thing
Big data - The next best thingBig data - The next best thing
Big data - The next best thing
Bharath Rao
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
Eryk Budi Pratama
 
GDPR offer by Keley-Data
GDPR offer by Keley-DataGDPR offer by Keley-Data
GDPR offer by Keley-Data
Hatime Araki
 
Curb to core White Paper
Curb to core White PaperCurb to core White Paper
Curb to core White Paper
Ryan Hadden
 

What's hot (20)

Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
SAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | SymmetrySAP Compliance Management Demystified | Symmetry
SAP Compliance Management Demystified | Symmetry
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
 
The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018The implications of gdpr for the solutions industry tatech 2018
The implications of gdpr for the solutions industry tatech 2018
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)Eu data protection regulations (point-of-view)
Eu data protection regulations (point-of-view)
 
Cross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive dataCross border - off-shoring and outsourcing privacy sensitive data
Cross border - off-shoring and outsourcing privacy sensitive data
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
Partner enablement GDPR
Partner enablement GDPRPartner enablement GDPR
Partner enablement GDPR
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
GDPR: Time to Act
GDPR: Time to ActGDPR: Time to Act
GDPR: Time to Act
 
Big data - The next best thing
Big data - The next best thingBig data - The next best thing
Big data - The next best thing
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
GDPR offer by Keley-Data
GDPR offer by Keley-DataGDPR offer by Keley-Data
GDPR offer by Keley-Data
 
Curb to core White Paper
Curb to core White PaperCurb to core White Paper
Curb to core White Paper
 

Similar to Data privacy how do you protect and delete data in the cloud

Data privacy how do you protect and delete data in the cloud
Data privacy  how do you protect and delete data in the cloudData privacy  how do you protect and delete data in the cloud
Data privacy how do you protect and delete data in the cloud
SalesBabuCRM
 
Five ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloudFive ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloud
SalesBabuCRM
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
amiable_indian
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
TrustArc
 
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENTContemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
PoulomiMukherjee12
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
ObservePoint
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
Sarah Fane
 
DMS data integration: 6 ways to get it right
DMS data integration: 6 ways to get it rightDMS data integration: 6 ways to get it right
DMS data integration: 6 ways to get it right
ETLSolutions
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
aryan532920
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
V2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
V2Infotech1
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
Gigya
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
Aankur Gupta
 
Streamlining Data Privacy.pdf
Streamlining Data Privacy.pdfStreamlining Data Privacy.pdf
Streamlining Data Privacy.pdf
TEWMAGAZINE
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Robert Crane
 
Asset Security
Asset Security Asset Security
Asset Security
Jagbir Singh
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
BurCom Consulting Ltd.
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
rtodd599
 

Similar to Data privacy how do you protect and delete data in the cloud (20)

Data privacy how do you protect and delete data in the cloud
Data privacy  how do you protect and delete data in the cloudData privacy  how do you protect and delete data in the cloud
Data privacy how do you protect and delete data in the cloud
 
Five ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloudFive ways to protect your crm data in the cloud
Five ways to protect your crm data in the cloud
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENTContemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
Contemporary_Issues_IN_CUSTOMER_RELATIONSHIP_ MANAGEMENT
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
DMS data integration: 6 ways to get it right
DMS data integration: 6 ways to get it rightDMS data integration: 6 ways to get it right
DMS data integration: 6 ways to get it right
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Managing data security and privacy in call centres ankur gupta
Managing data security and privacy in call centres   ankur guptaManaging data security and privacy in call centres   ankur gupta
Managing data security and privacy in call centres ankur gupta
 
Streamlining Data Privacy.pdf
Streamlining Data Privacy.pdfStreamlining Data Privacy.pdf
Streamlining Data Privacy.pdf
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
Asset Security
Asset Security Asset Security
Asset Security
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
Ten top tips on keeping your business secure
Ten top tips on keeping your business secureTen top tips on keeping your business secure
Ten top tips on keeping your business secure
 
Sample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docxSample Data Security PoliciesThis document provides three ex.docx
Sample Data Security PoliciesThis document provides three ex.docx
 

More from SalesBabuCRM

Ppt top challenges in crm implementation
Ppt   top challenges in crm implementationPpt   top challenges in crm implementation
Ppt top challenges in crm implementation
SalesBabuCRM
 
Few reasons why your business must opt for a cloud-based CRM solution?
Few reasons why your business must opt for a cloud-based CRM solution?Few reasons why your business must opt for a cloud-based CRM solution?
Few reasons why your business must opt for a cloud-based CRM solution?
SalesBabuCRM
 
5 inventory reduction strategies for a more profitable business
5 inventory reduction strategies for a more profitable business5 inventory reduction strategies for a more profitable business
5 inventory reduction strategies for a more profitable business
SalesBabuCRM
 
CRM for Pharmaceutical Industry | SalesBabu CRM
CRM for Pharmaceutical Industry | SalesBabu CRMCRM for Pharmaceutical Industry | SalesBabu CRM
CRM for Pharmaceutical Industry | SalesBabu CRM
SalesBabuCRM
 
Reduce operational cost with inventory management system
Reduce operational cost with inventory management systemReduce operational cost with inventory management system
Reduce operational cost with inventory management system
SalesBabuCRM
 
Crm in manufacturing industry get closer to your customers
Crm in manufacturing industry  get closer to your customersCrm in manufacturing industry  get closer to your customers
Crm in manufacturing industry get closer to your customers
SalesBabuCRM
 
5 inventory reduction strategies for a more profitable business
5 inventory reduction strategies for a more profitable business5 inventory reduction strategies for a more profitable business
5 inventory reduction strategies for a more profitable business
SalesBabuCRM
 
What is an invoice definition, meaning and more
What is an invoice  definition, meaning and more What is an invoice  definition, meaning and more
What is an invoice definition, meaning and more
SalesBabuCRM
 
Can your business survive without a proposal software
Can your business survive without a proposal software Can your business survive without a proposal software
Can your business survive without a proposal software
SalesBabuCRM
 
What is Purchase Order? Definition, Meaning, Creation and Presentation
What is Purchase Order? Definition, Meaning, Creation and PresentationWhat is Purchase Order? Definition, Meaning, Creation and Presentation
What is Purchase Order? Definition, Meaning, Creation and Presentation
SalesBabuCRM
 
Implement crm to boost your revenue
Implement crm to boost your revenueImplement crm to boost your revenue
Implement crm to boost your revenue
SalesBabuCRM
 
What is invoice definition, meaning and more..
What is invoice   definition, meaning and more..What is invoice   definition, meaning and more..
What is invoice definition, meaning and more..
SalesBabuCRM
 
Online crm for sales & distribution
Online crm for sales & distributionOnline crm for sales & distribution
Online crm for sales & distribution
SalesBabuCRM
 
Switch from old traditional ways to new one to improve sales
Switch from old traditional ways to new one to improve salesSwitch from old traditional ways to new one to improve sales
Switch from old traditional ways to new one to improve sales
SalesBabuCRM
 
Improve your productivity for overall improvement of organisation
Improve your productivity for overall improvement of organisationImprove your productivity for overall improvement of organisation
Improve your productivity for overall improvement of organisation
SalesBabuCRM
 
How to become the better customers resource
How to become the better customers resourceHow to become the better customers resource
How to become the better customers resource
SalesBabuCRM
 
Improve your productivity for overall improvement of organisation
Improve your productivity for overall improvement of organisationImprove your productivity for overall improvement of organisation
Improve your productivity for overall improvement of organisation
SalesBabuCRM
 
Sales have never been easy without sales tracking app
Sales have never been easy without sales tracking appSales have never been easy without sales tracking app
Sales have never been easy without sales tracking app
SalesBabuCRM
 
How to protect your small business from cyber attack
How to protect your small business from cyber attackHow to protect your small business from cyber attack
How to protect your small business from cyber attack
SalesBabuCRM
 
Online quotation management software
Online quotation management softwareOnline quotation management software
Online quotation management software
SalesBabuCRM
 

More from SalesBabuCRM (20)

Ppt top challenges in crm implementation
Ppt   top challenges in crm implementationPpt   top challenges in crm implementation
Ppt top challenges in crm implementation
 
Few reasons why your business must opt for a cloud-based CRM solution?
Few reasons why your business must opt for a cloud-based CRM solution?Few reasons why your business must opt for a cloud-based CRM solution?
Few reasons why your business must opt for a cloud-based CRM solution?
 
5 inventory reduction strategies for a more profitable business
5 inventory reduction strategies for a more profitable business5 inventory reduction strategies for a more profitable business
5 inventory reduction strategies for a more profitable business
 
CRM for Pharmaceutical Industry | SalesBabu CRM
CRM for Pharmaceutical Industry | SalesBabu CRMCRM for Pharmaceutical Industry | SalesBabu CRM
CRM for Pharmaceutical Industry | SalesBabu CRM
 
Reduce operational cost with inventory management system
Reduce operational cost with inventory management systemReduce operational cost with inventory management system
Reduce operational cost with inventory management system
 
Crm in manufacturing industry get closer to your customers
Crm in manufacturing industry  get closer to your customersCrm in manufacturing industry  get closer to your customers
Crm in manufacturing industry get closer to your customers
 
5 inventory reduction strategies for a more profitable business
5 inventory reduction strategies for a more profitable business5 inventory reduction strategies for a more profitable business
5 inventory reduction strategies for a more profitable business
 
What is an invoice definition, meaning and more
What is an invoice  definition, meaning and more What is an invoice  definition, meaning and more
What is an invoice definition, meaning and more
 
Can your business survive without a proposal software
Can your business survive without a proposal software Can your business survive without a proposal software
Can your business survive without a proposal software
 
What is Purchase Order? Definition, Meaning, Creation and Presentation
What is Purchase Order? Definition, Meaning, Creation and PresentationWhat is Purchase Order? Definition, Meaning, Creation and Presentation
What is Purchase Order? Definition, Meaning, Creation and Presentation
 
Implement crm to boost your revenue
Implement crm to boost your revenueImplement crm to boost your revenue
Implement crm to boost your revenue
 
What is invoice definition, meaning and more..
What is invoice   definition, meaning and more..What is invoice   definition, meaning and more..
What is invoice definition, meaning and more..
 
Online crm for sales & distribution
Online crm for sales & distributionOnline crm for sales & distribution
Online crm for sales & distribution
 
Switch from old traditional ways to new one to improve sales
Switch from old traditional ways to new one to improve salesSwitch from old traditional ways to new one to improve sales
Switch from old traditional ways to new one to improve sales
 
Improve your productivity for overall improvement of organisation
Improve your productivity for overall improvement of organisationImprove your productivity for overall improvement of organisation
Improve your productivity for overall improvement of organisation
 
How to become the better customers resource
How to become the better customers resourceHow to become the better customers resource
How to become the better customers resource
 
Improve your productivity for overall improvement of organisation
Improve your productivity for overall improvement of organisationImprove your productivity for overall improvement of organisation
Improve your productivity for overall improvement of organisation
 
Sales have never been easy without sales tracking app
Sales have never been easy without sales tracking appSales have never been easy without sales tracking app
Sales have never been easy without sales tracking app
 
How to protect your small business from cyber attack
How to protect your small business from cyber attackHow to protect your small business from cyber attack
How to protect your small business from cyber attack
 
Online quotation management software
Online quotation management softwareOnline quotation management software
Online quotation management software
 

Recently uploaded

Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Lviv Startup Club
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
dylandmeas
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
Ben Wann
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
agatadrynko
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
Allensmith572606
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta 143
Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta 143Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta 143
Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta 143
bosssp10
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 

Recently uploaded (20)

Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
 
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdfMeas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
Meas_Dylan_DMBS_PB1_2024-05XX_Revised.pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
Improving profitability for small business
Improving profitability for small businessImproving profitability for small business
Improving profitability for small business
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdfikea_woodgreen_petscharity_dog-alogue_digital.pdf
ikea_woodgreen_petscharity_dog-alogue_digital.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta 143
Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta 143Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta 143
Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta 143
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 

Data privacy how do you protect and delete data in the cloud

  • 1. Data privacy: How do you protect and delete data in the cloud M: +91 9611 171 345 Email: sales@salesbabu.com
  • 2. Data privacy: How do you protect and delete data in the cloud. Protecting our customer data has always been the top priority for our businesses. But in today’s world of technology, doing this is increasingly extending beyond moral responsibility and taking on the form of legal requirement. . Different marketing and CRM softwares collect and maintain various customer data in cloud environment to use it on a daily basis for processing and marketing purposes. These client details are used for customer tracking, marketing and sales campaigning purposes. Every customer wants to keep individuals’ personal data secure and private. M: +91 9611 171 345 Email: sales@salesbabu.com
  • 3. Introduction M: +91 9611 171 345 Email: sales@salesbabu.com Personal data collected on the customers can include names, id numbers, location data, online identifiers, profiling data and almost any data about a client. The processing of this data includes any operation performed on personal data e.g. collection, recording, storage, adaption, altering, transmitting, erasure, destruction. Various regulations are added to these processing to maintain the integrity of these collected data. Few regulations that are being followed by different companies while collecting and processing their customers’ data are as follows: ● General Data Protection Regulation (GDPR), European Union ● Personal Information Protection Act (PIPA), Japan ● Health Insurance Portability and Accountability Act (HIPAA), United States ● Privacy Act, Australia ● Personal Information Protection and Electronic Documents Act (PIPEDA), Canada.
  • 4. Data Security measures M: +91 9611 171 345 Email: sales@salesbabu.com Additional security measure are implemented by various cloud service vendors like Amazon Web Services, Google Cloud Platform, IBM cloud and many more. These security measures gives users ownership and control over their content through various user friendly and powerful tools. These cloud security tools allow users to determine where their content will be stored and mode of data management. Flexibility of choosing the kind of cloud deployment like – private, public, or multi-cloud will allow users to pick the best suited security system for their business model. Along with these measures, data owners can also choose the kind of network encryption solutions which will be best suited for their needs. Usually either virtual or hardware-based encryption is used to ensure that data is protected as it is transferred across the network cloud. To ensure that the customer data is truly secure, cloud data encryption combined with strong key management is implemented for storing regulated data in the cloud. This combination of encryption and data key, will allow users to protect sensitive data outside of their control as it is transferred, shared or used for various cloud based environments. To further secure the data in the cloud, it’s recommended to own both the generation and administration of the data encryption keys. Data owners can utilize a physical or a virtual key system along with hardware storage mechanism to manage the key lifecycle.
  • 5. Data Protection methods M: +91 9611 171 345 Email: sales@salesbabu.com Secure the online CRM data servers The first step for data protection is to make sure that individuals and businesses outside of your organization can’t get access to your customer data. In today’s world, we have the option of keeping our CRM customer data in the cloud. With the level of security in a cloud based CRM solution, all your customer data is well secured and backed up using these cloud based security measures. We should also keep in mind that in a cloud environment, the hardware and configuration of the CRM software, is only part of your security protocols. Regardless of the CRM hosting location, we need to establish documented procedures for login protocols, password resets, employee access, and physical acquisition to server hardware.
  • 6. Data Protection methods continues... M: +91 9611 171 345 Email: sales@salesbabu.com Role based data Access Protecting the online server access is very important to restrict any outside invasion to your customer data. While creating various data access restriction, we should analyze below questions for each role before granting access for them: ● Does this user or role need access to this form or data for their regular job? ● Will this user need to frequently extract data from CRM, or sync it with another device or gadget, in order to do their job? ● Will there be a privacy concern for either our customers or the employees if this user has access to this information? Once we have clear answers to all the above questions, we can easily make various filtered access to each employee and keep the data security as simple as it can get. With required access levels, there are negligible options of data leakage and misuse.
  • 7. Data Protection methods continues... M: +91 9611 171 345 Email: sales@salesbabu.com Regular auditing Regular auditing and verification of employees access control versus the accessed data by them, will keep a check on any security breaches which might happen in regular workflows. List of employees who are at a high risk of damaging the organization, needs to flagged and immediately terminated before they end up making any major damage to the company’s or customer data. Regular auditing and screening of security measures and other processes, projects any flaws or reworks that might be present in the current business operations. This help in formulating proactive and futuristic measure for effective customer data protection.
  • 8. Data Protection methods continues... M: +91 9611 171 345 Email: sales@salesbabu.com Employment Agreement An employment agreement is majorly a clear communication about expected employee behavior, and legal protection to the organization if those expectations are not met. Both the company’s management and employee should be well aware of these employment agreements to understand the mode of conduct of an employee with its employer. In an event of agreement violation, the aggressive measure should be taken to protect not only the customer and company’s property but also make a benchmark for the working procedure of the agreement clauses. In today’s world of diversified working cultures and employee’s background, it's very important to have common ground rules which will not only facilitate confidentiality of customer and company' property but also help employees to understand the expectations set for each of them.
  • 9. Data Protection methods continues... M: +91 9611 171 345 Email: sales@salesbabu.com Customer Agreement Once we start on a long term relationship with our customers, it's very important for both the parties to have clear expectations from each other. With a clear set of legal agreements on the data protection and usability norms, customers are well aware of the data protection processes and procedures that are followed as per the company’s policies. Also, customers can define and customize the data privacy clauses to understand what level of data sharing is done. Some of the major queries which can be included in the agreement document can be as follows: ● Which customer information is being collected? ● Who is collecting this information? ● How and which mode is used to collect this data? ● Why particular information is being collected? ● Whom the data can be shared with? ● What is the intent of the data usage? With above and more customised user agreement details , it gives a clear picture of which level of data protection and sharing needs to be maintained by the company.
  • 10. Data Deletion M: +91 9611 171 345 Email: sales@salesbabu.com The concept of a “right to be forgotten” is not an entirely new legal notion, but is being followed in all the mainstream CRM softwares across the globe. The principal understanding of this right is to enable an individual or company to request the deletion or removal of one's personal data where there is no conclusive reason for its continued processing. When does the “right to be forgotten” or erasure apply? Every Individual or company have a right to have personal data erased and to prevent processing in specific circumstances: • Where the personal data is no longer needed in intend to the purpose for which it was originally collected/processed; • When the individual withdraws consent or agreement. • When the individual objects or have concerns to the current or further processing of data and there is no other legal ground for the relevant processing activity to continue. • When the personal data was unlawfully processed or shared. • Where the personal data has to be erased in order to comply with a legal agreement. A system administrator (individual user acting on behalf of their organization) can delete data from their data center and server storage. This data is deleted from the system with immediate effect and cannot be recovered by any users or company’s employees after a current or future point of the agreement date. Personal and company’s private data which has been deleted or otherwise destroyed should not be recovered at any time. Sufficient warning should be given to the account administrator before they permanently delete anything related to an individual or company’s profile.
  • 11. Conclusion M: +91 9611 171 345 Email: sales@salesbabu.com To summarize, it is hard work to protect your customer data. Formulating agreements and setting up data security routines are the best ways to achieve a mirror view of your customer requirements. Your CRM system and business practices should be playing a pivotal role in protecting your customers and maintaining the integrity of data sharing and deletion.
  • 12. All Right Reserved © 2007- 2019 SalesBabu Business Solutions Pvt. Ltd