SlideShare a Scribd company logo
1 of 15
How can EMM help with
GDPR compliance?
February 2018
GDPR in a nutshell
• The General Data Protection Regulation comes into effect May 25, 2018.
• Designed to keep the personal data of EU’s 510+ million residents safe.
• Holds organisations accountable for any data breaches.
• In serious cases, notifies individuals of breaches of their personal info.
• Businesses who fail to comply can be fined up to EUR 20 million, or 4% of
their annual global turnover.
• Gives individuals the right to know what information of theirs is stored, and
allows them to request that this information be erased.
• May require the appointment of a Data Protection Officer within the
organisation.
Mobile devices and your organisation?
• Our organisations undoubtedly rely heavily on the use
of smartphones, tablets and laptops.
• The workforce is also becoming increasingly mobile,
accessing data on the move and carrying devices 24
hours per day...outside of the work setting.
• While this offers new opportunities that our
businesses can’t live without, it also presents a new
host of threats, specific to GDPR.
• Mobile Device Management and Enterprise Mobility
Management will be key factors in helping you
achieve real-world compliance.
9 ways how EMM helps to achieve GDPR compliance
1. Enforce passcode requirements
2. Encrypt data
3. Separate work and private data and apps
4. Be prepared to wipe sensitive information
5. Control the applications running on your devices
6. Deploy and enforce settings
7. Know your software
8. Create reports for data security purposes
9. Be ready to act, if a device is lost or stolen
1. Lock screens and passcodes
• It sounds simple, because it is. This is your first line of defence when it comes to protecting
the data contained in your devices, especially if lost or stolen.
• GDPR requires you to prove that you’re in control of user data and that you’ve taken steps
to protect it.
• Miradore’s EMM allows you to lock an open device, easily enforce passcode requirements
on your devices, and remotely check to ensure compliance.
2. Unencrypted data is a liability
• It’s important to understand how encryption works on your devices.
• iOS devices have encryption built in, but only when a passcode is enabled.
• Android devices may or may not come encrypted, so it’s important to be able to audit and
enforce your corporate devices.
• Use of an EMM product will enable you to enforce the use of Encryption across your fleet.
3. Separate work and private data
• Administrators can create a ”work profile” in an
Android device, which is separated from the
user’s ”personal profile”. Data in the work profile
can be wiped without deleting the user’s
personal information stored on the device.
• On iOS devices you can enable the Secure
Email to separate company and personal data.
4. Destroying sensitive data
• There will be times when you will need to wipe the device of
all sensitive data.
• Recommissioning a device for a new user.
• Employee is leaving the organisation.
• Device has gone missing.
• Doing so at the press of a button is key to preventing
breaches of information.
5. Control applications and data
• Applications are great, and we typically have a lot of
work and personal apps on our devices.
• With EMM you can control your apps by:
• Whitelisting specific apps that you want to allow on
the devices.
• Blacklisting inappropriate apps, or ones that use
excessive data.
• Setting a device into single app mode (kiosk mode).
• Creating your own corporate App Store, consisting
only of apps that you approve, and hiding the rest.
• Protecting your Contacts by permitting apps based
access to the Contacts.
6. Remotely deploy and enforce settings
• Ease of use (or lack thereof) can be a real
difference-maker when it comes to whether or
not policies and settings are enforced across
your network when using a third party EMM
tool.
• We feel that this shouldn’t be a pain point, and
make it easier than ever to remotely deploy and
enforce settings.
• Examples are configuring approved wifi
networks, and distributing VPN profiles.
• In addition, save time and money by deploying
company email configurations, monitoring data
usage and mitigating roaming charges, to name
a few.
7. Know your software versions
• Cyber attacks, malware and ransomware like WannaCry and Petya are not just threats to your PC’s. Old
versions of applications and applications from untrusted sources need to be updated with the latest
security patches or restricted.
• Having a central place to view the OS versions of your devices and push the latest app updates is an
important step in protecting yourself.
• Knowing this information, and using it in conjunction with anti-malware tools is a great way to stay ahead
of the threats.
8. Reporting and logging capabilities
• Your companies may have appointed a Data
Protection Officer. This role is an important part of the
GDPR, and this person must keep a watchful eye on
company policies and affairs.
• The Data Protection Officer will have to prove what
steps have been taken to improve data security and
protect personal data.
• We recommend using an EMM tool to produce an
extensive list of reports that add reassurance of
compliance, and also weed out threats, such as
applications that are potentially harmful. Being able to
monitor everything from a central dashboard makes it
much easier!
9. Protect yourself from theft
• And we don’t mean wearing a fanny pack or a
neck wallet around day to day...but it would
help!
• We’ve touched on this threat already, but it’s
worth repeating because it is so simple, yet so
easily overlooked.
• The small size and portability of mobile devices
makes them an easy target for theft. Even
honest people that come across a misplaced
iPhone might be inclined to keep it or sell it.
• Even though you may never see your device
again, ensuring your devices are protected with
a passcode, encrypted and able to be wiped
are so essential, that Miradore offers this for
free.
9 ways how EMM helps to achieve GDPR compliance
1. Enforce passcode requirements
2. Encrypt data
3. Separate work and private data and apps
4. Be prepared to wipe sensitive information
5. Control the applications running on your devices
6. Deploy and enforce settings
7. Know your software
8. Create reports for data security purposes
9. Be ready to act, if a device is lost or stolen
For more information
• https://www.miradore.com/enterprise-mobility-management/
• https://www.miradore.com/gdpr/
• Key Terms
• Mobile Device Management (MDM)
• Enterprise Mobility Management (EMM)
• Unified Endpoint Management (UEM)
• Bring Your Own Device (BYOD)
• Choose Your Own Device (CYOD)
• Corporate Owned Personally Enabled (COPE)

More Related Content

What's hot

Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security SeminarJeremy Quadri
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsVince Verbeke
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidentsbelsis
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityBitglass
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : ProductivityAGILLY
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : ProvisionAGILLY
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMBitglass
 
Fixico presentation
Fixico presentationFixico presentation
Fixico presentationFixico IT
 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home StaffArt Ocain
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseIBM Security
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementDarryl Miles
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key FindingsSymantec
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001CUNIX INDIA
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Napier University
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Cyril Soeri
 

What's hot (20)

Cyber Security Seminar
Cyber Security SeminarCyber Security Seminar
Cyber Security Seminar
 
Mobile Security for Smartphones and Tablets
Mobile Security for Smartphones and TabletsMobile Security for Smartphones and Tablets
Mobile Security for Smartphones and Tablets
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Mobile security
Mobile securityMobile security
Mobile security
 
Bank security
Bank securityBank security
Bank security
 
Major Trends Transforming BYOD Security
Major Trends Transforming BYOD SecurityMajor Trends Transforming BYOD Security
Major Trends Transforming BYOD Security
 
Mobility 201 : Productivity
Mobility 201 : ProductivityMobility 201 : Productivity
Mobility 201 : Productivity
 
Mobility 101 : Provision
Mobility 101 : ProvisionMobility 101 : Provision
Mobility 101 : Provision
 
Webinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDMWebinar Express: Securing BYOD without MDM
Webinar Express: Securing BYOD without MDM
 
mobile application security
mobile application securitymobile application security
mobile application security
 
Fixico presentation
Fixico presentationFixico presentation
Fixico presentation
 
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
Control Your Data:  3 Steps for Data Governance for Work from Home StaffControl Your Data:  3 Steps for Data Governance for Work from Home Staff
Control Your Data: 3 Steps for Data Governance for Work from Home Staff
 
Are We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile EnterpriseAre We There Yet? The Path Towards Securing the Mobile Enterprise
Are We There Yet? The Path Towards Securing the Mobile Enterprise
 
MaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense ManagementMaaS360 - Mobile Expense Management
MaaS360 - Mobile Expense Management
 
2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings2012 State of Mobile Survey Global Key Findings
2012 State of Mobile Survey Global Key Findings
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
Structure of iso 27001
Structure of iso 27001Structure of iso 27001
Structure of iso 27001
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 

Similar to How can EMM help with GDPR compliance?

Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha Visram
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeRocket Matter, LLC
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesMidmarketIBM
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices Troy C. Fulton
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device CooperTechnologiesInc
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreIBM Software India
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]IBM Software India
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore Seclore
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Chris Pepin
 
5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmares5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmaresSprint Business
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
The unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityThe unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityClaus Cramon Houmann
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Securitynexxtep
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 

Similar to How can EMM help with GDPR compliance? (20)

Enterprise Mobility Management
Enterprise Mobility ManagementEnterprise Mobility Management
Enterprise Mobility Management
 
Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2Aisha visram presentacion bmobilew 2015 rev 2
Aisha visram presentacion bmobilew 2015 rev 2
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize BusinessesSecuring Mobile Devices in the Workplace - Six Tips For Midsize Businesses
Securing Mobile Devices in the Workplace - Six Tips For Midsize Businesses
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Locking down risks from unlocked devices
Locking down risks from unlocked devices  Locking down risks from unlocked devices
Locking down risks from unlocked devices
 
3 steps security
3 steps security3 steps security
3 steps security
 
Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device Risks and Benefits of Bringing Your Own Device
Risks and Benefits of Bringing Your Own Device
 
Maa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangaloreMaa s360 10command_ebook-bangalore
Maa s360 10command_ebook-bangalore
 
Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]Maa s360 10command_ebook-bangalore[1]
Maa s360 10command_ebook-bangalore[1]
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 
Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...Best practices for mobile enterprise security and the importance of endpoint ...
Best practices for mobile enterprise security and the importance of endpoint ...
 
5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmares5 Enterprise Mobility Management nightmares
5 Enterprise Mobility Management nightmares
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
The unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile securityThe unspeakable-pitfalls of mobile security
The unspeakable-pitfalls of mobile security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 

Recently uploaded

如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxnibresliezel23
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Oishi8
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书Fir sss
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxsrikarna235
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书SD DS
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws descriptionranaanish11062001
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxAbhishekchatterjee248859
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书E LSS
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书SS A
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书FS LS
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书E LSS
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaBridgeWest.eu
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptjudeplata
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGPRAKHARGUPTA419620
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书Fir L
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionAnuragMishra811030
 

Recently uploaded (20)

如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptxQUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
QUASI-JUDICIAL-FUNCTION AND QUASI JUDICIAL AGENCY.pptx
 
Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126Indemnity Guarantee Section 124 125 and 126
Indemnity Guarantee Section 124 125 and 126
 
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书 如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
如何办理(KPU毕业证书)加拿大昆特兰理工大学毕业证学位证书
 
Test Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptxTest Identification Parade & Dying Declaration.pptx
Test Identification Parade & Dying Declaration.pptx
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
如何办理(uOttawa毕业证书)渥太华大学毕业证学位证书
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
POLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptxPOLICE ACT, 1861 the details about police system.pptx
POLICE ACT, 1861 the details about police system.pptx
 
一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书一比一原版利兹大学毕业证学位证书
一比一原版利兹大学毕业证学位证书
 
一比一原版旧金山州立大学毕业证学位证书
 一比一原版旧金山州立大学毕业证学位证书 一比一原版旧金山州立大学毕业证学位证书
一比一原版旧金山州立大学毕业证学位证书
 
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
如何办理伦敦南岸大学毕业证(本硕)LSBU学位证书
 
一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书一比一原版牛津布鲁克斯大学毕业证学位证书
一比一原版牛津布鲁克斯大学毕业证学位证书
 
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
Russian Call Girls Rohini Sector 7 💓 Delhi 9999965857 @Sabina Modi VVIP MODEL...
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
How You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad VisaHow You Can Get a Turkish Digital Nomad Visa
How You Can Get a Turkish Digital Nomad Visa
 
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.pptFINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
FINALTRUEENFORCEMENT OF BARANGAY SETTLEMENT.ppt
 
Offences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKINGOffences against property (TRESPASS, BREAKING
Offences against property (TRESPASS, BREAKING
 
如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书如何办理澳洲南澳大学(UniSA)毕业证学位证书
如何办理澳洲南澳大学(UniSA)毕业证学位证书
 
Introduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusionIntroduction to Corruption, definition, types, impact and conclusion
Introduction to Corruption, definition, types, impact and conclusion
 

How can EMM help with GDPR compliance?

  • 1. How can EMM help with GDPR compliance? February 2018
  • 2. GDPR in a nutshell • The General Data Protection Regulation comes into effect May 25, 2018. • Designed to keep the personal data of EU’s 510+ million residents safe. • Holds organisations accountable for any data breaches. • In serious cases, notifies individuals of breaches of their personal info. • Businesses who fail to comply can be fined up to EUR 20 million, or 4% of their annual global turnover. • Gives individuals the right to know what information of theirs is stored, and allows them to request that this information be erased. • May require the appointment of a Data Protection Officer within the organisation.
  • 3. Mobile devices and your organisation? • Our organisations undoubtedly rely heavily on the use of smartphones, tablets and laptops. • The workforce is also becoming increasingly mobile, accessing data on the move and carrying devices 24 hours per day...outside of the work setting. • While this offers new opportunities that our businesses can’t live without, it also presents a new host of threats, specific to GDPR. • Mobile Device Management and Enterprise Mobility Management will be key factors in helping you achieve real-world compliance.
  • 4. 9 ways how EMM helps to achieve GDPR compliance 1. Enforce passcode requirements 2. Encrypt data 3. Separate work and private data and apps 4. Be prepared to wipe sensitive information 5. Control the applications running on your devices 6. Deploy and enforce settings 7. Know your software 8. Create reports for data security purposes 9. Be ready to act, if a device is lost or stolen
  • 5. 1. Lock screens and passcodes • It sounds simple, because it is. This is your first line of defence when it comes to protecting the data contained in your devices, especially if lost or stolen. • GDPR requires you to prove that you’re in control of user data and that you’ve taken steps to protect it. • Miradore’s EMM allows you to lock an open device, easily enforce passcode requirements on your devices, and remotely check to ensure compliance.
  • 6. 2. Unencrypted data is a liability • It’s important to understand how encryption works on your devices. • iOS devices have encryption built in, but only when a passcode is enabled. • Android devices may or may not come encrypted, so it’s important to be able to audit and enforce your corporate devices. • Use of an EMM product will enable you to enforce the use of Encryption across your fleet.
  • 7. 3. Separate work and private data • Administrators can create a ”work profile” in an Android device, which is separated from the user’s ”personal profile”. Data in the work profile can be wiped without deleting the user’s personal information stored on the device. • On iOS devices you can enable the Secure Email to separate company and personal data.
  • 8. 4. Destroying sensitive data • There will be times when you will need to wipe the device of all sensitive data. • Recommissioning a device for a new user. • Employee is leaving the organisation. • Device has gone missing. • Doing so at the press of a button is key to preventing breaches of information.
  • 9. 5. Control applications and data • Applications are great, and we typically have a lot of work and personal apps on our devices. • With EMM you can control your apps by: • Whitelisting specific apps that you want to allow on the devices. • Blacklisting inappropriate apps, or ones that use excessive data. • Setting a device into single app mode (kiosk mode). • Creating your own corporate App Store, consisting only of apps that you approve, and hiding the rest. • Protecting your Contacts by permitting apps based access to the Contacts.
  • 10. 6. Remotely deploy and enforce settings • Ease of use (or lack thereof) can be a real difference-maker when it comes to whether or not policies and settings are enforced across your network when using a third party EMM tool. • We feel that this shouldn’t be a pain point, and make it easier than ever to remotely deploy and enforce settings. • Examples are configuring approved wifi networks, and distributing VPN profiles. • In addition, save time and money by deploying company email configurations, monitoring data usage and mitigating roaming charges, to name a few.
  • 11. 7. Know your software versions • Cyber attacks, malware and ransomware like WannaCry and Petya are not just threats to your PC’s. Old versions of applications and applications from untrusted sources need to be updated with the latest security patches or restricted. • Having a central place to view the OS versions of your devices and push the latest app updates is an important step in protecting yourself. • Knowing this information, and using it in conjunction with anti-malware tools is a great way to stay ahead of the threats.
  • 12. 8. Reporting and logging capabilities • Your companies may have appointed a Data Protection Officer. This role is an important part of the GDPR, and this person must keep a watchful eye on company policies and affairs. • The Data Protection Officer will have to prove what steps have been taken to improve data security and protect personal data. • We recommend using an EMM tool to produce an extensive list of reports that add reassurance of compliance, and also weed out threats, such as applications that are potentially harmful. Being able to monitor everything from a central dashboard makes it much easier!
  • 13. 9. Protect yourself from theft • And we don’t mean wearing a fanny pack or a neck wallet around day to day...but it would help! • We’ve touched on this threat already, but it’s worth repeating because it is so simple, yet so easily overlooked. • The small size and portability of mobile devices makes them an easy target for theft. Even honest people that come across a misplaced iPhone might be inclined to keep it or sell it. • Even though you may never see your device again, ensuring your devices are protected with a passcode, encrypted and able to be wiped are so essential, that Miradore offers this for free.
  • 14. 9 ways how EMM helps to achieve GDPR compliance 1. Enforce passcode requirements 2. Encrypt data 3. Separate work and private data and apps 4. Be prepared to wipe sensitive information 5. Control the applications running on your devices 6. Deploy and enforce settings 7. Know your software 8. Create reports for data security purposes 9. Be ready to act, if a device is lost or stolen
  • 15. For more information • https://www.miradore.com/enterprise-mobility-management/ • https://www.miradore.com/gdpr/ • Key Terms • Mobile Device Management (MDM) • Enterprise Mobility Management (EMM) • Unified Endpoint Management (UEM) • Bring Your Own Device (BYOD) • Choose Your Own Device (CYOD) • Corporate Owned Personally Enabled (COPE)