1
JMS Secure Data | Data Protection Services
Who is JMS Secure Data
The Team;
• Marlon Johnson – Managing Director
• Kuhan Selvananthan – Technical Operations
• Michelle Rumble - Engagement & Marketing
• Laurelle Hughes – Accounts & Administration
What do we do at JMS Secure Data
We are a Data Protection specialist providing practical and Technical
solutions to businesses who hold a Data Protection Licence
Our Service Goals are to;
• Measure – work with data controllers by way of providing a Free Data Protection
Health Check Assessment to measure the risks to their business.
• Educate – providing recommendations and advice where non-compliance has
been identified posing a risk to your confidential data regulatory status.
• Support – Implementing technical solutions to achieve Data Protection
compliance which also safeguards your confidential data and business
• Motivation – providing post implementation support and advisory service
which in our view motivates the customer to remain compliant with
their data
Your Data
Data Protection Governance
• ICO DPA Compliance
• Policy Implementation
• Staff DPA Awareness
Total Endpoint Protection
• Data Encryption
• Compliance Check
• Anti-Malware / Program Control
• Firewall
Secure Cloud Sharing
• Access, edit, share and store,
from our all-in-one application
• Manage, access and
permission on all Projects,
folders and files
Backup
• Automatic daily backup to
secure offsite data centres
• 24/7/365 data availability
• Total security with AES 256 v6
encryption
The Cycle of Data Protection
Who Needs Our Services
• Financial Services Sector
• Accounting Sector
• Legal Sector
• Education Sector
• Medical Sector
• Local Authorities
• Business Services
• Anyone who holds a Data
Protection Licence
What is Data Protection Governance
• Data Protection Licence
• ICO DPA Compliance
• Data Protection Act (8 Principles)
• DPA Policy
• Staff Training
• DPA Training Records
• Reviewed Annually
What all the fuss about Encryption Software?
Installing Encryption Software Is the Only
Secure Way to Protect Your Data
Encryption, is the process of changing information in such
a way as to make it unreadable by anyone except those
possessing special knowledge (usually referred to as a
"key") that allows them to change the information back to its
original, readable form
If the unthinkable happens and you lose your PC / Laptop
with everything stored on the hard disk, rest assured – with
Encryption the information is protected and cannot be
compromised which ensures peace of mind for your
business and your clients data
Remember.... setting a Windows password on
your Windows login does not protect your PC /
Laptop, it just makes it a little harder for
someone to gain access, but not impossible!
What does the ICO say about Encryption?
What the ICO Says
‘The ICO’s guidance is clear: all personal
information – the loss of which is liable to
cause individuals damage and distress - must
be encrypted. Encryption is one of the most
basic security measures and is not expensive
to put in place - yet we continue to see
incidents being reported to us. This type of
breach is inexcusable and is putting people’s
personal information at risk unnecessarily. ‘
Without Encryption software installed you risk being
in breach of ‘Principle 7’of the Data Protection Act
which can result in a fine of up to €100 Million or 5%
of your annual turnover…
A Snapshot of Incidents investigated by the
ICO for Q4 2014
Total Endpoint Protection
• Full Disk Encryption
• Media Encryption / Port Control
• Anti-Malware / Programme Control
• Webcheck
• Firewall
• Compliance Checklist
• 24/7 Support for password resets or
software conflict support
Secure Online Data Centre Backup
How it works...
The online data backup service is designed to be used
individually as a basis for a business continuity plan or
alongside our other services to give combined protection
in the event of a disaster recovery situation.
Key Features
• Automatic, daily backup
• Fast and reliable data restore
• Data is encrypted and sent to 2 UK Data Centres
• No need for additional backup hardware
• 24/7 data availability & UK technical support
• Set & forget system that offer 60 day file version
recovery
Most importantly our Backup software and process
meets the cloud storage guidance mandated by the
ICO Cloud Computing Obligations
Secure Cloud Sharing
• Are you using the Cloud to share or store data?
• Are you operating compliantly?
• Is your Data at risk?
If you are unsure about any of the above then talk to
JMS Secure Data about Soonr Workplace Cloud…
• Soonr Workplace One-App™ – Access, edit,
share and store, from our all-in-one application,
ensuring ease of use and no data leakage
• Optimized content delivery and rendering – Over
fifty file types are rendered to perfection on all
mobile devices
• Device support – iPad and iPhone, Android
smartphones and tablets, Windows Phone and
BlackBerry phones
• Team-based sharing – Manage, organize and
share files with ease, controlling access and
permission on all Projects, folders and files
• Compliant under the Data Protection Act
Client Case Study 1
IFA Company– 3 Employees
• Problem
The company had a large confidential client data base across 4 PC’s and wanted to
work in different locations but wanted to ensure the data was secure and protected
and also backed up to ensure they had Business Continuity (BC).
• Our Solution
Backup software was implemented to ensure BC, all 4 PC’s were encrypted thus
ensuring compliance and security in the event of loss or theft. We recommended the
Soonr Cloud platform to provide a sync and share system that allows all users (with
permission levels) to sync and share data & files between devices and employees.
• Result
A fully compliant business operation that is compliant, secure, has BC and works
smart allowing users to work from all devices & PC’s.
Client Case Study 2
Nursery Business – 7 Employees
• Problem
The owner was unsure about how to protect all the confidential data in the business
relating to all the child records, staffing records etc.. She also wanted a solution to
ensure that she could work from home and replace the Drobox system she was using
for backup and sync as she was aware of the security issues with Dropbox.
• Our Solution
Our health check assessment identified Dropbox was not a compliant option for the
confidential data under the data protection act and recommended Soonr Cloud which
works similar but is compliant. The PC’s in the nursery was encrypted thus making
them secure and backup software was installed on their main machine which enabled
data on all PC’s to be backed up daily as data was synced between them
• Result
A fully compliant nursery giving parent the confidence of knowing their children's data
is safe & secure even in the event of loss, theft or unauthorised access.
Why Choose JMS Secure Data?
Why should you choose JMS Secure Data for Business Data
Protection Compliance?
• We have over 15 years experience in IT Data Security.
• Our recommended products carry a FIPS 140-2 Level 1 Certification which is
recognised as the relevant benchmark as required to meet 'Principle 7' of the Data
Protection Act..
• All backed up data is stored in UK data centres, fully encrypted and protected
even before it leaves your computer.
• We provide 24/7 technical support which is UK based.
• All our product accounts are fully managed and monitored daily.
• No locked in or lengthy contracts, most of your account products are on a monthly
PAYG standing order billing process.
• 30 Day Free Trials offered on all our software products to demonstrate suitability
and Data Protection compliance.
Still Unsure What to Do?
Contact us for a FREE Data Protection Health Check Assessment
to measure any risks to your business…
Getting Data Protection wrong can bring reputational, regulatory
and legal penalties. Getting it right will bring customer rewards in
terms of trust and confidence….
For more information please visit: www.jms-securedata.co.uk

Jms secure data presentation

  • 1.
    1 JMS Secure Data| Data Protection Services
  • 2.
    Who is JMSSecure Data The Team; • Marlon Johnson – Managing Director • Kuhan Selvananthan – Technical Operations • Michelle Rumble - Engagement & Marketing • Laurelle Hughes – Accounts & Administration
  • 3.
    What do wedo at JMS Secure Data We are a Data Protection specialist providing practical and Technical solutions to businesses who hold a Data Protection Licence Our Service Goals are to; • Measure – work with data controllers by way of providing a Free Data Protection Health Check Assessment to measure the risks to their business. • Educate – providing recommendations and advice where non-compliance has been identified posing a risk to your confidential data regulatory status. • Support – Implementing technical solutions to achieve Data Protection compliance which also safeguards your confidential data and business • Motivation – providing post implementation support and advisory service which in our view motivates the customer to remain compliant with their data
  • 4.
    Your Data Data ProtectionGovernance • ICO DPA Compliance • Policy Implementation • Staff DPA Awareness Total Endpoint Protection • Data Encryption • Compliance Check • Anti-Malware / Program Control • Firewall Secure Cloud Sharing • Access, edit, share and store, from our all-in-one application • Manage, access and permission on all Projects, folders and files Backup • Automatic daily backup to secure offsite data centres • 24/7/365 data availability • Total security with AES 256 v6 encryption The Cycle of Data Protection
  • 5.
    Who Needs OurServices • Financial Services Sector • Accounting Sector • Legal Sector • Education Sector • Medical Sector • Local Authorities • Business Services • Anyone who holds a Data Protection Licence
  • 6.
    What is DataProtection Governance • Data Protection Licence • ICO DPA Compliance • Data Protection Act (8 Principles) • DPA Policy • Staff Training • DPA Training Records • Reviewed Annually
  • 7.
    What all thefuss about Encryption Software? Installing Encryption Software Is the Only Secure Way to Protect Your Data Encryption, is the process of changing information in such a way as to make it unreadable by anyone except those possessing special knowledge (usually referred to as a "key") that allows them to change the information back to its original, readable form If the unthinkable happens and you lose your PC / Laptop with everything stored on the hard disk, rest assured – with Encryption the information is protected and cannot be compromised which ensures peace of mind for your business and your clients data Remember.... setting a Windows password on your Windows login does not protect your PC / Laptop, it just makes it a little harder for someone to gain access, but not impossible!
  • 8.
    What does theICO say about Encryption? What the ICO Says ‘The ICO’s guidance is clear: all personal information – the loss of which is liable to cause individuals damage and distress - must be encrypted. Encryption is one of the most basic security measures and is not expensive to put in place - yet we continue to see incidents being reported to us. This type of breach is inexcusable and is putting people’s personal information at risk unnecessarily. ‘ Without Encryption software installed you risk being in breach of ‘Principle 7’of the Data Protection Act which can result in a fine of up to €100 Million or 5% of your annual turnover…
  • 9.
    A Snapshot ofIncidents investigated by the ICO for Q4 2014
  • 10.
    Total Endpoint Protection •Full Disk Encryption • Media Encryption / Port Control • Anti-Malware / Programme Control • Webcheck • Firewall • Compliance Checklist • 24/7 Support for password resets or software conflict support
  • 11.
    Secure Online DataCentre Backup How it works... The online data backup service is designed to be used individually as a basis for a business continuity plan or alongside our other services to give combined protection in the event of a disaster recovery situation. Key Features • Automatic, daily backup • Fast and reliable data restore • Data is encrypted and sent to 2 UK Data Centres • No need for additional backup hardware • 24/7 data availability & UK technical support • Set & forget system that offer 60 day file version recovery Most importantly our Backup software and process meets the cloud storage guidance mandated by the ICO Cloud Computing Obligations
  • 12.
    Secure Cloud Sharing •Are you using the Cloud to share or store data? • Are you operating compliantly? • Is your Data at risk? If you are unsure about any of the above then talk to JMS Secure Data about Soonr Workplace Cloud… • Soonr Workplace One-App™ – Access, edit, share and store, from our all-in-one application, ensuring ease of use and no data leakage • Optimized content delivery and rendering – Over fifty file types are rendered to perfection on all mobile devices • Device support – iPad and iPhone, Android smartphones and tablets, Windows Phone and BlackBerry phones • Team-based sharing – Manage, organize and share files with ease, controlling access and permission on all Projects, folders and files • Compliant under the Data Protection Act
  • 13.
    Client Case Study1 IFA Company– 3 Employees • Problem The company had a large confidential client data base across 4 PC’s and wanted to work in different locations but wanted to ensure the data was secure and protected and also backed up to ensure they had Business Continuity (BC). • Our Solution Backup software was implemented to ensure BC, all 4 PC’s were encrypted thus ensuring compliance and security in the event of loss or theft. We recommended the Soonr Cloud platform to provide a sync and share system that allows all users (with permission levels) to sync and share data & files between devices and employees. • Result A fully compliant business operation that is compliant, secure, has BC and works smart allowing users to work from all devices & PC’s.
  • 14.
    Client Case Study2 Nursery Business – 7 Employees • Problem The owner was unsure about how to protect all the confidential data in the business relating to all the child records, staffing records etc.. She also wanted a solution to ensure that she could work from home and replace the Drobox system she was using for backup and sync as she was aware of the security issues with Dropbox. • Our Solution Our health check assessment identified Dropbox was not a compliant option for the confidential data under the data protection act and recommended Soonr Cloud which works similar but is compliant. The PC’s in the nursery was encrypted thus making them secure and backup software was installed on their main machine which enabled data on all PC’s to be backed up daily as data was synced between them • Result A fully compliant nursery giving parent the confidence of knowing their children's data is safe & secure even in the event of loss, theft or unauthorised access.
  • 15.
    Why Choose JMSSecure Data? Why should you choose JMS Secure Data for Business Data Protection Compliance? • We have over 15 years experience in IT Data Security. • Our recommended products carry a FIPS 140-2 Level 1 Certification which is recognised as the relevant benchmark as required to meet 'Principle 7' of the Data Protection Act.. • All backed up data is stored in UK data centres, fully encrypted and protected even before it leaves your computer. • We provide 24/7 technical support which is UK based. • All our product accounts are fully managed and monitored daily. • No locked in or lengthy contracts, most of your account products are on a monthly PAYG standing order billing process. • 30 Day Free Trials offered on all our software products to demonstrate suitability and Data Protection compliance.
  • 16.
    Still Unsure Whatto Do? Contact us for a FREE Data Protection Health Check Assessment to measure any risks to your business… Getting Data Protection wrong can bring reputational, regulatory and legal penalties. Getting it right will bring customer rewards in terms of trust and confidence…. For more information please visit: www.jms-securedata.co.uk