{"id":5247,"date":"2019-11-15T11:04:03","date_gmt":"2019-11-15T11:04:03","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5247"},"modified":"2021-04-13T19:00:36","modified_gmt":"2021-04-13T18:00:36","slug":"mobile-device-management-privacy","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy","title":{"rendered":"Mobile Device Management\u2014A threat to employee privacy?"},"content":{"rendered":"<div class=\"field field--name-body field--type-text-with-summary field--label-hidden field--item\">\n<p>Anything that connects to a network represents a potential security risk. These days, people bring enough of their own home devices\u2014from smartphones to laptops\u2014into the office. Each one can be an access point for cybercriminals. Protecting your customers\u2019 networks often requires you to discover and secure those devices.<\/p>\n<p>This has led to the rise of\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/mdm-software-solutions\">mobile device management (MDM) solutions<\/a>. These allow you to better protect both corporately owned\u00a0<i>and<\/i>\u00a0private devices that come on the network.<\/p>\n<p>However, if you choose to launch an MDM solution for your customers, you\u2019ll need to exercise caution. Mobile devices and bring your own device (BYOD) policies often cause people to blur the lines over data ownership and between personal and professional lives. So transparency about data privacy matters a great deal\u2014and so does speaking with legal counsel before you roll out an MDM solution. Today, we\u2019ll dig into the topic a little more.<\/p>\n<h3><b>Privacy and Mobile Device Management<\/b><\/h3>\n<\/div>\n<div class=\"field field--name-field-blog-paragraphs field--type-entity-reference-revisions field--label-hidden field--items\">\n<div class=\"field--item\">\n<div class=\"paragraph paragraph--type--blog-section paragraph--view-mode--default clearfix\">\n<div class=\"blog-section-content\">\n<p>Most employees should know that what happens on work devices isn\u2019t private. Many will still use work devices for personal activities like banking, shopping, using social media, or sending personal emails. Most companies already have acceptable use policies for their work property. While acceptable use policies don\u2019t guarantee good behavior on part of your employees, it can potentially help reduce the risk of losing a lawsuit from a former employee (but again, talk to a lawyer).<\/p>\n<p>However, while acceptable use policies for company property have been prevalent for years, the rise of mobile working has complicated some of these policies. To top it off, while most employees are at least cautious about their work computers, people can be less cautious on their personal mobile devices. But it isn\u2019t just about what personal activities they do on their devices\u2014they may be completely unaware of the potential data you could have on them. Many MDM solutions allow you to track GPS locations for each device. This is certainly useful for recovering stolen devices, but it raises some privacy concerns for someone who may not want their employers being able to track their location at any given time.<\/p>\n<p>Beyond that, many MDM solutions allow you to track nearly anything on a given device\u2014including incoming and outgoing text messages and calls, applications downloaded (and their data), photos, and much more. Employees could easily be surprised when they find out how much information their employer can see on devices they bring to work. Beyond this, it could even leave you\u2014or your client\u2014open to potential lawsuits if you aren\u2019t careful about how you deal with their personal data.<\/p>\n<h3><b>What You Can Do<\/b><\/h3>\n<p>First off, nothing in here constitutes legal advice. If you offer a BYOD policy or use an MDM solution, speak with legal counsel first. They need to help you draft policies to both protect you and your customers. But don\u2019t just stop at what you need to draft\u2014you\u2019ll want to know where and when you must inform customers. This may differ depending on laws in your local jurisdiction, but you\u2019ll likely need to gain employees\u2019 consent before gaining access to devices.<\/p>\n<p>Second, beyond speaking with legal counsel, it\u2019s a good practice to remind employees fairly regularly of any important policies for both company-provided and personal devices. They should know that, for example, if they hook up their iMessage accounts to a company-managed Macbook so they can send messages to friends, employers could see their text messages. You may want to encourage them to only access their private data only on their own secure home networks and devices rather than bringing them in.<\/p>\n<p>Finally, remember that part of your job involves securing not just a company\u2019s data, but the business itself. An MDM solution only plays a role in security\u2014you need other layers to protect the business from all angles. Build strong security controls around the rest of the business\u2014from network security to endpoint security. At the bare minimum, consider segmenting a separate guest network for personal devices so an unsecured device doesn\u2019t get onto the main network. This way if you needed to avoid using an MDM solution for a particular client, you could still contain some threats and keep them off your customers\u2019 primary network.<\/p>\n<p><b>SolarWinds RMM<\/b><\/p>\n<p><strong>Of course, MDM solutions still offer quite a few benefits to your customers. Mobile devices can bring a host of security issues to the forefront. And MDM solutions do provide some important security features like the ability to remotely lock devices or wipe the data from the device in the event it\u2019s stolen. Additionally, when you use an MDM feature like the one built into SolarWinds<sup>\u00ae<\/sup>\u00a0RMM, you can also set passwords, monitor data usage, and even remotely configure email or WiFi settings. And you can do it from the same web-based dashboard you use to monitor servers, workstations, virtual machines, and more. Learn more by visiting the\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/mobile-device-management?promo=blog\" target=\"_blank\" rel=\"noopener\">site here<\/a>.\u00a0<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A Recovery Point Objective (RPO) determines how much data the business is willing to lose in the event of a failure. A Recovery Time Objective (RTO) determines how much time&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5247","post","type-post","status-publish","format-standard","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mobile Device Management\u2014A threat to employee privacy? - N-able<\/title>\n<meta name=\"description\" content=\"Having a BYOD isn&#039;t just about protecting your networks, it&#039;s also about ensuring you&#039;re acting within the law regarding personal data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Device Management\u2014A threat to employee privacy? - N-able\" \/>\n<meta property=\"og:description\" content=\"Having a BYOD isn&#039;t just about protecting your networks, it&#039;s also about ensuring you&#039;re acting within the law regarding personal data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-15T11:04:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-13T18:00:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Mobile Device Management\u2014A threat to employee privacy?\",\"datePublished\":\"2019-11-15T11:04:03+00:00\",\"dateModified\":\"2021-04-13T18:00:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy\"},\"wordCount\":840,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Mobile\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy\",\"name\":\"Mobile Device Management\u2014A threat to employee privacy? - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2019-11-15T11:04:03+00:00\",\"dateModified\":\"2021-04-13T18:00:36+00:00\",\"description\":\"Having a BYOD isn't just about protecting your networks, it's also about ensuring you're acting within the law regarding personal data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Mobile\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/mobile\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Device Management\u2014A threat to employee privacy?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mobile Device Management\u2014A threat to employee privacy? - N-able","description":"Having a BYOD isn't just about protecting your networks, it's also about ensuring you're acting within the law regarding personal data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy","og_locale":"de_DE","og_type":"article","og_title":"Mobile Device Management\u2014A threat to employee privacy? - N-able","og_description":"Having a BYOD isn't just about protecting your networks, it's also about ensuring you're acting within the law regarding personal data.","og_url":"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-11-15T11:04:03+00:00","article_modified_time":"2021-04-13T18:00:36+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"N-able","Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Mobile Device Management\u2014A threat to employee privacy?","datePublished":"2019-11-15T11:04:03+00:00","dateModified":"2021-04-13T18:00:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy"},"wordCount":840,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Mobile"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy","url":"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy","name":"Mobile Device Management\u2014A threat to employee privacy? - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2019-11-15T11:04:03+00:00","dateModified":"2021-04-13T18:00:36+00:00","description":"Having a BYOD isn't just about protecting your networks, it's also about ensuring you're acting within the law regarding personal data.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/mobile-device-management-privacy#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Mobile","item":"https:\/\/www.n-able.com\/de\/blog\/category\/mobile"},{"@type":"ListItem","position":2,"name":"Mobile Device Management\u2014A threat to employee privacy?"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5247","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=5247"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/5247\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=5247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}