{"id":588,"date":"2021-09-21T06:23:53","date_gmt":"2021-09-21T06:23:53","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=588"},"modified":"2021-09-23T06:02:56","modified_gmt":"2021-09-23T06:02:56","slug":"remote-working-gdpr","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/","title":{"rendered":"Remote Working &#038; GDPR"},"content":{"rendered":"<p>Remote Working &amp; GDPR<\/p>\n<p><span style=\"font-weight: 400;\">When Covid-19 began to spread rapidly and lockdown was introduced, employees began to start working from home at an unprecedented rate. Now employees around the world with no previous experience working remotely are coming to grips with this new way of operating. This rapid expansion of the remote workforce has presented challenges for employers. <\/span><span style=\"font-weight: 400;\">Employees are in control of a company&#8217;s most sensitive data but may not always maintain secure data practices while working from home. Data leak issues, like misdirected emails or malicious insiders, can put companies at risk of noncompliance with GDPR and other regulations.<\/span><\/p>\n<p>The &#8220;new normal&#8221; of work-at-home isn&#8217;t going away anytime soon. Businesses must maintain higher standards of secure access and prioritize data protection practices as employees work remotely for the foreseeable future.<\/p>\n<p><span style=\"font-weight: 400;\">Below are 4 tips to help your organization adhere to the GDPR while employees are working from home.\u00a0<\/span><\/p>\n<p><b>Refresh Your Data Policy<\/b><b><\/b><\/p>\n<p>Define clear policies for remote work that reinforce the importance of protecting data and explain how to do so and what the consequences are otherwise.<\/p>\n<p><span style=\"font-weight: 400;\">Setting well defined company policy for working remotely is very important, given that according to research by <\/span><a href=\"https:\/\/www.techradar.com\/uk\/news\/gdpr-compliance-remote-desktop\"><span style=\"font-weight: 400;\">VansonBourne on behalf of Imation<\/span><\/a><span style=\"font-weight: 400;\">, 42% of businesses say that they have a hard time keeping track of what information employees can access outside the office, while roughly 25% admitted that an employee had lost a device with confidential emails, files, and consumer data or had such a device stolen from them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A cybersecurity policy that instructs your employees on how to keep your business\u2019s data safe is an important tool in data protection. If you don\u2019t have one, you should make one. If you have a policy but haven\u2019t updated it since everyone began working from home, this is the time to do so. A good place to start is by reviewing the <\/span><a href=\"https:\/\/www.nist.gov\/industry-impacts\/cybersecurity-framework\"><b>NIST cybersecurity framework<\/b><\/a><span style=\"font-weight: 400;\">, which provides you with a set of best-practice guidelines for all stages of threat identification and mitigation.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your IT security policy doesn\u2019t have to be a complicated document. It should cover the reasons it exists in the first place and then lay out, in easy-to-understand terms, the exact security protocols your fellow employees should follow. If they\u2019re confused, they can ask questions, but no one is exempt from the policy. You can also use the free templates offered by <\/span><a href=\"https:\/\/www.sans.org\/information-security-policy\/\"><b>SANS<\/b><\/a><span style=\"font-weight: 400;\">, a globally recognized cybersecurity training and consultancy organization, as models for your policy.<\/span><\/p>\n<p><b>Data Encryption<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The GDPR requires organizations to adopt security measures, such as encryption, to protect data from inappropriate use. Encryption represents a useful method to keep data safe, especially in the case of a breach \u2013 even if stolen or exposed, encrypted data would be illegible and useless anyway. Encryption is easier to adopt when working in a company\u2019s offices, but it can also be implemented in devices and software when working remotely.<\/span><\/p>\n<p><b>Controlling Data<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Access to company data, whether business or sensitive, should be controlled. Employees should have the right to access only that data that is necessary to accomplish their daily tasks. Measures such as \u201cneed to know\u201d. \u201cleast privilege\u201d, and \u201csegregation of duties\u201d should be in use so that the company\u2019s data is protected from information loss. Moreover, companies should ask their employees to use a corporate Virtual Private Network (VPN), which is an encrypted connection over the internet from a device to a network: in this way, data could be safely transmitted, while preventing access by unauthorized people.<\/span><\/p>\n<p><b>Monitoring Remote Sessions<\/b><\/p>\n<p><span style=\"font-weight: 400;\">With more employees working from home, companies are seeking ways of monitoring remote sessions. One compelling case can be made for recording remote sessions for later playback and review. Employers are concerned that in the event of a security breach, they won\u2019t be able to see what was happening on users\u2019 desktops when the breach occurred. Another reason for recording remote sessions is to maintain compliance, as required for medical and financial institutions or auditing for business protocols, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">TSFactory&#8217;s RecordTS v6 will record Windows desktop sessions reliably and securely for RDS, Citrix, VMware, Azure, AWS host systems plus more. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/products\/tsf-products.php\"><span style=\"font-weight: 400;\">Click here<\/span><\/a><span style=\"font-weight: 400;\"> to learn more about secure remote session recording.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Remote Working &amp; GDPR When Covid-19 began to spread rapidly and lockdown was introduced, employees began to start working from home at an unprecedented rate. Now employees around the world with no previous experience working remotely are coming to grips with this new way of operating. This rapid expansion of the remote workforce has presented [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":589,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-588","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Remote Working &amp; GDPR - Blogs<\/title>\n<meta name=\"description\" content=\"Data leak issues, like misdirected emails or malicious insiders, can put companies at risk of noncompliance with GDPR during this time of remote working.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote Working &amp; GDPR - Blogs\" \/>\n<meta property=\"og:description\" content=\"Data leak issues, like misdirected emails or malicious insiders, can put companies at risk of noncompliance with GDPR during this time of remote working.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-21T06:23:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-23T06:02:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/09\/pexels-markus-winkler-3828944.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/\",\"name\":\"Remote Working & GDPR - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/09\/pexels-markus-winkler-3828944.jpg\",\"datePublished\":\"2021-09-21T06:23:53+00:00\",\"dateModified\":\"2021-09-23T06:02:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"description\":\"Data leak issues, like misdirected emails or malicious insiders, can put companies at risk of noncompliance with GDPR during this time of remote working.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/09\/pexels-markus-winkler-3828944.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/09\/pexels-markus-winkler-3828944.jpg\",\"width\":1280,\"height\":853,\"caption\":\"remote-working-gdpr\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote Working &#038; GDPR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Remote Working & GDPR - Blogs","description":"Data leak issues, like misdirected emails or malicious insiders, can put companies at risk of noncompliance with GDPR during this time of remote working.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/","og_locale":"en_US","og_type":"article","og_title":"Remote Working & GDPR - Blogs","og_description":"Data leak issues, like misdirected emails or malicious insiders, can put companies at risk of noncompliance with GDPR during this time of remote working.","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-09-21T06:23:53+00:00","article_modified_time":"2021-09-23T06:02:56+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/09\/pexels-markus-winkler-3828944.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/","name":"Remote Working & GDPR - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/09\/pexels-markus-winkler-3828944.jpg","datePublished":"2021-09-21T06:23:53+00:00","dateModified":"2021-09-23T06:02:56+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"description":"Data leak issues, like misdirected emails or malicious insiders, can put companies at risk of noncompliance with GDPR during this time of remote working.","breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/09\/pexels-markus-winkler-3828944.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/09\/pexels-markus-winkler-3828944.jpg","width":1280,"height":853,"caption":"remote-working-gdpr"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/remote-working-gdpr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Remote Working &#038; GDPR"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=588"}],"version-history":[{"count":7,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/588\/revisions"}],"predecessor-version":[{"id":596,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/588\/revisions\/596"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/589"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}