Cool Solutions

Don’t Sweat Data Compliance: Invest in Mobile Device Management

Gil Cattelain

By:

September 18, 2014 9:35 am

Reads:2,318

Comments:0

Score:Unrated

Print/PDF

Mobility has become one of the biggest drivers of productivity and cost savings in the enterprise. But for companies operating in highly-regulated industries like financial and healthcare, implementing traditional mobility or bring your own device (BYOD) solutions is much more difficult due to the overwhelming amount of regulatory policies that must be followed.

As outlined in a recent Novell white paper, here are just a few of the major regulatory policies that are standing in the way of mobile enterprise programs:

HIPAA: The Health Insurance Portability and Accountability Act (HIPAA), established in 1996, mandates that all sensitive patient information stay safely within protected physical or electronic confines. Due to HIPAA, healthcare companies that invest in BYOD programs must provide strict and advanced tracking for any employee-owned device.

HITECH: The Health Information Technology for Economic and Clinical Health Act (HITECH) works in conjunction with HIPAA and requires that healthcare companies maintain active device management policies to mitigate unauthorized access to patient information. Employees are also required to report devices lost or stolen under this rule.

Securities Exchange Act, Rule 17-A: This rule mandates financial companies retain sensitive information and electronic records for seven years. Further, in the event of an investigation, this rule requires personal devices to be subject to review. It also calls for digital broker-dealer records to be stored in a non-rewritable, non-erasable format. This often poses problems when it comes to wiping information from employee devices—specifically for employees who are either terminated or resign.

Gramm-Leach Bliley Act: Under this act, companies are required to report annually on the efficiency of their internal data security policies. It calls for the regular security testing and monitoring, and protects consumer information through risk assessment and system evaluation.

Staying on top of these rules can be a tough challenge for IT departments—especially if there is little knowledge about what device is accessing the network. But here’s the good news: With a mobile device management strategy, you can invest in BYOD or a traditional mobility program without having to worry about compliance. That’s because an MDM solution can automate these regulatory procedures and ensure that your organization does what it needs to operate within the boundaries. Procedures such as password enforcement, data wiping, and device locking can all be performed from a central location, which gives an IT department the ability to control every corporate device that accesses sensitive information.

Are you ready to join the mobility movement? Learn how Novell, a leading provider of endpoint management software, can help.

0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this post.
Loading...

Tags: , , , , , ,
Categories: Expert Views, ZENworks, ZENworks Mobile Management

0

Disclaimer: This content is not supported by Micro Focus. It was contributed by a community member and is published "as is." It seems to have worked for at least one person, and might work for you. But please be sure to test it thoroughly before using it in a production environment.

Comment

RSS