Regulations fail to provide businesses with sufficient guidance on how to effectively manage private information of consumers or their employees. Following a set of guiding principles will help businesses gain a better understanding of how to manage personal data responsibly. The core theme to remember when considering the use of any personal information is that it belongs to the individual.

A lot of information can be inferred by the actions of a user, even when the actions seem to be innocuous. Anonymized location data can still be traced back to individuals based on the shifts that employees work and the time that the data is collected. In reality, very little information is needed to identify who you are. Simply knowing your name, age and zipcode — three common pieces of data that are commonly requested — could be enough for anyone with the know-how to unveil tremendous amounts of information.

The way every byte of data about a person is processed, stored and used needs to be scrutinized. Without clear, universal regulations on how businesses should handle personal data, businesses are left in the dark and complications will only continue to rise as technology makes it increasingly easy to uncover personal data.

To shed some light on this complex issue, the Wandera Privacy Matrix provides a clear framework for how personal information should be managed throughout its lifecycle.

Consider how you manage personal information and apply the privacy principles across the data’s lifecycle, how can you apply the privacy framework within your business:

To help you consider how you apply the privacy framework to the business tools you use below are a set of questions that you can consider. These same questions can also be applied to any products or services that you provide that may collect personal information.

Lifecycle Stage Description Key Considerations
Collecting Gathered either from the individual or from a 3rd party
  • Does the individual know what information about them is available?
  • Is the individual aware who is monitoring them?
  • Do individuals understand their workplace mobile policy?
  • Is data being gathered legally with the approval of the individual?
  • Does the individual understand what it is being used for?
  • Which parts of the information can be discarded?
  • Do individuals know what information is being recorded about them by business apps?
Storing Where and how is the data being stored
  • For what purpose is data being stored?
  • Is the data secure?
  • How can data be partitioned so that it is not centralised?
  • When and why does data get deleted?
  • Can the individual request data be deleted?
Using Accessing the data to view or edit
  • Who is accessing personal information and why?
  • Is it for the same purpose that it was collected and the individual agreed?
  • Can the data be amended?
  • How quickly can you provide the individual

What next?

Adware with millions of downloads found on the Google Play Store

Two selfie filter camera apps on the Google Play Store have been identified as adware. The apps have a combined 1.5 million downloads.

Learn more ›

Newly identified remote exploit exposes WhatsApp private user data

A vulnerability recently discovered allows attackers to install spyware on a device simply by making a WhatsApp call. How can businesses prepare for the next big mobile vulnerability?

Learn more ›

Curious about our Mobile Security Suite? Speak to a Consultant

If you would like more information about Wandera’s Mobile Threat Defense and Mobile Data Policy solutions, fill out the form and one of our consultants will be in touch.

Learn more ›