As business-critical data moves outside the physical and virtual walls of the enterprise, the risk for corporate data vulnerability increases exponentially. This whitepaper from VMware AirWatch offers tangible actions to secure your mobile fleet and put privacy first.
Demystifying End-user Privacy for Enterprise Mobility
Related Stories
White Paper – Assessing Mobile App Data Privacy Risk
(April 2017) – We hear about “mitigating privacy risk” on a regular basis. The GDPR calls for a risk-based approach to privacy operations. Certain “high-risk” endeavors even trigger data protection impact assessments and calls to the local data protection authority’s office? Rarely, however, do we s...
Mobile, Biometrics and Consumer Privacy: Shutting Pandora’s Box
Privacy. Security. Risk. 2016
Stewart Room, CIPP/E, Global Head, Data Protection and Cyber Security, PwC Legal; Todd Thiemann, VP Marketing, Nok Nok Labs
Organizations with consumer-facing mobile applications are embracing biometrics as a compelling method to authenticate consumers. Privacy prof...
The Perfect Storm of Risk: When Mobile and Cloud Computing Collide
Privacy. Security. Risk. 2016
Alan Brill, CIPP/US, Senior Managing Director, Kroll; Craig Cardon, Partner, Sheppard Mullin; Sachin Kothari, CIPP/US, Director of Online Privacy, Compliance, and Standards, AT&T
The cloud phenomenon increasingly combines mobile and remote computing to create a ne...
Mobile Location Analytics Code of Conduct
Given the potential benefits that mobile location analytics may provide to businesses and consumers, it is important that these practices are subject to privacy controls and are used responsibly to improve the consumer shopping experience. This code from the Future of Privacy Forum puts such data pr...
Mobile Privacy Principles: Promoting consumer privacy in the mobile ecosystem
These principles were developed by GSMA in 2011 and describe the way in which mobile consumers’ privacy should be respected and protected when consumers use mobile applications and services that access, use or collect their personal information. The principles also provide the basis for which the GS...