From the course: IAPP Certified Information Privacy Manager (CIPM) Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Mobile device tracking
From the course: IAPP Certified Information Privacy Manager (CIPM) Cert Prep
Mobile device tracking
- [Instructor] One of the primary objectives of mobile device management software is ensuring that an organization can track all of its mobile device assets. Inventory control is a critical component of enterprise security programs. When smartphones and tablets are lost or stolen, the organization loses a physical asset as well as the data stored on that device if it wasn't encrypted. While organizations may implement encryption and other security controls to prevent thieves from gaining access to the information stored on the device, they still incur the financial loss associated with the device itself. With smartphone and tablet prices now reaching over $1,000 for high-end devices, that's a very serious concern. Consider that over 3.1 million mobile devices are stolen annually in the United States and start to do the math. Faced with these statistics, organizations must maintain accurate inventories of their…
Download courses and learn on the go
Watch courses on your mobile device without an internet connection. Download courses using your iOS or Android LinkedIn Learning app.
Contents
-
-
(Locked)
Privacy program development2m 57s
-
(Locked)
Scope and charter2m 46s
-
Aligning privacy and business objectives3m 35s
-
(Locked)
Building a data inventory3m 52s
-
(Locked)
Data classification2m 16s
-
(Locked)
Interview key employees3m 33s
-
(Locked)
Follow data flows2m 19s
-
(Locked)
Data sharing and transfers53s
-
(Locked)
-
-
(Locked)
Privacy frameworks2m 44s
-
Privacy policy framework3m 44s
-
(Locked)
Policy and regulatory monitoring5m 1s
-
(Locked)
Privacy impact assessments3m 16s
-
(Locked)
Remediation oversight1m 6s
-
Program assurance4m 41s
-
(Locked)
Inquiry and complaint handling1m 3s
-
(Locked)
Communicating the framework1m 40s
-
(Locked)
-
-
(Locked)
Privacy program monitoring1m 12s
-
(Locked)
Environment monitoring3m 25s
-
(Locked)
Regulatory landscape monitoring2m 7s
-
(Locked)
Compliance monitoring3m 16s
-
(Locked)
Monitoring technical controls3m 30s
-
(Locked)
Privacy metrics2m 24s
-
(Locked)
Ethical use of artificial intelligence (AI)2m 6s
-
(Locked)