General Data Protection Regulation (GDPR)
The GDPR is a new regulation coming into place on the 25th May 2018, this applies to those who deal with a day to day responsibility with data protection. This is being regulated by the information commissioner’s office and has some similarities to the current data protection act (DPA).
Who does the GDPR apply to?
The GDPR applies to the controllers and processors. Controllers have the reasons behind the personal data being processed and processors are those who acts upon the data for the controller’s behalf.
What information does the GDPR apply to?
ALL information in which was in the scope of the data protection act will be included in the GDPR, for example HR records, customer lists, contact details etc.
GDPR has a more detailed explanation of personal data than DPA and includes numerous new types of personal data such as IP addresses. The GDPR also includes automated personal data and manual filing systems in which could be accessible to a specific criterion.
Data that has been pseudonymised or key coded is now included in the GDPR depending on how difficult it is to attribute the pseudonym to a particular individual.
Key principles and requirements for personal data
You might have seen in the news this morning, that there is a massive attack on Gmail happening right now.
The attack is very clever. According to our information, it’s an email that looks like it has come from a friend, and contains a Google Docs link. When you click on the link it gives control of your Gmail to the hackers.
I’m sure Google is working very hard on a fix right now. And the odds are your computers are not affected. But this is a great time to:
Do a full security sweep of all your devices
Do a full data audit to make sure your data is secure and continually backed-up, off-site
Put together or revise a policy for your staff on use of personal email and social media at work
If you have any concerns about security at all, or want us to talk these things through with you, my team and I can help you today. Just give us a call on 01257 786200.
Guest wifi allows someone who is just visiting the business to connect to the ‘guest wifi’. Essentially it is another wifi network that does not allow any access to any sensitive information on the network, improving the security of your business. You do not want your customers or guests being able to access your servers, data, EPOS machines etc.
We can control what bandwidth guests can use so it protects your internet speed for the businesses tasks. The last thing your business needs is guests taking up too much bandwidth resulting in employees struggling to do their everyday tasks.
Another great feature of guest wifi is when someone connects they are redirected to social media where it brings your page up and they can the like, follow, share or check in to our business, giving you a greater social media presence. You are able to brand up the landing page once they have connected further promoting your business.
Using LMG we can make sure that your guest wifi is safe, secure and legally compliant. So if you would like anymore information on guest wifi do not hesitate to get into contact with us. We are an IT company based in Adlington and Chorley.
Less than a generation ago, classroom research required trips to the school or public libraries. Time pouring through books, encyclopaedias, and journals was necessary to have not only a complete bibliography, but also a well-written report on the subject.
Today, all that content, plus blogs, videos, e-books, and even textbooks not only fit in the palm of the hand, but also are more readily accessible to younger minds.
However, with that comes access to even more content that shouldn’t be accessible—all at a click of a mouse, or tap of a finger. Subject matter that would not even be spoken of in mixed company in the past is now available on any digital device, at any location, with little restriction.
What are schools to do? How do we keep our students safe?
Initial attempts were to only allow a few students to use a computer—in the classroom, facing the teacher, and only after regular classroom work was completed. Lab computers became accessible, and now Acceptable Use Policies (or contracts) were necessary. These contracts should preferably be signed by both students and parents, and contain enforceable disciplinary actions.
Today, students are walking into the classroom with self-owned technology in their hands that is more powerful than many schools can provide for the student to use. How do schools prevent the use of peer-to-peer file sharing, illegal music downloads, adult content, or any other inappropriate audio, video, or text-based content? The answer is Internet content filters.
Online-based filters are extremely affordable, but are often very slow and offer poor management or configurable options. Hardware-based filters are typically more expensive and require network management knowledge. Either method sounds like the epitome of protection; however, it must be noted that content filters cannot replace the necessity of physically monitoring student use or the need to have signed use policies/contracts.
When schools first introduce a content filter, there is usually an outcry regarding the limitation of access to content and the difficulty for the adult staff to provide content to students, do research, or conduct business.
A multi-level filtering appliance can provide the mandatory protection for the students, allow additional content for staff use, and yet provide liability protection for all those involved—keeping the entire school safe from the potential allegations of anyone accessing questionable content. The appliance can even provide whitelisting for additional protection for the very young, or possibly a disciplinary measure for older students—while still allowing access to content for learning needs.
The question inevitably arises regarding the appliance blocking access to “good” content. Again, a proper appliance will provide not only blacklist filtering (blocking access at the domain-level for yahoo.com, facebook.com, etc.), but also parsing (searching for specific words on the page to be banned) and context filtering.
Customised control is available on multi-filtering appliances by adjusting the sensitivity level of the context filtering—higher sensitivity for student filters, less sensitivity for staff filters.
But what should be done about videos—now a mainstay in the educator’s arsenal of supplemental teaching materials? Filtering videos is a difficult task. Without text provided to accurately describe the content of the video, filtering appliances have nothing else to use. This usually comes down to an all-or-nothing scenario—either the entire site is allowed or the entire site is blocked.
Google’s recent introduction of YouTube for Schools has made a significant contribution to assisting schools in providing content to both students and teachers, while adding the protection of blocking the rest of YouTube. With the help of a filtering appliance that automatically redirects the URL, students can only watch videos that have been authorised by teachers.
Finally, proper appliances should also filter portable equipment that students and staff may bring to school. If wireless access is provided for these users to access the school’s network, a filtering appliance with advanced authentication methods can provide filtering for these users as well.
Any devices that belong to the school - tied in to the server (domain controller) - can be recognised using advanced authentication methods. Non-domain devices (smartphones, tablets, laptops, etc.) will fallback to an alternate authentication method that is similar to that used in hotels or guest hotspots. Regardless of authentication method, all users can be assigned to different filters on the appliance-providing that very important liability protection.
Please contact us for more information.
Exciting times at LMG Networks as we picked up the keys for our new office and have started to move in. Hopefully we will be up and running in the next 2 weeks! Busy times ahead!!
We have just finished off our latest project with the Professional Cleaning Company. We have designed their new website, hosting their site and hosting all of their email accounts.
Find out about the latest technology available in securing your data. From online asset management with location tracking and Geofence reporting to remote wipe.
Take the strain off your internet connection, and use your internal network to distribute your apps.
Use the education Volume Purchase Programme to distribute apps and other content to your devices.
Contact us for more information.