search.noResults

search.searching

dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
Professional Services


Is your printing GDPR compliant?


By BTT Group


overhauled how businesses process and handle data belonging to EU residents. This means the regulation, which came into force in May 2018, applies to companies that are in and out of the European Union. GDPR came in alongside the 2018 Data Protection Act as the earlier version was deemed no longer fit for purpose. Your business will have already


T


identified multiple areas that needed to be taken care of before GDPR came into effect, but one factor you may not have yet considered if your printers, and how they could be affected by this regulation. If you're still unsure, the process


can be broken down into five steps to make your printing and document management GDPR- compliant.


1.Secure your printing device You need to ensure you secure the end-to-end workflow of your printers. Everything needs to be considered, from when the print job is requested to how the document is handled after printing.


2 Stop unwanted printing It'd be no surprise if your company throws out hundreds of documents that have been falsely printed or forgotten about. With two-factor print release, the job isn't printed until the user authenticates at the machine.


3. Protect documents even after printing Now that two-factor authentication ensures documents land in the right hands, what next? How are they protected after print? How are they destroyed after use? These questions must be addressed.


4. Allow data owners to access their info GDPR requires that companies holding data must allow data owners to access any data that the company holds about them. It's important that you allow your customers this access.


he General Data Protection Regulation (GDPR) is an EU regulation that completely


5. Allow customers to say goodbye GDPR also requires that you allow your customers to remove any information you have about them. Software solutions can offer a one- button ‘erase all’ function that does this for you.


Weaknesses in print security


range from advanced issues with encryption to rudimentary human error. For example, many businesses may be simply unaware that personal data is often transferred unencrypted via the network when printing. It’s also stored unencrypted on servers, or even on the printer’s HDD. And it’s often the case that


alternative workflows aren’t established – this is a crucial tool in preventing sensitive information from ending up the wrong hands. Without alternative workflows, any personal data could be sent to printers in unsecured locations. Even a document left unattended in a printer’s output tray could mean data isn’t being adequately protected. Of course, these are just some of


the potential hazard’s businesses will invariably encounter when securing their data in print. It’s inevitable that more complex challenges will become apparent as IoT technology continues to advance and permeate everyday business processes.


How to secure your print fleet In a nutshell, print security must now become a vital part of a businesses’ IT planning processes. And in doing so, they must consider the three key areas of print security. The first is devices. Many


organisations are filled with ageing, poorly secured print devices. The best defence is to implement secure access features that restrict who can use the output devices using predefined user access controls. The second area is the network.


With the increased use of mobile devices and the need to support BOYD initiatives, IT departments must strike a balance between providing users with the tools they need to boost efficiency, but at the same time minimise the risk of


May 2019 CHAMBERLINK 67


intrusion across networks and connections. This could include digital certificates, port filtering, IP address filtering, role-based access control and more. The third and final area is their documents. Malicious printing can be prevented on a device by configuring it to only allow print jobs if the user is authenticated. They can also implement card authentication for access to physical facilities, print release solutions, and secure document monitoring. These deliver great visibility into physical documents and reduce the liabilities associated with insider threats.


‘Many businesses may be simply unaware that personal data is often transferred unencrypted via the network when printing’


Feature


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92