GDPR: Ήμουνα και εγώ εκεί!

Όλοι έχουμε καταλάβει ότι ο νέος κανονισμός της ΕΕ για την προστασία των προσωπικών δεδομένων μας δημιουργήθηκε για να περιοριστεί η ανεξέλεγκτη διάδοση της προσωπικής πληροφορίας χωρίς την συγκατάθεσή μας.

Ταυτόχρονα όμως δημιουργεί και πολλαπλά ζητήματα τα οποία σήμερα καλούμαστε να αντιμετωπίσουμε. Για παράδειγμα, τι γίνεται με τα πλάνα που παρουσιάζονται από τους τηλεοπτικούς σταθμούς, στα οποία φαινόμαστε όλοι μας και κανένας δεν μας έχει ζητήσει την συγκατάθεσή μας; Θα μπορούσα να θεωρήσω ότι έχω ζημιωθεί όταν φαίνομαι σε κάποιο ρεπορτάζ για την κίνηση στα μαγαζιά του κέντρου της πόλης;

Δείτε λοιπόν στον σύνδεσμο παρακάτω πόσο εύκολα μπορεί να σας εντοπίσει κάποιος από μια φαινομενικά απλή φωτογραφία. Πρόκειται για φωτογραφίες που έχουν ανάλυση τουλάχιστον 2110 megapixels. Επιλέξτε κάποια από τις φωτογραφίες, αφήστε την φωτογραφία να φορτωθεί και μετά δοκιμάστε να κάνετε zoom όσο πιο κοντά μπορείτε. Μήπως ήσασταν και εσείς εκεί;

Δείτε τις φωτογραφίες εδώ.

Σας ευχαριστώ για τον χρόνο σας.

Advertisements

Use Internal URLs to access apps from anywhere with My Apps Sign-in Extension and the #AzureAD Application Proxy

If you regularly follow this blog, you should already know a lot about Azure AD Application Proxy. I also recommend that you take a look at this presentation here: https://systemplus.gr/training/training-videos/azureadproxy/

 

Now we have the option to access internal resources using internal URLs even when outside our corporate network by using the My Apps Secure Sign-in Extension for Azure AD . When a user types in a familiar shorthand URL such as https://myinternalwebapp, they can be redirected to the externally resolvable URL, https://www.myinternalwebapp.systemplus.gr. This will work with any application that you have published using Azure AD Application Proxy, on any browser that also has the Access Panel browser extension installed.

 

You should get the latest version of the extension (supported on Edge, Chrome, and Firefox). Then, type the internal URL of the published application into the address bar. The extension will recognize that the URL has been published through Application Proxy and will redirect you to the external URL of the application.

 

Our users can download these extensions themselves, or admins can deploy the extension using the browser’s group policy settings. The URL redirection functionality is automatically enabled once a user logs into the extension.

 

To learn more about this new feature, you can read the documentation here.

 

Thanks for your time!

New #AzureAD B2C customization options

(Σημείωση: έχουμε ανακοινώσει ένα webinar στα ελληνικά για το Microsoft Azure, ώστε να μπορέσετε να εκπαιδευθείτε από το σπίτι. Δείτε περισσότερες πληροφορίες εδώ.)

 

The Azure AD product group recently announced some exciting new features. Here is a short list:

  • Enhanced flexibility for customizing login and registration experiences.
  • Update the portal experience so that features are more easily accessible.
  • New features that make it easy to use custom Open ID Connect (OIDC) identity providers in built-in policies.
  • New features for how custom OIDC providers work in custom policies to make configuration easier.
  • Azure AD B2C Language customization features are now Generally Available!

Let’s check them now.

 

What’s new in Public Preview and GA

Add custom OIDC identity providers in built-in policies: There is a new feature that enables you to use any OIDC identity provider right out of the box — a feature that used to be only available in custom policies. If you’re running a scenario in which you’re talking to multiple Azure AD tenants, you can now configure a single multi-tenant Azure AD provider with custom policies. This saves you from having a long list of identity providers and you no longer have to configure each tenant individually. This feature directs users to the right directory for authentication based on their email domain.

So you simply need to create a new identity provider and select the social identity provider that you want to use:

1 

2

 

  • Create a policy using ROPC flow: With this feature, your application will be able to gather user credentials in the context of a native mobile app without needing the user to interact with a web browser. The app will authenticate the user with Azure AD B2C via API.
  • B2Clogin.com: To better allow you to customize your login experience, we now have the b2clogin.com feature. With this feature, you can remove the ‘Microsoft’ from your app URL and use <your tenant name>.b2clogin.com instead.
  • New policy portal experience: Now when you are creating and editing a policy (or as we refer to it now, a user flow), we have a new experience that will streamline your tasks and reduce friction in using our features.
  • Language customization: This feature is now generally available! Microsoft provides support for 36 languages and for custom languages when you provide the translations for all the strings.

Thanks for your time!

Δεν υπάρχει Επίσημη Πιστοποίηση για DPOs στην Ελλάδα: Ανακοίνωση της Αρχής Προστασίας Δεδομένων


Όλοι όσοι αρχίζουν να ασχολούνται με το GDPR, σύντομα μαθαίνουν ότι ο ρόλος-κλειδί για τον κανονισμό είναι αυτός του DPO.

Επειδή λανθασμένα έχει περάσει στην αντίληψη μας ότι η πιστοποίηση του DPO είναι κάτι μαγικό που ξαφνικά θα μας κάνει ειδικούς στην εφαρμογή του Κανονισμού, η Αρχή Προστασίας Δεδομένων Προσωπικού Χαρακτήρα έβγαλε ανακοίνωση, η οποία με λίγα λόγια λέει τα εξής:

1. Η πιστοποίηση του DPO είναι εθελοντική και προαιρετική. Κάποιος αν νομίζει ότι έχει τα απαραίτητα προσόντα (τα οποία παρεμπιπτόντως περιγράφονται σε σχετικό άρθρο του Κανονισμού, περισσότερα για αυτό παρακάτω), μπορεί να αναλάβει τον ρόλο του DPO. Δεν υπάρχει εκείνη η μαγική συνταγή που θα μας κάνει experts και έτοιμους να αναλάβουμε τον ρόλο του DPO. Εννοείται φυσικά ότι όλοι όσοι ασχολούνται με την μηχανογράφηση ΔΕΝ μπορούν να γίνουν DPOs, διότι υπάρχει σύγκρουση συμφερόντων στην εταιρία (το οποίο επίσης περιγράφεται σαφώς στον κανονισμό).

2. Δεν υπάρχει κάποια αναγνωρισμένη αρχή ή φορέας στην Ελλάδα που δίνει DPO πιστοποιήσεις. Ότι τυχόν σεμινάρια βλέπετε, είναι απλά σεμινάρια που σας επιμορφώνουν, ενδεχομένως συνοδεύονται από εξετάσεις, ΑΛΛΑ τίποτα δεν είναι επίσημο.

Τι προσόντα πρέπει να έχει ο DPO;

Αντιγράφω το ακριβές κείμενο από το σχετικό άρθρο του Κανονισμού που μπορείτε να βρείτε και μόνοι σας εδώ:

Άρθρο 37:  5.   Ο υπεύθυνος προστασίας δεδομένων διορίζεται βάσει επαγγελματικών προσόντων και ιδίως βάσει της εμπειρογνωσίας που διαθέτει στον τομέα του δικαίου και των πρακτικών περί προστασίας δεδομένων.

 

Την επίσημη ανακοίνωση της Αρχής μπορείτε να βρείτε σε PDF αρχείο εδώ.

How to Think About Exam Preparation in This New World

As Microsoft embraces the power and flexibility of the cloud to deliver their software and solutions, we are experiencing ripple effects on our learning and exam content. Features and functionality in the software is changing on a monthly, weekly, and, in some cases, daily basis. This challenge is not unique to Microsoft. All IT learning and certification programs are facing it.

How does Microsoft keep the exam content up to date with the rapid pace of change?

Read an excellent article by Liberty Munson, that explains exactly why Microsoft updates exams and how to upgrade study habits to manage the change.

Read the full article here.

Thanks for your time!

[GDPR] Ένα e-mail που δεν θα θέλατε να πάρετε από κάποιον πελάτη σας….

Κατά την διάρκεια των εκπαιδεύσεων που έχουμε κάνει για το GDPR όλους αυτούς τους μήνες, ακούμε πολύ συχνά το ερώτημα από τους συμμετέχοντες: “Θα ασχοληθεί ποτέ κάποιος με την συμμόρφωση της εταιρίας μας με το GDPR;”

Είναι σαφές ότι σήμερα που γράφεται αυτό το blog post (4/4/18) είμαστε σε φάση προσαρμογής, που σημαίνει ότι ο κανονισμός δεν βρίσκεται σε πλήρη ισχύ. Απάντηση λοιπόν προς το παρόν δεν μπορούμε να δώσουμε. Όμως θα πρέπει να σκεφτούμε ότι θα πρέπει να κάνουμε κάποιες ενέργειες για να προσεγγίσουμε όσο πιο πολύ μπορούμε τις βασικές αρχές προστασίας δεδομένων προσωπικού χαρακτήρα.

Κανένας δεν μπορεί να αποκλείσει το ενδεχόμενο να έχουμε κάποιον πελάτη μας, ο οποίος θα θελήσει να εξασκήσει τα δικαιώματά του, έτσι όπως παρουσιάζονται στον κανονισμό για το GDPR. Για αυτό τον λόγο, σας έχω ετοιμάσει ένα δείγμα e-mail που μπορεί να πάρετε στο μέλλον από κάποιον πελάτη σας και να είστε υποχρεωμένοι να απαντήσετε μέσα σε 30 μέρες.

Δείτε λοιπόν το παρακάτω (εφιαλτικό) κείμενο του e-mail:

“Dear Sir/Madam:

I am writing to you in your capacity as data protection officer for your company. I am a customer of yours, and in light of recent events, I am making this request for access to personal data pursuant to Article 15 of the General Data Protection Regulation. I am concerned that your company’s information practices may be putting my personal information at undue risk of exposure or in fact has breached its obligation to safeguard my personal information pursuant to <latest nasty cybersecurity event or thing in the news>.

I am including a copy of documentation necessary to verify my identity. If you require further information, please contact me at my address above.

I would like you to be aware at the outset, that I anticipate reply to my request within one month as required under Article 12, failing which I will be forwarding my inquiry with a letter of complaint to the <appropriate data protection authority>.

Please advise as to the following:
1. Please confirm to me whether or not my personal data is being processed. If it is, please provide me with the categories of personal data you have about me in your files and databases.
a. In particular, please tell me what you know about me in your information systems, whether or not contained in databases, and including e-mail, documents on your networks, or voice or other media that you may store.
b. Additionally, please advise me in which countries my personal data is stored, or accessible from. In case you make use of cloud services to store or process my data, please include the countries in which the servers are located where my data are or were (in the past 12 months) stored.
c. Please provide me with a copy of, or access to, my personal data that you have or are processing.

 

2. Please provide me with a detailed accounting of the specific uses that you have made, are making, or will be making of my personal data.

3. Please provide a list of all third parties with whom you have (or may have) shared my personal data.
a. If you cannot identify with certainty the specific third parties to whom you have disclosed my personal data, please provide a list of third parties to whom you may have disclosed my personal data.
b. Please also identify which jurisdictions that you have identified in 1(b) above that these third parties with whom you have or may have shared my personal data, from which these third parties have stored or can access my personal data. Please also provide insight in the legal grounds for transferring my personal data to these jurisdictions. Where you have done so, or are doing so, on the basis of appropriate safeguards, please provide a copy.
c. Additionally, I would like to know what safeguards have been put in place in relation to these third parties that you have identified in relation to the transfer of my personal data.

 

4. Please advise how long you store my personal data, and if retention is based upon the category of personal data, please identify how long each category is retained.

5. If you are additionally collecting personal data about me from any source other than me, please provide me with all information about their source, as referred to in Article 14 of the GDPR.

 

6. If you are making automated decisions about me, including profiling, whether or not on the basis of Article 22 of the GDPR, please provide me with information concerning the basis for the logic in making such automated decisions, and the significance and consequences of such processing.

7. I would like to know whether or not my personal data has been disclosed inadvertently by your company in the past, or as a result of a security or privacy breach.
a. If so, please advise as to the following details of each and any such breach:
i. a general description of what occurred;
ii. the date and time of the breach (or the best possible estimate);
iii. the date and time the breach was discovered;
iv. the source of the breach (either your own organization, or a third party to whom you have transferred my personal data);
v. details of my personal data that was disclosed;
vi. your company’s assessment of the risk of harm to myself, as a result of the breach;
vii. a description of the measures taken or that will be taken to prevent further unauthorized access to my personal data;
viii. contact information so that I can obtain more information and assistance in relation to such a breach, and
ix. information and advice on what I can do to protect myself against any harms, including identity theft and fraud.

b. If you are not able to state with any certainty whether such an exposure has taken place, through the use of appropriate technologies, please advise what mitigating steps you have taken, such as
i. Encryption of my personal data;
ii. Data minimization strategies; or,
iii. Anonymization or pseudonymization;
iv. Any other means

 

8. I would like to know your information policies and standards that you follow in relation to the safeguarding of my personal data, such as whether you adhere to ISO27001 for information security, and more particularly, your practices in relation to the following:
a. Please inform me whether you have backed up my personal data to tape, disk or other media, and where it is stored and how it is secured, including what steps you have taken to protect my personal data from loss or theft, and whether this includes encryption.
b. Please also advise whether you have in place any technology which allows you with reasonable certainty to know whether or not my personal data has been disclosed, including but not limited to the following:
i. Intrusion detection systems;
ii. Firewall technologies;
iii. Access and identity management technologies;
iv. Database audit and/or security tools; or,
v. Behavioural analysis tools, log analysis tools, or audit tools;

9. In regards to employees and contractors, please advise as to the following:
a. What technologies or business procedures do you have to ensure that individuals within your organization will be monitored to ensure that they do not deliberately or inadvertently disclose personal data outside your company, through e-mail, web-mail or instant messaging, or otherwise.
b. Have you had had any circumstances in which employees or contractors have been dismissed, and/or been charged under criminal laws for accessing my personal data inappropriately, or if you are unable to determine this, of any customers, in the past twelve months.
c. Please advise as to what training and awareness measures you have taken in order to ensure that employees and contractors are accessing and processing my personal data in conformity with the General Data Protection Regulation.

Yours Sincerely,

Your customer”

 

ΤΙ ΜΠΟΡΟΥΜΕ ΝΑ ΚΑΝΟΥΜΕ:

Ενημερωνόμαστε και ανάλογα με το μέγεθος της εταιρίας μας προσπαθούμε να δημιουργήσουμε διαδικασίες ώστε να μπορέσουμε να ανταποκριθούμε σε ότι μας ζητάει το υποκείμενο των δεδομένων, δηλαδή ο πελάτης μας.

Εμείς από την πλευρά μας μπορούμε να σας παρέχουμε την σωστή ενημέρωση με το GDPR Foundation Online Course, το GDPR Foundation Masterclass σε αίθουσα, ρίξτε μια ματιά στα σχετικά με το GDPR στο site μας και αποφασίστε ανάλογα. Σε προηγούμενα e-mails που σας έχουμε στείλει, έχουμε συμπεριλάβει και εκπτωτικούς κωδικούς που μπορείτε να χρησιμοποιήσετε για να έχετε σημαντικές εκπτώσεις, οπότε αξιοποιήστε τους.

 

Σας ευχαριστώ για τον χρόνο σας.

What is (usually) in my bag for the MVP Summit 2018 (and also when I travel for business)

As many of you know, I travel a lot for business. And obviously I need to carry some technology with me, that in many cases makes my life easier. During travels I also need to use some technology to spend my time during long-haul flights from Europe to the US for example. During conferences I need to get a lot of notes, but I also need to do some remote work, to remotely support my clients.

So this is what I usually bring with me:

1. Microsoft Surface Pro 4
surfacepro4
Bought in the UK from Microsoft Store, it lets me do presentations, it’s light and small with an excellent battery life, a perfect travel companion. I use the keyboard, use it as a tablet, but I also use the Surface Pen to take notes. I also use it as a Kindle device to read my digital books during long flights.
2. Power adapters for many countries
power
I need this when I visit UK and USA, because you all know that they use a different plug there. (I should not forget to bring it with me for my trip to Malta…)
3. Microsoft Bluetooth Mobile Mouse 3600
889ad36e-0552-4ecf-b449-a1dd2e0a0736
It’s small, bluetooth and has a long battery life, the perfect companion for my Surface.
4. Microsoft Microfiber mouse pad
MIC200509-l
When I use my Microsoft optical bluetooth mouse, I need a light-weight pad. Bought from the Microsoft Company Store at the Microsoft campus, I can even use my mouse on glass surfaces, as many hotel rooms use today. It also works as a screen-cleaning cloth!
5. OnePlus 3T
oneplus-3t-og-1200x630
It’s dual-sim, so I use a second SIM when travelling to non-European countries, just to avoid extra costs. The Dash charger can charge this phone from 0 to 60% in just 30 mins, if you forget to charge it overnight.
6. Surface adapters
2_large_1515054505704m
MDP2HDVGAW.main
I always carry a USB to Ethernet adapter and a “mini HDMI to everything” adapter, because you never know when you’ll need to project your screen.
7. Audio-Technica ATH-ANC1 QuietPoint noise cancelling headphones
Audio-Technica-ATH-ANC1-QuietPoint
They are not so expensive as the Bose ones, but they do an excellent job. I can hear music or watch videos on my Surface without any external noise, completely isolated. In the package is included that special headphone jack that is used on some airlines.

Thanks for your time!

Αρέσει σε %d bloggers: