Standard Operating Procedures (SOPs) for Mobile Device Management (MDM) using Microsoft Intune


Overview


The purpose of this article is to ensure the secure and compliant management of mobile devices using Microsoft Intune, while protecting user privacy and maintaining data integrity. 

Scope: These SOPs apply to all users, administrators, and organizations using Microsoft Intune for MDM. 
 

Critical Concepts


Roles and Responsibilities

Steps to Take


1. Enrollment and User Consent 

  1. Administrators will configure Microsoft Intune to require user consent for enrollment, if required by organizational policies.
  2. Users will be informed about data collection and usage during the enrollment process.
  3. Users must provide explicit consent for data collection and device management activities.
  4. Administrators will maintain a record of user consent and ensure that it is easily accessible. 

2. Data Collection and Storage 

  1. Administrators will configure data collection to align with organizational privacy policies and regional requirements.
  2. Microsoft Intune will store data in its cloud infrastructure, adhering to global compliance standards.
  3. Organizations will choose data residency options to meet regional requirements.
  4. Administrators will ensure that data is properly categorized, labeled, and stored in accordance with organizational policies. 

3. Access Controls and Audits 

  1. Administrators will implement role-based access controls (RBAC) to limit data access to authorized personnel.
  2. Regular audits and reviews will be conducted to maintain security and ensure that access controls are effective.
  3. Administrators will maintain a record of access controls, including user roles, permissions, and access logs. 

4. Data Transmission and Encryption 

  1. Microsoft Intune will use encryption protocols (e.g., TLS) to secure data in transit between devices and management servers.
  2. Administrators will ensure that regular updates are applied to maintain current security standards.
  3. Data transmission will be monitored for any security breaches or vulnerabilities. 

5. User Transparency and Notifications 

  1. Microsoft Intune will provide user-facing notifications about device management activities and data collection practices.
  2. Users will have access to information about what data is collected and how it is used.
  3. Administrators will ensure that users are informed about any changes to data collection or usage policies. 

6: Third-Party Integrations 

  1. Organizations will assess integrations with third-party applications for compliance with privacy policies.
  2. Administrators will ensure that data shared with third-party applications is properly secured and compliant with organizational policies.
  3. Regular reviews will be conducted to ensure that third-party integrations remain compliant with changing privacy standards. 

7. Incident Response and Breach Notification 

  1. Administrators will have an incident response plan in place in case of a security breach or data loss.
  2. Users and stakeholders will be notified in accordance with organizational policies and regional requirements.
  3. Administrators will conduct a thorough investigation and take corrective actions to prevent future incidents. 

If you still have questions or need additional assistance, please contact the ITS Service Desk. You can call us at (858) 246-4357, email us at support@ucsd.edu, or submit a ticket at support.ucsd.edu.