{"id":28877,"date":"2020-11-16T22:33:54","date_gmt":"2020-11-17T04:33:54","guid":{"rendered":"https:\/\/www.filecloud.com\/blog\/?p=28877"},"modified":"2022-05-02T20:51:06","modified_gmt":"2022-05-03T01:51:06","slug":"geo-fencing-in-data-governance-and-its-possible-uses","status":"publish","type":"post","link":"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/","title":{"rendered":"Geo-Fencing in Data Governance and It&#8217;s Possible Uses"},"content":{"rendered":"<figure><img decoding=\"async\" title=\"Geo-Fencing\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2020\/11\/Geofence.png\" alt=\"Geo-Fencing\"><figcaption style=\"text-align: center;\">Geo-Fencing<\/figcaption><\/figure>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_63 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#What_is_Geo-Fencing\" title=\"What is Geo-Fencing?\">What is Geo-Fencing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#Applications_of_Geo-Fencing\" title=\"Applications of Geo-Fencing\">Applications of Geo-Fencing<\/a><ul class='ez-toc-list-level-4' ><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#Defence_Research_Finance\" title=\"Defence, Research &amp; Finance\">Defence, Research &amp; Finance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#Delivery_Executives\" title=\"Delivery Executives\">Delivery Executives<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#Schools\" title=\"Schools\">Schools<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#Remote_Travelling_Employees\" title=\"Remote \/ Travelling Employees\">Remote \/ Travelling Employees<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#Fleet_Management\" title=\"Fleet Management\">Fleet Management<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#Geo-Fencing_and_Data_Governance\" title=\"Geo-Fencing and Data Governance\">Geo-Fencing and Data Governance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#GeoFencing_in_FileCloud\" title=\"GeoFencing in FileCloud\">GeoFencing in FileCloud<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"What_is_Geo-Fencing\"><\/span><strong>What is Geo-Fencing?<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A Geo-fence is <span class=\"rcolor3\" data-name=\"is a|may be a|could be a\">a <\/span> feature that defines a virtual boundary around a real-world <span class=\"rcolor4\" data-name=\"geographical area|geographic area|geographical region|geographic region|region\">geographic area<\/span>. Every time the user enters or exits the boundary of <span class=\"rcolor6\" data-name=\"a certain|a particular|an exact|a precise|a definite|an explicit\">a particular <\/span>area, actions <span class=\"rcolor1\" data-name=\"can be|are often|will be|is|may be\">are often <\/span>triggered <span class=\"rcolor2\" data-name=\"in a|during a|in an exceedingly|in a very\">during a <\/span> location-enabled device. Usually, the user will receive a notification with certain information <span class=\"rcolor3\" data-name=\"based on|supported\">that supported <\/span>its location in real-time.<br \/>\nThe main advantage of this technology is that it creates a fusion between the virtual world <span class=\"rcolor5\" data-name=\"and the|and therefore the|and also the\">and the <\/span>real one. We make use of Geofencing in several projects, particularly <span class=\"rcolor6\" data-name=\"in the|within the\">within the <\/span>health industry.<\/p>\n<p>Geofencing notifies your app when its device enters or leaves <span class=\"rcolor1\" data-name=\"geographical regions|countries|realms|nations|nation-states\">the countries<\/span>. It <span class=\"rcolor3\" data-name=\"lets you|allows you to|enables you to|permits you to|helps you to\">allows you to <\/span>make cool apps <span class=\"rcolor4\" data-name=\"that can|which will|that may\">that will <\/span>trigger a notification whenever <span class=\"rcolor5\" data-name=\"you leave|you allow|you permit\">you allow <\/span>home or greet users with <span class=\"rcolor6\" data-name=\"the latest|the newest|the most recent\">the newest <\/span>and greatest deals whenever favorite shops are nearby.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Applications_of_Geo-Fencing\"><\/span><strong>Applications of Geo-Fencing<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<figure><img decoding=\"async\" title=\"Applications of Geo-Fencing\" src=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2022\/02\/applications-of-geo-fencing.jpg\" alt=\"Applications of Geo-Fencing\"><figcaption style=\"text-align: center;\">Applications of Geo-Fencing<\/figcaption><\/figure>\n<p>Geo-fencing has multiple use cases and if implemented aptly, can positively impact business operations.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Defence_Research_Finance\"><\/span><strong>Defence, Research &amp; Finance<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>By assigning geo-fences to devices deployed in finance, defense, or research, IT can ensure that the device is non-operational outside of the designated geo-fence. Using an MDM tool IT can define multiple geofences for various areas of operation and can make the device obsolete outside of the geo-fences. Every time the device enters or leaves the geofence, <span class=\"rcolor2\" data-name=\"it is|it's\">it\u2019s <\/span>notified <span class=\"rcolor3\" data-name=\"and they|and that they\">and that they <\/span>can track <span class=\"rcolor4\" data-name=\"the location|the situation|the placement\">the situation <\/span>of the device and check for compliance violations if any. This ensures that critical data on the device is secure at all times and cannot be accessed outside of designated premises.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Delivery_Executives\"><\/span><strong>Delivery Executives<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>Assigning particular areas to particular delivery executives. By assigning geo-fences to delivery executives, optimum efficiency <span class=\"rcolor5\" data-name=\"can be|are often|will be|is|may be\">is often <\/span>achieved by avoiding multiple delivery executives being assigned to <span class=\"rcolor6\" data-name=\"the same|an equivalent|a similar|identical|constant\">equivalent <\/span>geographical areas.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Schools\"><\/span><strong>Schools<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>More and more schools are implementing e-learning <span class=\"rcolor1\" data-name=\"to improve|to enhance|to boost\">to enhance <\/span><span class=\"rcolor2\" data-name=\"the learning|the training|the educational\">the training <\/span>experience <span class=\"rcolor3\" data-name=\"for students|for college kids|for college students\">for college kids<\/span>. Setting geofences on devices owned by the school eliminates the threat of students taking the device home and misusing it for any other purpose. Geo-fences ensure device security <span class=\"rcolor4\" data-name=\"as well|also|additionally|further|furthermore|in addition|likewise|moreover|similarly|still|yet\">also <\/span>as enforces intended usage.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Remote_Travelling_Employees\"><\/span><strong>Remote \/ Travelling Employees<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>IT can enforce multiple device policies <span class=\"rcolor5\" data-name=\"for different|for various\">for various <\/span>geo-fences. These device policies include WiFi configurations and other settings specific to office location. This facilitates <span class=\"rcolor6\" data-name=\"the employees|the workers|the staff\">the workers <\/span>to plug and work from multiple office locations without <span class=\"rcolor1\" data-name=\"waiting for|expecting|awaiting|anticipating|looking forward to|watching for|looking ahead to\">expecting <\/span> IT support.<\/p>\n<h4><span class=\"ez-toc-section\" id=\"Fleet_Management\"><\/span><strong>Fleet Management<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h4>\n<p>In logistics and transport, devices with geo-fence can help track <span class=\"rcolor2\" data-name=\"the location|the situation|the placement\">the situation <\/span>of vehicles <span class=\"rcolor3\" data-name=\"at all|in the least|the least bit|in the slightest degree|in any respect\">in the least <\/span>times. This ensures timely support in case of a breakdown as well as device and vehicle security. Geofencing is used to assist the algorithm in performing decisions to reroute cargo when detours or slowdowns arise.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Geo-Fencing_and_Data_Governance\"><\/span><strong>Geo-Fencing and Data Governance<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Let\u2019s dive deeper, and differentiate between geo-location and geo-fencing. Because geo-location uses your IP it can be easily spoofed or fooled and is not geographically accurate. However, geo-fencing <span class=\"rcolor4\" data-name=\"is based|is predicated|relies\">is predicated <\/span>on GPS coordinates from satellites tracking latitude and longitude.<\/p>\n<p>While GPS can be spoofed it requires loads of expensive scientific equipment and certain features to validate the signal. Using geo-coordinates enables new sets of policies and controls <span class=\"rcolor5\" data-name=\"to ensure|to make sure|to confirm\"> to make sure <\/span> security and enforce seamless verification.<\/p>\n<p>Geofencing <span class=\"rcolor6\" data-name=\"can be|are often|will be|is|may be\">is often <\/span>used as a tool to defend <span class=\"rcolor1\" data-name=\"as well|also|additionally|further|furthermore|in addition|likewise|moreover|similarly|still|yet\">also <\/span>to support risk management. By using it as a source <span class=\"rcolor2\" data-name=\"of data|of knowledge|of information\">of data <\/span>collection, decisions <span class=\"rcolor3\" data-name=\"can be|are often|will be|is|may be\">are often <\/span>implemented <span class=\"rcolor4\" data-name=\"to better|to raised|to higher\">to notify and <\/span>manage <span class=\"rcolor5\" data-name=\"the risk|the danger|the chance\">the danger <\/span>of devices entering and leaving a specified <span class=\"rcolor6\" data-name=\"geographical area|geographic area|geographical region|geographic region|region\">geographic area<\/span>. Geofencing can provide data that falls into Personally Identifiable Information (PII) which should make it regulated under most privacy laws.<\/p>\n<p>Geofencing and location tracking can be utilized to help identify risk to an organization. By tracking and understanding the physical patterns of devices coming and going from an organization, a risk profile can be established. Questioning why and when it is appropriate for a work device to leave company property or personal devices to be brought in, is one concept. It could prevent lost\/stolen work devices and discourage unsecured personal devices from being introduced to the network.<\/p>\n<p>A geofence could be set to alert administrators to strange devices that have crossed into a virtual barrier. It <span class=\"rcolor1\" data-name=\"can also|also can|can even|may also|may\">also can <\/span>alert administrators when devices <span class=\"rcolor2\" data-name=\"that should|that ought to\">that ought to <\/span>never leave the premises have crossed the barrier. Although this has not prevented the intrusion, it may alert the organization of an imminent threat, giving them a head start in the race.<\/p>\n<p>Any collection of data is at risk. As an administrator, the risk of this data getting into the wrong hands must weigh with the benefits of trend analysis and the intelligence that can come from it. At this time, most functionalities require this to be on an application with preauthorized approval on the device, however, this can change. If a \u201cmaster key\u201d could be created to fit any application and allow administrators to take over control of devices in secured locations. Administrators could see what trespassers are seeing, <span class=\"rcolor3\" data-name=\"shut down|pack up|close up|finish off|clean up|stop working\"> pack up <\/span> cameras and audio <span class=\"rcolor4\" data-name=\"to prevent|to stop|to forestall\"> to stop <\/span> information leaks<\/p>\n<h3><span class=\"ez-toc-section\" id=\"GeoFencing_in_FileCloud\"><\/span><strong>GeoFencing in FileCloud<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Geopolitics and government cost-cutting combined have added urgency to moving files and sharing them in the cloud: cost-cutting because the cloud is perceived to be cheaper than on-premises, and geopolitics because greater scrutiny of where files are located and who they are shared with is accelerating the need to geofence data.<\/p>\n<p>With FileCloud Online, you get the complete flexibility and choice to decide where your organization\u2019s data is stored. FileCloud Online is hosted in secure, world-class data centers in the US, EU, Canada, Australia, and Asia. You can select a region that is right for your business. FileCloud also enables administrators to discover and manage sensitive data. DPOs and administrators can now search for common data types using built-in pattern identifiers including e-mail addresses, and phone numbers<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The is no standardized global law for cybersecurity and privacy. The European Union (EU) has stricter encompassing privacy policies than those in the United States (US). According to IT Governance, \u201cunlike the European Union, the US has no single federal law that regulates information security, cybersecurity, and privacy throughout the country. Several states have their own cybersecurity laws <span class=\"rcolor5\" data-name=\"in addition|additionally\">additionally <\/span>to data breach notification laws. These areas are currently regulated by a patchwork of industry-specific federal laws and state legislation, with varying scope and jurisdiction. Geofencing is emerging as a tool offered to perform tasks, instead of just notifying administrators. Current privacy policies and laws are insufficient when the scope of geofencing is applied to current methodologies. Geofencing must be regulated in<span class=\"rcolor6\" data-name=\"in a|during a|in an exceedingly|in a very\"> a <\/span> fashion that ensures data collected <span class=\"rcolor1\" data-name=\"is necessary|is important|is critical\"> is important <\/span> and relevant, <span class=\"rcolor2\" data-name=\"and that|which\"> which <\/span> <span class=\"rcolor3\" data-name=\"the data|the info|the information\"> the info <\/span> is kept safe from potential threats<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The is no standardized global law for cybersecurity and privacy. The European Union (EU) has stricter encompassing privacy policies than those in the United States (US). According to IT Governance, &#8220;unlike the European Union, the US has no single federal law that regulates information security, cybersecurity, and privacy throughout the country. Several states have their own cybersecurity laws in addition to data breach notification laws. These areas are currently regulated by a patchwork of industry-specific federal laws and state legislation, with varying scope and jurisdiction. Geofencing is emerging as a tool offered to perform tasks, instead of just notifying administrators. Current privacy policies and laws are insufficient when the scope of geofencing is applied to current methodologies. Geofencing must be regulated in a fashion that ensures data collected is necessary and relevant, and that the data is kept safe from potential threats<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[284],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v20.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Geo-Fencing in Data Governance and It&#039;s Possible Uses - FileCloud blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Geo-Fencing in Data Governance and It&#039;s Possible Uses\" \/>\n<meta property=\"og:description\" content=\"The is no standardized global law for cybersecurity and privacy. The European Union (EU) has stricter encompassing privacy policies than those in the United States (US). According to IT Governance, &quot;unlike the European Union, the US has no single federal law that regulates information security, cybersecurity, and privacy throughout the country. Several states have their own cybersecurity laws in addition to data breach notification laws. These areas are currently regulated by a patchwork of industry-specific federal laws and state legislation, with varying scope and jurisdiction. Geofencing is emerging as a tool offered to perform tasks, instead of just notifying administrators. Current privacy policies and laws are insufficient when the scope of geofencing is applied to current methodologies. Geofencing must be regulated in a fashion that ensures data collected is necessary and relevant, and that the data is kept safe from potential threats\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/\" \/>\n<meta property=\"og:site_name\" content=\"FileCloud blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/tonidopage\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-17T04:33:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-03T01:51:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2020\/11\/Geofence.png\" \/>\n<meta name=\"author\" content=\"Team FileCloud\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:site\" content=\"@getfilecloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Team FileCloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/\"},\"author\":{\"name\":\"Team FileCloud\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935\"},\"headline\":\"Geo-Fencing in Data Governance and It&#8217;s Possible Uses\",\"datePublished\":\"2020-11-17T04:33:54+00:00\",\"dateModified\":\"2022-05-03T01:51:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/\"},\"wordCount\":1084,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"articleSection\":[\"data governance\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/\",\"name\":\"Geo-Fencing in Data Governance and It's Possible Uses - FileCloud blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\"},\"datePublished\":\"2020-11-17T04:33:54+00:00\",\"dateModified\":\"2022-05-03T01:51:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.filecloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Geo-Fencing in Data Governance and It&#8217;s Possible Uses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#website\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"name\":\"FileCloud blog\",\"description\":\"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing\",\"publisher\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#organization\",\"name\":\"FileCloud\",\"url\":\"https:\/\/www.filecloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"contentUrl\":\"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg\",\"width\":155,\"height\":40,\"caption\":\"FileCloud\"},\"image\":{\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/tonidopage\",\"https:\/\/twitter.com\/getfilecloud\",\"https:\/\/www.linkedin.com\/company\/codelathe\",\"https:\/\/www.pinterest.com\/filecloud\/filecloud\/\",\"https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935\",\"name\":\"Team FileCloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g\",\"caption\":\"Team FileCloud\"},\"sameAs\":[\"http:\/\/www.filecloud.com\"],\"url\":\"https:\/\/www.filecloud.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Geo-Fencing in Data Governance and It's Possible Uses - FileCloud blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/","og_locale":"en_US","og_type":"article","og_title":"Geo-Fencing in Data Governance and It's Possible Uses","og_description":"The is no standardized global law for cybersecurity and privacy. The European Union (EU) has stricter encompassing privacy policies than those in the United States (US). According to IT Governance, \"unlike the European Union, the US has no single federal law that regulates information security, cybersecurity, and privacy throughout the country. Several states have their own cybersecurity laws in addition to data breach notification laws. These areas are currently regulated by a patchwork of industry-specific federal laws and state legislation, with varying scope and jurisdiction. Geofencing is emerging as a tool offered to perform tasks, instead of just notifying administrators. Current privacy policies and laws are insufficient when the scope of geofencing is applied to current methodologies. Geofencing must be regulated in a fashion that ensures data collected is necessary and relevant, and that the data is kept safe from potential threats","og_url":"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/","og_site_name":"FileCloud blog","article_publisher":"https:\/\/www.facebook.com\/tonidopage","article_published_time":"2020-11-17T04:33:54+00:00","article_modified_time":"2022-05-03T01:51:06+00:00","og_image":[{"url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2020\/11\/Geofence.png"}],"author":"Team FileCloud","twitter_card":"summary_large_image","twitter_creator":"@getfilecloud","twitter_site":"@getfilecloud","twitter_misc":{"Written by":"Team FileCloud","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#article","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/"},"author":{"name":"Team FileCloud","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935"},"headline":"Geo-Fencing in Data Governance and It&#8217;s Possible Uses","datePublished":"2020-11-17T04:33:54+00:00","dateModified":"2022-05-03T01:51:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/"},"wordCount":1084,"commentCount":0,"publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"articleSection":["data governance"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/","url":"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/","name":"Geo-Fencing in Data Governance and It's Possible Uses - FileCloud blog","isPartOf":{"@id":"https:\/\/www.filecloud.com\/blog\/#website"},"datePublished":"2020-11-17T04:33:54+00:00","dateModified":"2022-05-03T01:51:06+00:00","breadcrumb":{"@id":"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.filecloud.com\/blog\/geo-fencing-in-data-governance-and-its-possible-uses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.filecloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Geo-Fencing in Data Governance and It&#8217;s Possible Uses"}]},{"@type":"WebSite","@id":"https:\/\/www.filecloud.com\/blog\/#website","url":"https:\/\/www.filecloud.com\/blog\/","name":"FileCloud blog","description":"Topics on Private cloud, On-Premises, Self-Hosted, Enterprise File Sync and Sharing","publisher":{"@id":"https:\/\/www.filecloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.filecloud.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.filecloud.com\/blog\/#organization","name":"FileCloud","url":"https:\/\/www.filecloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","contentUrl":"https:\/\/www.filecloud.com\/blog\/wp-content\/uploads\/2016\/02\/filecloud_logo_comparison.jpg","width":155,"height":40,"caption":"FileCloud"},"image":{"@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/tonidopage","https:\/\/twitter.com\/getfilecloud","https:\/\/www.linkedin.com\/company\/codelathe","https:\/\/www.pinterest.com\/filecloud\/filecloud\/","https:\/\/www.youtube.com\/channel\/UCbU5gTFdNCPESA5aGipFW6g"]},{"@type":"Person","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/8a8df071f564aa2c10fa07d6ce60c935","name":"Team FileCloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filecloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5818ab931b69298f500d8a184fd2384?s=96&d=mm&r=g","caption":"Team FileCloud"},"sameAs":["http:\/\/www.filecloud.com"],"url":"https:\/\/www.filecloud.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/28877"}],"collection":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/comments?post=28877"}],"version-history":[{"count":9,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/28877\/revisions"}],"predecessor-version":[{"id":33770,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/posts\/28877\/revisions\/33770"}],"wp:attachment":[{"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/media?parent=28877"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/categories?post=28877"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filecloud.com\/blog\/wp-json\/wp\/v2\/tags?post=28877"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}