PER4IL3LA56NZP SA2BREAKINGIBH ESTO5THE7CODEM 1CONSMOBILER4E 4D66ODEVICEIAT 3VEDATASTOERSU AENCRYPTIONTIE MODIONU4MDOLOR BY1DAVID1BECK3OF8SNR2DENTON
your firm’s network. Much more than phones, they are fully functional mobile computers with the ability to not only browse the Internet, but also your firm’s intranet and e-mail systems. In the process of doing so, they store a great deal of information. In fact, some of your most personal and private information is on your PDA and, more important, so is your clients’.
W 68 www.iltanet.org Peer to Peer
hen it comes to data protection, smartphones such as BlackBerry and iPhone present a growing challenge. These devices are always on, always connected and continuously downloading data from
Before you rush out and pick up the latest mobile gadget, you may want to consider the growing risks of using these devices for business. Emergent regulatory duties at the state, federal and global levels now impose compliance obligations on data that, in many cases, finds its way onto these smartphones. This changing landscape necessitates a well- organized risk management mobile device strategy. Data encryption, often called device encryption, is a commonly overlooked area. While encryption of data in transit has become standard across major mobile platforms, encryption of data at rest — on some platforms — is lagging behind.