Home CATEGORIES Corporate Ethics CSR: Protecting Personal Data On Smartphones

CSR: Protecting Personal Data On Smartphones


In today’s highly connected world, smartphones have become a key asset in everyday life, for both business and personal use. Because smartphones are also a consumer item, you must consider the risks to the personal information stored and accessed using them.

The theft or accidental loss of a smartphone can expose businesses and individuals to loss of any data stored on the device. The use of consumer smartphones within a corporate environment further complicates the issue of data protection, as information may flow onto or through devices that are not fully controlled by the business.

In recent years, security researchers have conducted many studies and performed demonstrations on the weaknesses found in smartphone operating systems, as well as in the apps themselves. This type of research helps identify vulnerabilities that need to be strengthened in the devices and apps.

Steps to ensure your personal information on smartphones remains protected:

  • Use the screen lock feature and make sure it is secured with a strong password or “draw to unlock” pattern. This is the most basic security precaution and requires minimal effort, yet can provide a critical barrier between personal information and a stranger.
  • Use security software specifically designed for smartphones. Such tools can stop hackers and prevent cybercriminals from stealing information or spying on you when you’re using public networks. In addition it can often help locate a lost or stolen device and even remotely lock or wipe it.
  • When out and about, make sure mobile devices remain nearby and are never left unattended. Be mindful of where you put your smartphone at all times. It is also a good idea to make sure you can differentiate your smartphone from others in the immediate vicinity by using a distinguishing sticker or case.

Corporations could take these steps to ensure sensitive corporate information on smartphones remains protected:

  • Organizations should develop and enforce strong security policies for employees using mobile devices for work; this includes requiring password-enabled screen locks. Use mobile device management and mobile security software.
  • Organizations should educate employees about the risks both online and physical associated with smartphones, such as the impact of a lost or stolen device.
  • Companies should take inventory of the smartphones connecting to their networks; they can’t protect and manage what they don’t know about.
  • Businesses should have a formal process in place so everyone knows what to do if a device is lost or stolen.
  • Companies should integrate mobile device security and management into the overall security and management framework and administer it the same way. In essence, treat smartphones as the true endpoints they are.

Thank you for reading the story until the very end. We appreciate the time you have given us. In addition, your thoughts and inputs will genuinely make a difference to us. Please do drop in a line and help us do better.

The CSR Journal Team



Please enter your comment!
Please enter your name here