Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 11 September 2009

Could your mobile device land your CEO in court?

Posted on 06:26 by Unknown

Sean Glynn, Credant Technologies

The humble PC is now around 25 years old, but, in many ways, the IT security industry - which has been with us for almost as long - has changed more in the last 2.5 years than the last 25.

Today's portable devices, notably smartphones powered by the Windows Mobile, Symbian, Apple and Blackberry operating systems, are microcomputers in their own right.

But their processing power capabilities are significantly behind the curve of their desktop cousins. Our best estimates here at Credant are that the modern smartphone in your pocket or purse probably has the processing power of a PC of about a decade ago.

And therein lies the problem. Encrypting data on the fly on most smartphones if done in the wrong way can take an awful lot of processing power, with the result that users get frustrated with seeing the hour-glass busy symbol under Windows Mobile, or similar busy icons under other operating systems and may just switch it off or ignore it.

But what happens if you don't encrypt the data on your portable device such as your smartphone or your laptop? What can possibly go wrong?

Quite a lot, when you consider the requirements of the Data Protection Act.

The Act - now backed up by European data directives - moves the issue of data protection out of the good-to-have and firmly into the must-have category, mainly because of the responsibilities these directives engender – and this can be done with the right software that won’t slow the device down and is invisible and seamless to the user.

Those responsibilities are compounded by the fact that many company employees often use their own portable devices for business - and vice versa - meaning that security safeguards applied to company PDAs, smartphones and laptops are often not applied to personal devices.

- Smartphones are minicomputers

As mentioned above, the latest generation of smartphones and PDAs are as powerful as the computers of the late 1990s - and their data storage capabilities are even more powerful.

The latest crop of Palm mobile computers/smartphones, for example, have a data capacity of 2 gigabytes, meaning that they can easily store 2,000 emails and/or 3,000 medium-sized documents.

And not just can - they frequently do store thousands of emails and documents for ease of reference and replies out of hours.

The only solution to all of these potential threats is encryption. Encryption is clearly the way to protect communications. It won't stop eavesdroppers (whether government-sponsored Echelon, profit-driven industrial spies, or good old hackers) from intercepting your messages - but it will stop them gaining anything useful from them.

But encrypting communications is no longer enough - you also need to encrypt the data stored on the mobiles devices, and all endpoints to stay on the right side of the law.

And the number of high profile laptop thefts is frightening, and growing. In the US, a computer insurer has estimated that five per cent of all laptops are stolen within their first 12 months of service.

On top of this, you also have to wonder just how many unreported thefts actually occur.

However, while it is clearly advisable to encrypt the data stored on all your mobile devices, it may, within the European Union, in fact be a legal requirement especially as they are frequently used to not only store company contact information but also a home address, mobile phone number and even home phone number.

In other words it is likely to include personal information that needs to be registered - and protected - as required under the Data Protection Act.

The seventh principle of this Act is unequivocal: "Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data."

First of all it is worth considering who is liable under this Act. The Act states that conformance to the Data Protection Act is the responsibility of the Data Controller.

And it defines a 'data controller' as being... "a person who (either alone or jointly or in common with other persons) determines the purposes for which and the manner in which any personal data are, or are to be, processed."

- Senior managers are personally liable

In other words, this 'person or persons' is effectively the Board and the immediate data processing managers.

One thing it is not and that is the person who 'owns' the portable device.

It is arguable that, if the data is on the smartphone, laptop or other endpoint device – and it is there by company assent, then it is the company that is determining the purposes for and manner in which it is to be processed. And it is therefore the company that is liable.

Against this backdrop, if your portable device falls into the wrong hands it could land your boss in court.

But if the data is on the mobile device without company assent, then the firm has probably already broken the Data Protection Act by failing to protect "against accidental loss or destruction of, or damage to, personal data"; that is, it has 'broken' the seventh principle.

Company rules might say, for example, that if employees carry company data on their own mobile device, they must use encryption to protect it.

"The employee is, of course, responsible for implementing the rules, but is probably responsible to the employer rather than directly to the Commissioner," explains Nicholas Bohm, a consultant to the E-Commerce Group of City law firm Fox Williams.

In other words, the company is still liable.

Quite simply, there is no way round this – the company is liable and must adhere to the conditions of the Data Protection Act - if employees use mobile devices that include contact information.

And, once again, it is worth considering the wording of the Act itself: "Where an offence under this Act has been committed by a body corporate and is proved to have been committed with the consent or connivance of or to be attributable to any neglect on the part of any director, manager, secretary or similar officer of the body corporate or any person who was purporting to act in any such capacity, he as well as the body corporate shall be guilty of that offence and be liable to be proceeded against and punished accordingly."

Put simply, this means you, a company director.

What actually constitutes appropriate technical and organisational measures is something that ultimately can only be defined by the courts - but it would be best not to let it get that far.

It seems fairly clear that 'organisational measures' could be covered by a formal written and enforced security policy designed to protect the mobile device and its data. But covering appropriate 'technical measures' is more difficult.

If we were talking about the corporate mainframe, then we would obviously be thinking about a firewall.

Unfortunately, despite the best efforts of the smartphone, PDA & laptop vendors, few include any sort of firewall protection, so it is down to users to encrypt their data and so stay safe.

Encrypted data is safe data. Confidential information is hidden from industrial spies and hackers alike. This is an advisable although not compulsory course of action.

However, if the mobile device contains contact information, then you must seriously consider its liability under the Data Protection Act. And in this case, encryption is almost compulsory.

www.credant.com

Courtesy: Eskenzi PR
<>

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ▼  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ▼  September (19)
      • Five Best Practices for Mitigating Insider Breaches
      • Encryption is the equivalent of a seat belt for data
      • Scientific company discusses simultaneously protec...
      • UK firms need to tighten up on Web app security
      • Storage Expo - free advice on cloud issues from Go...
      • DeviceLock host Webinar on securing businesses aga...
      • Bye Bye Baby
      • Toll-Free PBX hack highlights need for code auditing
      • Could your mobile device land your CEO in court?
      • Cyber-Ark Launches latest Privileged Identity Mana...
      • Hard disks will be boosted by Intel's Braidwood
      • Imperva says new SQL injection attacks from China ...
      • Increase in Cyber Criminals Targeting SMBs Online ...
      • HACKERS SAY TAKE SUMMER OFF BEFORE THE WINTER SPIKE
      • Hammer to Distribute Data Locker Encrypted Disk Drive
      • Finjan Welcomes Initiatives for Public Disclosure ...
      • Social Networking Poll Shows Users More Vulnerable...
      • Blogger asks CPS to 'take one for the team' in Gar...
      • RSA® Conference Europe 2009 Launches Registration ...
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile