Subject: | |
From: | |
Reply To: | |
Date: | Tue, 11 Nov 2008 09:26:12 -0800 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Generally, the devices are "killed" when they are powered on. You need to have the connection to the cellular network in order for anything to happen. If the device is powered down, the server will hold the kill command until it detects the device coming back on the network. With a Blackberry device, each Blackberry has a unique identifier (PIN) that is not tied to the device's SIM card, so replacement of the SIM card will not eliminate the ability to remotely kill the device. If the device is placed into a Faraday cage or otherwise shielded from the cellular network, it is possible to attempt to extract the data on the device using forensic tools. I am not completely familiar with how data is encrypted on the various PDAs, so I'm not aware of what protection a password provides to the data on the device, beyond basic access to the PDA. Clearly, if the device holds extremely sensitive information, it should be password protected and encrypted and the
ability to remotely delete data should be enabled.
Patrick Cunningham, CRM
[log in to unmask]
"Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety."
Benjamin Franklin, Historical Review of Pennsylvania, 1759
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]
|
|
|