Cell Phones: Convenience and Compromise

Cell phones have become a part of modern life. Children in elementary school carry them. So do business people. Even seniors, who are often labeled a techno-phobic group, carry them. And the companies who manufacture them and sell cell phone services or content, are in a race to make these once strictly utilitarian devices even more popular.


Advertisement


Full-featured accounting software at an easy-to-afford price.

PLUS:
- Total integration throughout
- Data migration for QuickBooks upgrades
- Complete security -- audit trail and
employee access control
- GAAP Compliant
- Installation services
- Wide range of training options
- U.S.-based support

Contact Cougar Mountain today for a free demo!


It is no surprise that many people covet the “latest and greatest” version of their wireless devices. Whether their preference is a cell phone, smartphone, pocket PC or PDA, new models are being introduced at an increasingly frequent rate. Constant upgrading can be expensive and it generates a steady stream of used and discarded equipment.

“Most people toss their phones after they’re done; a lot of them give their old phones to family members or friends,” Miro Kazakoff, a researcher at Complete Inc. of Boston who follows mobile phone sales and trends, told the Associated Press. Kazakoff also told the Associated Press that selling used phones is increasingly popular, with prices sometimes reaching into the hundreds of dollars.

The re-use of mobile devices can pose problems for the original owner, especially if personal or corporate data was stored on the device. The primary cause of most difficulties stems from the failure to erase data from the device prior to re-use or, more ominously, the inability to completely delete data in such a way that it is not recoverable. This is especially important for devices which are used to exchange corporate email messages.

Fortunately, http://www.wirelessrecycling.com/home/index.html WirelessRecycling.com recently introduced a service providing instructions on how to erase data from cell phones and wireless devices. Instructions are provided for a wide number of cell phone models, from a variety of popular manufacturers including: Audiovox, Blackberry, Ericsson, Handspring, Kyocera, Motorola, Nokia, Palm, Qualcomm and Sanyo, among others. The instructions are as straightforward as possible, but in some cases the method mandated by the manufacturer is complex in order to prevent data from being erased accidentally. Also, not all data erasures are complete. Some leave the phone number associated with the device in memory and others do not erase the data permanently, meaning it can be recovered.

It is not only the personal and corporate data stored on our devices that can create problems. New services, such as global positioning satellite (GPS) and 911 location services, sound helpful. They can help users find unfamiliar locations, avoid traffic and construction congestions or keep track of teenage drivers. They can help authorities locate individuals involved in accidents or track criminals. Unfortunately, such services can also be turned against individuals and used to determine when a home or office is unoccupied and thus a candidate for a break-in or provide a child’s location for an abduction attempt.

Another potential threat is the use of instant messaging applications such as Yahoo! Messenger, MSN Messenger or America Online (AOL) Instant Messenger, to send instant messages or text messages to mobile devices. The risk of using instant messaging software on corporate intranets and networks has been widely discussed. Cell phone and smart phone users may be less aware of the existence of virus and other malicious code specifically targeting mobile devices.

Using email may increase the security on the corporate end of the communication, however, unless similar precautions are taken by the phone user, data may still be at risk. Email can be sent via almost any email application to a cell phone as a text message simply by sending the message to the ten digit phone number at the carrier’s email address. The carrier addresses for five popular cell phone service providers are:

  • Cingular: phonenumber@cingularme.com
  • Nextel: phonenumber@messaging.nextel.com
  • Sprint: phonenumber@messaging.sprintpcs.com
  • T-Mobile: phonenumber@tmomail.net
  • Verizon: phonenumber@vtext.com

In addition, data sent as text messages and email is among the greatest threats simply because it is not always deleted or deleted permanently, as indicated earlier in this article.

It is unlikely that the clock can be turned back on the use of mobile devices. Instead, users, both individuals and businesses, must be aware of the potential security threats and the methods to prevent sensitive personal and company data from getting into the wrong hands.

You may like these other stories...

There it stands, your client's 100-year-old, rickety, vermin-infested barn or former hotel or whatever the darn thing once was. And she's considering what to do with it. There are two words that can help her decide...
It's not a reality—yet—but accounting software is poised to eliminate accountants. We are at a tipping point for many similar professions: online education replacing professors, legal software replacing...
Did you know that the tax code allows you to claim tax deductions for household damage caused by thefts, vandalism, fires, floods, hurricanes, and others kinds of casualties? But the law imposes several restrictions.Relief...

Upcoming CPE Webinars

Jul 31
In this session Excel expert David Ringstrom helps beginners get up to speed in Microsoft Excel. However, even experienced Excel users will learn some new tricks, particularly when David discusses under-utilized aspects of Excel.
Aug 5
This webcast will focus on accounting and disclosure policies for various types of consolidations and business combinations.
Aug 20
In this session we'll review best practices for how to generate interest in your firm’s services.
Aug 21
Meet budgets and client expectations using project management skills geared toward the unique challenges faced by CPAs. Kristen Rampe will share how knowing the keys to structuring and executing a successful project can make the difference between success and repeated failures.