TITLE

Deep Deleting Erases Enterprise Worries

AUTHOR(S)
Alleven, Monica
PUB. DATE
November 2006
SOURCE
Wireless Week;11/15/2006, Vol. 12 Issue 23, p24
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses security issues related to deleting information stored in mobile electronic devices such as cellular telephones. According to Info-Tech Research Group, flash memory of such devices needs to be thoroughly erased using methods that is beyond simple manufacturer instructions. Info-Tech advises information technology managers to educate themselves on risks and prevention related to mobile device disposal and to provide employees with guidelines on risks associated with unsecured data storage.
ACCESSION #
23251586

 

Related Articles

  • Phone data is overlooked. Avison, Roanna // MicroScope;1/22/2007, p15 

    The article reports that businesses could fall foul of data storage and compliance issues by failing to protect and retain information stored on mobile phones. Mark Whiteman, managing director of Remote XT, warned that issues could arise as more people gathered data and stored it on their mobile...

  • is storage management software worth it? Radding, Alan; Barrett, Alexandra; Schlack, Mark // Storage Magazine;Apr2003, Vol. 2 Issue 2, p22 

    Examines the market condition for data storage management software companies in the U.S. as of April 2003. Impact of the withdrawal of BMC from its acquisition deal with Patrol Storage Manager; Investigation into the price of storage management software; Issues of enterprise storage management...

  • Protecting your creative efforts.  // Building Design;3/17/2006, Issue 1713, p25 

    The article recommends the significance of keeping a backup of data, relevant to the architecture and design practice. Evidently, architects must learn data protection, storage and recovery methods, to generate and manipulate design information faster and more efficiently, using a range of...

  • Best practices for backup and long-term data retention (part 1). Beech, Debbie // IM@T.Online;Mar2010, p2 

    The article provides information on the storage technologies and the best practices data storage, backup and long term data protection for meeting business and other regulatory compliance requirements. It discusses how tapes are still used for data storage along with disk based systems. some of...

  • 8 Uses for an Old (but Unbroken) Smartphone. Broida, Rick // PCWorld;Aug2011, Vol. 29 Issue 8, p90 

    This article presents several practical ways to make an old smartphone useful. It advises to use an old smartphone in case of emergency. It also suggests to use it as a Wi-Fi phone or as an MP3 player. In addition, the article recommends the use of the phone as a mobile data-storage unit for...

  • Spectral Partitioning of Phylogenetic Data Sets Based on Compatibility. Chen, Duhong; Burleigh, Gordon J.; Fernández-Baca, David // Systematic Biology;Aug2007, Vol. 56 Issue 4, p623 

    We describe two new methods to partition phylogenetic data sets of discrete characters based on pairwise compatibility. The partitioning methods make no assumptions regarding the phylogeny, model of evolution, or characteristics of the data. The methods first build a compatibility graph, in...

  • Storage Services for Data Security. Chandler, Doug // Telecommunications - Americas Edition;Aug2005, Vol. 39 Issue 9, p12 

    Focuses on the storage services for data security. Benefits of storage services for service provider executives; Importance of digitized photos, music and other unstructured content in the consumer realm and its direct impact on the business world; Perception of competence in information technology.

  • Analyzing Object I/O Utilization.  // SQL Server Magazine;Aug2004, Vol. 6 Issue 8, p13 

    The article presents information on object input-output (I/O) utilization. The author says that by setting Statistics I/O ON, he gets the valuable information about the amount of I/O performed on each table in his query. He asks for the ways to store this information for each statement run, even...

  • How to identify storage solutions. Sigarto, Sam // Communications News;Aug2005, Vol. 42 Issue 8, p18 

    The article discusses the use of remote data-protection services as an alternative to purchasing new equipment and adding staff to comply with the Sarbanes-Oxley Act in the U.S. Originally established to strengthen practices and policies for protecting, retaining, securing, accessing and...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics