Mobile devices are frequently used to access, transmit, and store both personal and business information (e.g., emails, contact lists, photos, and credit card numbers). Given the vulnerability of these devices, it is especially important that you protect them.
In the event that you do lose your judiciary-owned device, immediately contact your IT Security Officers.
(In the event that you lose your personal device that has court e-mail installed, treat the device as if it is a judiciary device and immediately contact your IT Security Officers. If you are upgrading, trading in, or donating a device with court email installed, contact your IT Security Officers.)
To protect your personally-owned devices, follow best practices listed below:
Require authentication to unlock the mobile device.
To control access to your device, set a personal identification number (PIN), password, or swipe pattern (if it is an option on the device). Remember to keep your PIN, password, or pattern secret and change it regularly – at least every 180 days. If you use a pattern, be sure it has at least five points and keep your screen clean so that smudges won’t reveal your swipe pattern.
Enable mobile device lockout.
Limit the number of PIN, password, or pattern guesses to no more than six. Some devices can be set to automatically delete all data and reset to the original factory settings after a certain number of incorrect authentication attempts.
Enable the auto-lock option.
Set your device to lock itself after a period of inactivity (e.g., five minutes). This makes it likely that anyone finding or stealing your device will have to unlock the device before they can use it.
Enable services to locate or remotely wipe mobile devices.
If your device is lost or stolen, the ability to find it or erase data from it can greatly reduce the potential impact of the loss. Before your device is lost or stolen, be sure to install or enable the tracking and remote-wiping software.
Encryption makes your data unreadable and inaccessible to anyone who doesn’t know your PIN, password, or pattern. Some mobile devices (e.g., iPhones) come with encryption already enabled, other devices require encryption software to be proactively installed (e.g., laptops) so that data stored on the device is kept safe.
If you have any questions, see your court's IT Security Officers.
The full article can be found here: http://jnet.ao.dcn/information-technology/security/security-training-and-awareness-resources/it-security-awareness-toolkit/tips-month/don%E2%80%99t-let-your-loss-be-their-gain