Information Managers
  • Home
  • Services
    • All Services
  • Templates
  • Blog
  • Contact Us
  • Practice Management Success
  • Podcasts

Smartphone Privacy Tips

Posted on January 26, 2017 by Jean Eaton in Blog

Ah, smartphones. The wonderful technology that lets us call, text, email, and Facebook to our heart's content, all while throwing some digital angry birds. What's not to love?

Quite a lot, actually, if you fail to protect your privacy.

Smartphones can store and transmit a wide range of data that third parties can access – such as your contact list, your pictures, and your browsing history. They are also vulnerable to viruses and malware that can compromise your personal information. Many apps that you have downloaded or pre-installed use geo-location, which allows you to be tracked wherever you go. Using Wi-Fi hotspots are a great way to get around paying for data usage on your phone bill, Wi-Fi hotspots can also leave you vulnerable to intrusion.

Wondering if a smartphone is a good idea for your child?

Taylor Tompkins provides step by step instructions on how you can modify your child’s smart phone security settings to help you limit the phone’s applications that meet parental approval and empower your child to use their smartphone responsibly.

For more security tips for your SmartPhone, including a review of apps, how to secure your work email, access your bank from your mobile device, make safe purchases on your mobile, and reduce security breaches see, “Smartphone Security Guidance” (TigerMobiles.com)

Memory Devices Too

Sometimes we forget that our cell phones are memory devices, too. Plugging in your cell phone to a computer USB port might be convenient way to listen to music while you are at work or to charge up your phone – but it is also a way to upload viruses from the phone to the computer or to download data from the computer to the cell phone![clickToTweet tweet=” Don't let employees plug in their phones to your computers at work. #PrivacyAware” quote=” Don't let employees plug in their phones to your computers at work.”]

Do You Use a Digital Wallet?

Using your phone to pay for your purchases is the ultimate convenience. Not surprisingly, it comes with additional risks, too. VISA recommends users to keep “L-O-K” in mind to add  extra layers of security to protect your digital wallet. See more details here:

How to “LOK” down your digital wallet

So how do you protect your mobile privacy?

Tip – Secure and protect your phone to protect your smartphone privacy.

Instructions

  • Secure your phone with a unique password
  • Protect your phone with security software and update its operating system when prompted
  • Opt-out of the location service feature – many apps do not need geo-location enabled to work
  • Limit the type of business you conduct using Wi-Fi hotspots. If you use Wi-Fi frequently, consider using a VPN connection.  See the infographic from Point-Bl_nk Communications
  • Turn off blue-tooth and Wi-Fi roaming; turn it on only when you need it
  • Help the Good Samaritan return your lost phone; enable your screen lock display with a contact phone number or email to find you.

For more smartphone privacy tips, see Information Managers Data Privacy Day E-course. Get it before it's gone!

Resources

Ackroyd, Brandon. “Smartphone Security Guidance” (TigerMobiles.com) 2015- Dec-14.

Martin, Stacy. “Helpful or Creepy? The Creep-O-Meter Could Help You Find Out” Stay Safe Online Blog 2015-Nov-13.

Tompkin, Taylor. Empowering Your Child to Use Their Smartphone Responsibly, Stay Safe Online Blog, 2013-Jul-16.

See all the Data Privacy Day E-course resources posted each day on our website.

DPD Champ badge

Celebrate Data Privacy Day with Information Managers!

[clickToTweet tweet=”Concerned about your privacy online? Practical tips, tools, and resources! Get it before it's gone. #PrivacyAware. ” quote=”Celebrate Data Privacy Day with Information Managers! Tweet This!”]

Concerned about your privacy online? The FREE Data Privacy Day E-course makes it easy for you to enjoy the benefits of the internet while protecting your privacy.
It's easy, fun and filled with practical tips, tools, and resources! Get it before it's gone.

Follow Data Privacy Day around the world using Twitter and #PrivacyAware.

We are proud to be a Data Privacy Day Champ!

#PrivacyAware, Data Privacy Day, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security, smart phone security, smartphone privacy tips

Search the site

What is the elephant in the room?

The Elephant in the Room Find out here...

Privacy Policy

"I attended the Privacy Impact Assessment Walkthrough workshop (for ARMA members). Jean shared resources and on-going networking opportunities. The biggest benefit to me is to know that there is help out there in moving forward with our Privacy Impact Assessment responsibilities."

- Ellen Sauvé, Parkland County

Register for Free On-line Privacy Breach Awareness Training!

Privacy Policy

Copyright 2022 Information Managers Ltd.

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}