Abstract
Jason is the regional manager of a large restaurant franchise, overseeing operations for 32 limited-menu restaurants in a major metropolitan area in the Northwest. Although his work requires him to be in regular daily contact with his location mangers and suppliers, his corporate parent does not provide him with a corporate cell phone. Jason uses his own phone in a bring your own device (BYOD) arrangement to send and receive e-mail from his corporate account and communicate with his managers and assistant managers as well as his supply chain contacts. In order to connect to his company’s e-mail server, Jason is required to use a four-digit PIN on his phone. Some other rules and regulations are displayed on screen, but Jason simply clicks “agree” without reading those.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Pew Research Internet Project, “Mobile Technology Fact Sheet,” www.pewinternet.org/fact-sheets/mobile-technology-fact-sheet/, January 2014.
- 2.
Gartner, “Gartner Predicts by 2017, Half of Employers Will Require Employees to Supply Their Own Device for Work Purposes,” www.gartner.com/newsroom/id/2466615, May 1, 2013.
- 3.
Financial Post, Lynn Greiner, “Beyond BYOD: Welcome to the Era of COPE (Corporate Owned, Personally Enabled) Devices,” http://business.financialpost.com/2014/02/03/beyond-byod-welcome-to-the-era-of-cope-corporate-owned-personally-enabled-devices/?__lsa=5553-a83a, February 3, 2014.
- 4.
Consumer Reports, “Smart Phone Thefts Rose to 3.1 Million Last Year, Consumer Reports Finds,” www.consumerreports.org/cro/news/2014/04/smart-phone-thefts-rose-to-3-1-million-last-year/index.htm, May 28, 2014.
- 5.
Huffington Post, “Identity Theft Cost Americans $1.52 Billion in 2011, FTC Says,” www.huffingtonpost.com/2012/02/28/identity-theft-cost-americans-152-billion-2011-ftc_n_1307485.html, February 28, 2012.
- 6.
CNET, Ben Fox Rubin, “Supreme Court: Cell Phones Are Protected from Warrantless Searches,” www.cnet.com/news/supreme-court-cell-phones-protected-from-warrantless-searches/, June 25, 2014.
- 7.
NPR, Steve Henn, “Here’s One Big Way Your Mobile Phone Could Be Open to Hackers,” www.npr.org/blogs/alltechconsidered/2014/06/13/321389989/heres-one-big-way-your-mobile-phone-could-be-open-to-hackers, June 13, 2014.
- 8.
McDonald’s, “Free Wi-Fi @ McDonald’s,” www.mcdonalds.com/us/en/services/free_wifi.html .
- 9.
Ars Technica, Sean Gallagher, “Ars Tests Internet Surveillance—by Spying on an NPR Reporter,” http://arstechnica.com/security/2014/06/what-the-nsa-or-anyone-can-learn-about-you-from-internet-traffic/, June 10, 2014.
- 10.
Windows Phone, “Use Wi-Fi Sense to Get Connected,” www.windowsphone.com/en-us/how-to/wp8/connectivity/use-wi-fi-sense-to-get-connected .
- 11.
NPR, “Here’s One Big Way Your Mobile Phone Could Be Open to Hackers,” www.npr.org/templates/transcript/transcript.php?storyId=321389989, June 13, 2014.
- 12.
Forbes, Kate Vinton, “Mobile Malware Is on the Rise, McAfee Report Reveals,” www.forbes.com/sites/katevinton/2014/06/24/mobile-malware-is-on-the-rise-mcafee-report-reveals/, June 24, 2014.
- 13.
Forbes, Gordon Kelly, “Report: 97% of Mobile Malware Is on Android. This Is the Easy Way You Stay Safe,” www.forbes.com/sites/gordonkelly/2014/03/24/report-97-of-mobile-malware-is-on-android-this-is-the-easy-way-you-stay-safe/, March 24, 2014.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Daniel G. Bachrach
About this chapter
Cite this chapter
Bachrach, D.G., Rzeszut, E.J. (2014). Don’t Be Careless with Your Phone. In: 10 Don’ts on Your Digital Devices. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-0367-5_7
Download citation
DOI: https://doi.org/10.1007/978-1-4842-0367-5_7
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-0368-2
Online ISBN: 978-1-4842-0367-5
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)