Monday, September 30, 2013

Know Ramifications of Cell Phone Use


Q:       Can I “unlock” my cell phone to get service from a different carrier?
A:        Yes. It is technologically possible to UNLOCK a phone so it will work for a different carrier. This practice, called “flashing” a phone, is common and legal practice in Europe, where international travel across different national cell-service-provider carriers is usual.
            In North America, unlocking a phone is sometimes called “jailbreaking,” which is currently illegal in the United States. If you want to change carriers, you must obtain a cell phone that works on the new carrier’s system. You cannot modify your existing phone without violating federal copyright law.

Q:       What types of information does my cell phone service provider collect?
A:        All cell phones require a service provider to connect the phone to the network.  The most common types of information service providers collect include:
·       phone numbers you have called and phone numbers from which you have received calls;
·       the amount of time  you spend on each call;
·       incoming and outgoing text messages;
·       times and dates you used your phone to access the Internet;
·       the IP address assigned to your phone during your Internet sessions;
·       the IP addresses of the websites you visited during Internet sessions;
·       the geophysical location of your phone.
In addition, Microsoft, Blackberry, Android phone and Apple iPhone service providers save passwords and collect Wi-Fi connections. They can also collect application data.

Q:       What other types of information stored in my phone may be accessed without my knowledge by malware, spyware or other harmful programs?
A:        Potentially, all information on your cell phone can be compromised.  This includes:
·       photos and videos stored on the phone or its “sd” memory card;
·       text messages;
·       your contact list;
·       financial information;
·       passwords;
·       your calendar.

Q:       How can these harmful programs get onto my cell phone?
A:        You can infect your phone with such harmful programs by installing applications, clicking on ads built to infect your cell phone, or by clicking on phony cell phone updates.

Q:       Can my cell phone information be accessed or stolen in other ways?
A:        Yes. Whenever you use your cell phone over an unsecured Wi-Fi connection, anyone in the vicinity can intercept data you type into your phone and send over the wireless network. Take special care when using unsecured Wi-Fi connections, and do not transmit password, banking or other financial data unless you are certain the data is being encrypted.

Q:       What should I do if I lose my cell phone?
A:        Immediately contact your cell phone service provider. Also, you can install onto your cell phone a “remote wiping” software capability that you can access if your phone is lost or stolen. 
Because your cell phone also may store a great deal of sensitive personal information, including login and password information, you should treat the loss of your cell phone as a potential identity theft event.

Q:       Can my cell-phone be bugged or configured to remotely monitor my activities?
A:        Yes, but it would require physical access to the phone. Such activity may be legal or illegal. For example, it is legal for parents to install special software onto their children’s phones to allow parents to receive text messages about the phone’s location, any calls made and copies of text messages. It is illegal, however, to divulge information obtained by intercepting messages sent over an interstate communications carrier line, according to the Federal Communications Act of 1934, and federal courts generally do not allow wiretap evidence to be used.

This “Law You Can Use” column was provided by the Ohio State Bar Association. It was prepared by Donald A. Wochna, chief legal officer and Hayden Pritchard, CCE, CCFE, ACE, AME, for Vestige Digital Investigations. Articles appearing in this column are intended to provide broad, general information about the law and technology. Before applying this information to a specific legal problem, readers are urged to seek advice from an attorney or appropriate technical expert.

Labels: ,

1 Comments:

Blogger Unknown said...

This comment has been removed by the author.

April 26, 2014 at 7:27 AM 

Post a Comment

Subscribe to Post Comments [Atom]

<< Home