Guidelines for using smartphones and protecting data
It is important that communications service users identify the threats targeted at their own communication as well as the available means to protect the communication. FICORA's guidelines provide information on the threats in confidential communications related to the use of the internet and telephone and provide instructions for encrypting communications.
The guidelines have been updated with guidance related to smartphones.
General settings for a smartphone are determined always when the phone is taken into use. Apart from making calls, the smartphone is used for utilising internet services. These services are mainly used by means of applications downloaded to the smartphone. Applications downloaded to the smartphone require the user's approval for the use of, for example, location information. Several applications use cloud services for saving or taking backups of the data processed by applications.
Based on the use of the telephone and the confidentiality of the data processed on the telephone, the user should assess the usage rights of the data delivered by the smartphone's operating system and applications. For example, work duties may give reason to restrict the network traffic or location information delivered by the phone. However, the restrictions can reduce the possibilities to use the smart phone, because some applications do not function or all the application features cannot be used if the user does not approve the usage rights that the application requires.