<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing Photos on Mobile phones in Privacy</title>
    <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32324#M940</link>
    <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/902910071"&gt;@GinGa&lt;/a&gt;&amp;nbsp;&amp;nbsp; Does you organisation have a corporate security policy which extends to allowing personal mobile phones on site, as long as you apply the corporate Mobile Device Management (MDM), if not in our case, you would not be permitted on the corporate network or even the guest internet via WiFi.&amp;nbsp; By default the corporate MDM encrypts all data including photographs on the mobile phone and of course, if you loose it, it will by instruction locate and remove everything from the system entirely - albeit it still has power.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In terms of not loading up to the cloud, it really depends on whether the users are using your organisational infrastructure, if so, then a Cloud Access Security Broker (CASB), will do a great job of enforcing the corporate policy and detecting illicit attempts to send the photographs unauthorised places.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NATO examples are shown below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://communications.sectra.com/news-press-releases/news-item/70A469AC6C3BAD76/" target="_blank"&gt;https://communications.sectra.com/news-press-releases/news-item/70A469AC6C3BAD76/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://tutus.se/en/products/secure-smartphone" target="_blank"&gt;https://tutus.se/en/products/secure-smartphone&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think, all employees will have had to sign up to the Corporate Security Policies, and be part of the Mobile Device Management scheme or they would not be permitted to use their own devices unless they then apply the corporate MDM to those devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://smartphones.gadgethacks.com/how-to/5-best-phones-for-privacy-security-0176106/" target="_blank"&gt;https://smartphones.gadgethacks.com/how-to/5-best-phones-for-privacy-security-0176106/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Otherwise, you will simply not be able to manage the BYOD into the corporate environment.&amp;nbsp;&amp;nbsp; You could of course invoke the Mobile phone blocking technology, adopted in many education establishments and prisons.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An interesting discussion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
    <pubDate>Tue, 04 Feb 2020 18:12:49 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2020-02-04T18:12:49Z</dc:date>
    <item>
      <title>Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32301#M937</link>
      <description>&lt;P&gt;Hi All,&lt;BR /&gt;&lt;BR /&gt;We have users that visit a lot of external locations and take photos of sensitive data, this is against the policy but makes their lives a million times easier so hard to enforce&lt;BR /&gt;Instead I would like to find a solution that ensures the photos are properly encrypted and not uploaded to the cloud and ideally a corporate solution&lt;BR /&gt;&lt;BR /&gt;Does anyone have any recommendations?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 09:48:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32301#M937</guid>
      <dc:creator>GinGa</dc:creator>
      <dc:date>2020-02-04T09:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32306#M938</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/902910071"&gt;@GinGa&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi All,&lt;BR /&gt;&lt;BR /&gt;We have users that visit a lot of external locations and take photos of sensitive data, this is against the policy but makes their lives a million times easier so hard to enforce&lt;BR /&gt;Instead I would like to find a solution that ensures the photos are properly encrypted and not uploaded to the cloud and ideally a corporate solution&lt;BR /&gt;&lt;BR /&gt;Does anyone have any recommendations?&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Alexander, as long as an enterprise "saves" money by using BYOD (Bring Your Own Device) policies to have employees use their personally owned mobile phones for work purposes, you are out of luck. If you belly up to the bar and provide enterprise-owned phones to those employees, and implement a full enterprise control system on those devices, you can reduce greatly (but probably not eliminate) these breaches of security policy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SO, how about examining the current policy, and modify it, with meaningful and easy-to-use procedures, to help the employees work "a million times easier." Policies that interfere with a worker's primary duties guarantee work-arounds and subversion.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I addressed this reality a few years ago in &lt;A href="https://youtu.be/VhkH3BfWcd8" target="_blank" rel="noopener"&gt;Maybe&amp;nbsp;it's the Boss's Fault!&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 13:19:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32306#M938</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-02-04T13:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32315#M939</link>
      <description>&lt;P&gt;We ran into a similar issue with Office 365. We were having users showing up with dual concurrent successful&amp;nbsp; logins on both sides of the USA, 1 East Coast city and one West Coast city. Impossible to be in 2 places at once. We wondered if their account had been compromised.&amp;nbsp; Upon investigation we discovered that they had installed the O365 app on their personal phone and accessing their corporate account and were using a VPN obfuscation service (Hide my IP) on their personal phone. Where did this IP obfuscation service reside? On the West Coast. Problem identified. Now we realized we had to fix our BYOD and Appropriate use policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My stance has always been, if the company wants you to access the company's IT stuff on a phone, we will give you a phone (or other mobile device) (or should be providing it). Just because you are able to do something does not always mean it is approved. We had to politely ask people not to access their corporate accounts on their personal devices, to include home computers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 15:05:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32315#M939</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2020-02-04T15:05:45Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32324#M940</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/902910071"&gt;@GinGa&lt;/a&gt;&amp;nbsp;&amp;nbsp; Does you organisation have a corporate security policy which extends to allowing personal mobile phones on site, as long as you apply the corporate Mobile Device Management (MDM), if not in our case, you would not be permitted on the corporate network or even the guest internet via WiFi.&amp;nbsp; By default the corporate MDM encrypts all data including photographs on the mobile phone and of course, if you loose it, it will by instruction locate and remove everything from the system entirely - albeit it still has power.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In terms of not loading up to the cloud, it really depends on whether the users are using your organisational infrastructure, if so, then a Cloud Access Security Broker (CASB), will do a great job of enforcing the corporate policy and detecting illicit attempts to send the photographs unauthorised places.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NATO examples are shown below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://communications.sectra.com/news-press-releases/news-item/70A469AC6C3BAD76/" target="_blank"&gt;https://communications.sectra.com/news-press-releases/news-item/70A469AC6C3BAD76/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://tutus.se/en/products/secure-smartphone" target="_blank"&gt;https://tutus.se/en/products/secure-smartphone&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think, all employees will have had to sign up to the Corporate Security Policies, and be part of the Mobile Device Management scheme or they would not be permitted to use their own devices unless they then apply the corporate MDM to those devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://smartphones.gadgethacks.com/how-to/5-best-phones-for-privacy-security-0176106/" target="_blank"&gt;https://smartphones.gadgethacks.com/how-to/5-best-phones-for-privacy-security-0176106/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Otherwise, you will simply not be able to manage the BYOD into the corporate environment.&amp;nbsp;&amp;nbsp; You could of course invoke the Mobile phone blocking technology, adopted in many education establishments and prisons.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An interesting discussion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 18:12:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32324#M940</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-02-04T18:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32328#M941</link>
      <description>&amp;gt; GinGa (Viewer) posted a new topic in Privacy on 02-04-2020 04:48 AM in the&lt;BR /&gt;&lt;BR /&gt;&amp;gt; Does anyone have any recommendations?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Be realistic and specific in writing policy? If your policy has a stupid provision,&lt;BR /&gt;and people have to do things to get around it, they will get used to circumventing&lt;BR /&gt;policy as a matter of course.&lt;BR /&gt;&lt;BR /&gt;(I recall going in to one venue to teach. The security guard was a fussy little twit&lt;BR /&gt;with all kinds of requirements. He was sitting beside a sign that said "No cameras&lt;BR /&gt;or recording devices of any kind!" I did *not* point out that I was carrying two&lt;BR /&gt;laptops, both equipped with Webcams, and (for some reason that I can't recall)&lt;BR /&gt;also two smartphones, all of which I needed for the seminar ...)&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;Just because I have a short attention span doesn't mean I&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Tue, 04 Feb 2020 19:21:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32328#M941</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-02-04T19:21:24Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32367#M942</link>
      <description>&lt;P&gt;Thanks all for your replies&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I fully agree that if a policy is to strict that people will stop following it and do their own thing but I also cannot just change the policy so that everything the users want or need to do is allowed&lt;BR /&gt;&lt;BR /&gt;In this case I was looking for a technical solution where the users can work efficiently while our data is safeguarded&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am looking into a MDM solution in combination with a scanner type of app for now&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 08:17:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32367#M942</guid>
      <dc:creator>GinGa</dc:creator>
      <dc:date>2020-02-05T08:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32414#M943</link>
      <description>&lt;P&gt;Remember People, Processes and Technology at all times - everything involves all three.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 06:44:55 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32414#M943</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-02-06T06:44:55Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32454#M944</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Remember People, Processes and Technology at all times - everything involves all three.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;You are spot-on with reminding of the three components of a system.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I generally use &lt;EM&gt;People, Processes, and Tools&lt;/EM&gt;, because many tools are not what some would think of as &lt;EM&gt;Technology&lt;/EM&gt;: paper records, pencil and notebook, Post-It notes, Hammer, wrench, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 17:49:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32454#M944</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-02-06T17:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32472#M945</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;writes:&lt;/P&gt;&lt;P&gt;You could of course invoke the Mobile phone blocking technology, adopted in many education establishments and prisons.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Jamming is is &lt;A href="https://en.wikipedia.org/wiki/Mobile_phone_jammer" target="_blank" rel="noopener"&gt;illegal&lt;/A&gt; in many parts of the world.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 22:03:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32472#M945</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2020-02-06T22:03:27Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32473#M946</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;Absolutely, correct, but given the majority of education establishments are Government funded or linked directly to Government entities - definitely when it comes to examination time - they do certainly put in place mobile blocking technology or in places of correction.&amp;nbsp;&amp;nbsp; This may include Bluetooth, wireless WiFi and other such technologies given the capabilities of modern students to work around the system.&amp;nbsp;&amp;nbsp; Given that IoT devices, have unregistered wireless protocols in proprietary devices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The establishments would most certainly have authority to put such devices in place, and in recently I have seen even moves to even block Shadow IT via Cloud Access Security Brokers (CASBs), given the extent of the ingenuity of the potential perpetrators.&amp;nbsp;&amp;nbsp; Due to data leakage and the bypassing of controls, as we have witnessed via the cloud.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 22:19:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32473#M946</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-02-06T22:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32498#M947</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;writes:&lt;/P&gt;&lt;P&gt;You could of course invoke the Mobile phone blocking technology, adopted in many education establishments and prisons.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Jamming is is &lt;A href="https://en.wikipedia.org/wiki/Mobile_phone_jammer" target="_blank" rel="noopener"&gt;illegal&lt;/A&gt; in many parts of the world.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Also think of the human and legal ramifications of jamming if a bad event were to happen, i.e. mass shooting, terrorist attack, etc., and an entity was jamming cell signals and people were unable to call for emergency services or help. When thinking of solutions ensure you think through emergency scenarios as well.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 14:23:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32498#M947</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2020-02-07T14:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: Securing Photos on Mobile phones</title>
      <link>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32525#M948</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1602421967"&gt;@CISOScott&lt;/a&gt;&amp;nbsp;&amp;nbsp; However, there are circumstances where it is legal to do i.e. Places of Correction, during examination periods, if authorised, by the authorities themselves to contain and control messages during a Terrorism situations, during a Civil Emergency situation, whereby the public go potty using attempting to jam up the mobile phone system, and then drain the 24 hour battery capability of the mobile tower itself.&amp;nbsp; During a Civil Defense situation, the authority have the power to do a lot of things to protect the safety of lives.&amp;nbsp; Hence many emergency systems use P25 radio systems, these expensive devices have multiple capability, VHF, UHF, Emergency Channels and Mobile phone capabilities, and in some cases even Satellite phone capabilities.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think it comes down to the situation at the moment, and also who is the controlling entity.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I agree and respect both &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt; and &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1602421967"&gt;@CISOScott&lt;/a&gt; your respective perspectives, but there are circumstances whereby there is no other choice, but to jam the mobile phone cells, are specific network for a reason - whether it is for emergency or security reasons.&amp;nbsp;&amp;nbsp; Or potentially whereby a decoy mobile tower has been erected for dupe people or for investigation purposes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nothing in this world is black and white, it comes with shades of gray, and white, and there always overriding circumstances, whereby authorities have the power to veto or engage in certain circumstances.&amp;nbsp; "lex est lex."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 23:55:24 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Privacy/Securing-Photos-on-Mobile-phones/m-p/32525#M948</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-02-07T23:55:24Z</dc:date>
    </item>
  </channel>
</rss>

