Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

PDAs Gone Wild!

By Eamon P. Doherty
January 1, 2008
It’s all in the upfront policies, handling of PDA evidence and knowledge of the incident team. Pictured are coauthor Dr. Eamon Doherty and a law enforcement officer practicing imaging a hard drive and then a PDA.


It’s the history of security – good and helpful things, in the wrong hands, can be threatening and harmful.

Personal data assistants, also called personal digital assistants, started as small “electronic organizers” in the 1970s that originally held limited data such as address books, calendars and to do lists.

In the 1980s, connectivity with computers became possible through the 9 pin serial port. In 2006, such devices morphed into small computers with miniature color screens, wireless Internet connectivity, e-mail applications and light versions of Microsoft Office. The HP hx2490 is one example of a commonly used PDA with wireless, Bluetooth and infrared connectivity.

LEGIT USES OF PDAS

Some corporations provide PDAs to employees after they sign various policies to govern use. They are then free to use PDAs to increase productivity by watching training videos, exchanging documents and keeping current with both office and customer e-mail while out of the office.

The problems and challenges stemming from corporate PDAs are as wide and deep as cyber security issues in general – theft of information, sexually and otherwise inappropriate messaging and communications, download and transmission of child pornography and other restricted or illegal data, and so on.

Seizing electronic devices can be a legal dilemma because many PDAs used in the workplace are purchased using personal funds. Furthermore, personal communications and business communications and data may be mixed on the same electronic device, establishing further complexity in the legal forum. To face these legal challenges, many enterprises, chief security officers and general counsels with foresight will create policies that proactively address employees using personal handheld devices such as PDAs carrying company data in and out of company space. These policies should also address device surrender issues and be signed, dated and notarized. If the PDAs are provided by the company, the same rules that govern laptop computers regarding surrender and monitoring should also apply to other digital devices.

INCIDENT RESPONSE AND SECURITY

If there is an allegation of misusing a PDA, then there needs to be an incident response team (IRT) which can act quickly according to an incident response policy to seize a PDA before the involved person has an opportunity to wipe the data or destroy the device. The chief security officer may also wish a member of his or her physical security staff to accompany the IRT because of potential workplace violence when an employee is confronted with an allegation. Sometimes it might even be beneficial to work with IT to have the suspected employee turn over his or her device for “upgrades” so that an examination can be done. This saves the employer from making a “too-soon” allegation and from the embarrassment if the suspected data is not found on the device. While this may create some further legal challenges, recognize that many enterprises covertly image employee hard drives over the network to conduct forensic analysis without the employee’s knowledge or permission.

This type of activity is all governed by the use agreement mentioned earlier.

Once the PDA is collected, it is recommended to seize any chargers, extra batteries, cables, manuals and software if possible so that volatile data is not lost if the investigation is delayed. If the same devices are used company-wide, this will not be an issue and if a charger cannot be found, a replacement can be easily located on the Internet.

PROTECT PDA FROM TAMPERING

It is a good idea to also put the device in a Faraday bag, which looks like an aluminum bag, to prevent further connectivity with other wireless devices and thus avoid potential evidence tampering or manipulation. A member of the IRT usually starts a chain of custody form showing what was taken and where it was processed and stored, just as an investigator would do with any other evidence.

What starts out as a policy investigation may ultimately become a police investigation, particularly in cases involving intellectual property theft, child pornography or harassment.

Paraben’s Device Seizure is one tool on the market which allows for PDA seizure. While the tools are relatively simple to use, it is recommended that security personnel focus on seizing and preserving the evidence. They should be trust credentialed security and computer forensic professionals using best practices for examination and reporting of the digital evidence. A certified and/or licensed examiner will not only be more qualified to find and report the evidence, but will be able to testify in court as to how that evidence was obtained from an electronic device. It is good for police, academics and private corporate security professionals to try out digital forensic tools with PDAs, cell phones, and hard drives and discuss best practices.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Eamon P. Doherty, Ph.D., CCE, is associate professor at Fairleigh Dickinson University

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Digital Information Protected Secured

Taming the Threat Beast: Building a Threat-Led Cybersecurity Program

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Drones Gone Wild: Predators Lose their Software Way on U.S.-Canada Border

    See More
  • Kegger Gone Wild at James Madison University

    See More
  • Measuring the Wild West Risks of Cyber Crime

    See More

Events

View AllSubmit An Event
  • March 15, 2011

    Axis Communications' Academy Refresh Course

    Axis Communications is constantly revising and updating our Fundamentals and advanced training courses to encompass the latest products and technologies. Axis Communications Academy Refresh is designed for those that have already gone through our Fundamentals training but have the desire or need to get updated or refreshed.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing