Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

PDAs Gone Wild!

By Eamon P. Doherty
January 1, 2008
It’s all in the upfront policies, handling of PDA evidence and knowledge of the incident team. Pictured are coauthor Dr. Eamon Doherty and a law enforcement officer practicing imaging a hard drive and then a PDA.


It’s the history of security – good and helpful things, in the wrong hands, can be threatening and harmful.

Personal data assistants, also called personal digital assistants, started as small “electronic organizers” in the 1970s that originally held limited data such as address books, calendars and to do lists.

In the 1980s, connectivity with computers became possible through the 9 pin serial port. In 2006, such devices morphed into small computers with miniature color screens, wireless Internet connectivity, e-mail applications and light versions of Microsoft Office. The HP hx2490 is one example of a commonly used PDA with wireless, Bluetooth and infrared connectivity.

LEGIT USES OF PDAS

Some corporations provide PDAs to employees after they sign various policies to govern use. They are then free to use PDAs to increase productivity by watching training videos, exchanging documents and keeping current with both office and customer e-mail while out of the office.

The problems and challenges stemming from corporate PDAs are as wide and deep as cyber security issues in general – theft of information, sexually and otherwise inappropriate messaging and communications, download and transmission of child pornography and other restricted or illegal data, and so on.

Seizing electronic devices can be a legal dilemma because many PDAs used in the workplace are purchased using personal funds. Furthermore, personal communications and business communications and data may be mixed on the same electronic device, establishing further complexity in the legal forum. To face these legal challenges, many enterprises, chief security officers and general counsels with foresight will create policies that proactively address employees using personal handheld devices such as PDAs carrying company data in and out of company space. These policies should also address device surrender issues and be signed, dated and notarized. If the PDAs are provided by the company, the same rules that govern laptop computers regarding surrender and monitoring should also apply to other digital devices.

INCIDENT RESPONSE AND SECURITY

If there is an allegation of misusing a PDA, then there needs to be an incident response team (IRT) which can act quickly according to an incident response policy to seize a PDA before the involved person has an opportunity to wipe the data or destroy the device. The chief security officer may also wish a member of his or her physical security staff to accompany the IRT because of potential workplace violence when an employee is confronted with an allegation. Sometimes it might even be beneficial to work with IT to have the suspected employee turn over his or her device for “upgrades” so that an examination can be done. This saves the employer from making a “too-soon” allegation and from the embarrassment if the suspected data is not found on the device. While this may create some further legal challenges, recognize that many enterprises covertly image employee hard drives over the network to conduct forensic analysis without the employee’s knowledge or permission.

This type of activity is all governed by the use agreement mentioned earlier.

Once the PDA is collected, it is recommended to seize any chargers, extra batteries, cables, manuals and software if possible so that volatile data is not lost if the investigation is delayed. If the same devices are used company-wide, this will not be an issue and if a charger cannot be found, a replacement can be easily located on the Internet.

PROTECT PDA FROM TAMPERING

It is a good idea to also put the device in a Faraday bag, which looks like an aluminum bag, to prevent further connectivity with other wireless devices and thus avoid potential evidence tampering or manipulation. A member of the IRT usually starts a chain of custody form showing what was taken and where it was processed and stored, just as an investigator would do with any other evidence.

What starts out as a policy investigation may ultimately become a police investigation, particularly in cases involving intellectual property theft, child pornography or harassment.

Paraben’s Device Seizure is one tool on the market which allows for PDA seizure. While the tools are relatively simple to use, it is recommended that security personnel focus on seizing and preserving the evidence. They should be trust credentialed security and computer forensic professionals using best practices for examination and reporting of the digital evidence. A certified and/or licensed examiner will not only be more qualified to find and report the evidence, but will be able to testify in court as to how that evidence was obtained from an electronic device. It is good for police, academics and private corporate security professionals to try out digital forensic tools with PDAs, cell phones, and hard drives and discuss best practices.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Eamon P. Doherty, Ph.D., CCE, is associate professor at Fairleigh Dickinson University

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Drones Gone Wild: Predators Lose their Software Way on U.S.-Canada Border

    See More
  • Kegger Gone Wild at James Madison University

    See More
  • Measuring the Wild West Risks of Cyber Crime

    See More

Events

View AllSubmit An Event
  • March 15, 2011

    Axis Communications' Academy Refresh Course

    Axis Communications is constantly revising and updating our Fundamentals and advanced training courses to encompass the latest products and technologies. Axis Communications Academy Refresh is designed for those that have already gone through our Fundamentals training but have the desire or need to get updated or refreshed.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing