Information Technology Reference
In-Depth Information
Securing the evidence
With advanced smartphone features such as Find My iPhone and remote wipes, securing a
mobile phone in a way that it cannot be remotely wiped is of great importance. Also, when
the phone is powered on and has service, it constantly receives new data. To secure the
evidence, use the right equipment and techniques to isolate the phone from all networks.
With isolation, the phone is prevented from receiving any new data that would cause active
data to be deleted.
Search WWH ::




Custom Search