Part of the Authentication glossary:

The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used. Most mobile phone users lock their devices with PIN codes to prevent fraudulent use in case the phone set is lost or stolen.

A lost or stolen mobile phone presents a significant danger of identity theft. Current mobile phones, particularly smartphones, often store a great deal of information about the owner, including e-mail contacts, the owner's residence address, phone numbers of relatives and colleagues, corporate associations, social networking usernames and passwords, and banking information.

Because many mobile workers also access corporate networks and  store corporate data on their phones, a lost or stolen device can also put their company’s security at risk.

Despite the advantages of locking a phone with a PIN, a significant proportion of mobile phone owners neglect to take this simple precaution.

This was last updated in November 2012
Contributor(s): Stan Gibilisco
Posted by: Margaret Rouse

Related Terms

Definitions

  • invocation ID

    - An invocation ID is an ID number that identifies databases within Active Directory and changes as AD is in a restore process. Invocation IDs change during the restore process to make sure replicati... (SearchWindowsServer.com)

  • TAN (transaction authentication number)

    - A transaction authentication number (TAN) is a type of single-use password used for an online banking transaction in conjunction with a standard ID and password. TANs are often in a list made by a... (WhatIs.com)

  • social login

    - Social login is a single sign-on (SSO) that allows users to authenticate themselves on various applications and sites by connecting through a social networking site rather than typing a separate ID... (WhatIs.com)

Glossaries

  • Authentication

    - Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.