Part of the Authentication glossary:

The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used. Most mobile phone users lock their devices with PIN codes to prevent fraudulent use in case the phone set is lost or stolen.

Next Steps

A lost or stolen mobile phone presents a significant danger of identity theft. Current mobile phones, particularly smartphones, often store a great deal of information about the owner, including e-mail contacts, the owner's residence address, phone numbers of relatives and colleagues, corporate associations, social networking usernames and passwords, and banking information.

Because many mobile workers also access corporate networks and  store corporate data on their phones, a lost or stolen device can also put their company’s security at risk.

Despite the advantages of locking a phone with a PIN, a significant proportion of mobile phone owners neglect to take this simple precaution.

This was last updated in November 2012
Contributor(s): Stan Gibilisco
Posted by: Margaret Rouse

Related Terms

Definitions

  • capacitive scanner

    - A capacitive scanner is a fingerscanning device that uses an array of capacitive proximity sensors, along with a microcomputer and associated electronic signal processing circuits, to create and st... (WhatIs.com)

  • smart label

    - A smart label is a slip of paper, plastic or other material on a product that contains an RFID tag in addition to bar code data. (WhatIs.com)

  • enhanced driver's license (EDL)

    - An enhanced driver's license (EDL) is a government-issued permit that, in addition to the standard features of a driver's license, includes an RFID tag that allows officials to pull up the owner's ... (WhatIs.com)

Glossaries

  • Authentication

    - Terms related to authentication, including security definitions about passwords and words and phrases about proving identity.

  • Wireless and mobile

    - Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

  • Security threats and countermeasures

    - Terms related to security threats, including definitions about anti-virus programs or firewalls and words and phrases about malware, viruses, Trojans and other security attacks.

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.