When you think of security, you may not classify cell phones in the same context as you do computers. With today's cell phone functionalities reaching new capabilities, however, you may be shocked at just how much personal information is stored on your phone. Internal memory built into phones and external media in the form of SIM cards provide a place to file a great deal of information. Most contain passwords, PIN numbers, address books, email messages, memos, appointments, to-do lists, and, of course, phone numbers. You definitely don't want this sensitive information to fall into the hands of an identify thief.
The subscriber identity module (SIM) card may store either all the information contained within the phone or just the information the carrier needs. This means that, even if you remove the SIM card, your phone could still contain a lot of confidential information on its internal memory. Every phone manufacturer may be different. My phone stores almost all information onto the SIM card. If I were to break my phone and get a new one, I would simply transfer the card into the new phone and all of my information would be back in place. There is little information left on the actual hardware of the phone.
Got a New Phone?
If you're like me, you go through phones much more frequently than you do PCs. Either you drop them down stairwells or you just can't resist the new features a better model provides (like the new model that morphs into a Star Trek communicator). This brings up the dilemma of disposal: Do you keep your old phone around for a spare? Do you donate your old phone to charity? Or do you destroy the phone? If you decide to donate your phone, you will have to delete everything through the menu system. If you feel like relieving some stress by destroying your phone, that goes without explanation.
Erasing the Phone's Memory
Some phones will allow you to remove the SIM card and still power up the unit, and some won't. Mine, for example, will not allow me to turn on the phone without the SIM card in place. If you can power up the phone and still access some of your personal information, then the phone contains some form of internal memory besides the SIM card. Just be aware that data can exist in both of these locations.
If you don't plan to use your SIM card again, be sure to wipe the data located on it as well. All phones have some type of command set to enter that will reset the phone to factory defaults or at least present you with hidden menus to delete data. The problem surfaces when you attempt to find the appropriate instructions for each phone. These options usually aren't documented in the user manuals and sometimes can be troublesome to track down.
Here's where the folks at WirelessRecycling.com come in handy. Their Cell Phone Data Eraser allows you to choose the manufacturer and model of your phone and then offers directions for removal of important information in the form of a PDF. (In case you can't locate your model number, it's usually found underneath the battery along with serial and FCC numbers.) Once you've retrieved the correct PDF file, you will have step-by-step instructions for removing information from your particular model of phone. If your model isn't listed, hold on to your phone and check back frequently; the list of phones on the site is updated monthly.
Donations
After you've finished deleting the contents, ensure that you have actually removed the items by double-checking that everything is empty. Now, when you donate your cell phone, your personal information will be completely wiped off the phone. Wireless Recycling also includes information for making donations. And an article from PC World deals strictly with recycling resources, so there's no shortage of places accepting donations.
Stay Safe and Secure
With the feature list of cell phones growing close to that of the ability of laptops, it's very important that you keep close tabs on where your information may land. Also, be leery about trusting your carrier; make sure you wipe your phones before you send them back to the manufacturer's recycling programs. When it comes to protecting your identity and other personal information, trust is hard to come by.
Max Hetrick is a PC Support Analyst/Specialist who holds a certification as an MCSA. He also has experience with installation and maintenance of Linux operating systems from the PC to server levels. Max can be reached at
LATEST COMMENTS
MC Press Online