iPhone

Last Updated: August 26, 2024 10:19 am

OASIS IRB Support

For mobile devices you must consider passwords, how it’s connecting to the internet, apps, and encryption.

Passwords

Article – Passwords, Pass-phrases, an… (unc.edu)Links to an external site.

In this article on passwords refer specifically to:

  • You must change your passphrase at least once per year.
  • Treat all passphrases as Tier 3 restricted Sensitive Information. Do not share your pass phrases with others except in emergency situations. (Review “System Accounts” and “Exceptions” below for unusual cases). You may only use account credentials if you have authorization. Each person takes responsibility for maintaining the security of their passphrases.
  • Passphrases are not required to access a device where a single-device authentication mechanism such as a hardware+PIN, hardware+biometric (fingerprint/palm scan, facial recognition, etc.) is in use. Such devices have a hardware module that makes compromise less likely. They require physical access to the device, which is safer, so these mechanisms may substitute for use of a passphrase. Devices manufactured by Apple, Google, Yubico, Lenovo, Dell, and those using Microsoft Windows Hello for Business exceed the minimum requirements of this Standard.
  • In short, you should consider using either a 6-pin password, a biometric login (e.g., face recognition or fingerprint), or both.

How to connect to the network

Given the network you connect to could be compromised, you should be using a VPN client on your mobile device when connected to an outside wireless network, or if the network isn’t needed have that turned off for data gathering (e.g., you are taking pictures, videos, or audio capture).

Cisco Secure Client on the App Store (apple.com)
Links to an external site.

Apps

When installing some apps they request (or require) access to various other data-storing apps on your phone. This data sharing should be turned off for non-research apps that have access to locations where data are stored. (e.g., if Facebook has access to your photos and part of your research methods are to capture photos of participants).

Encryption

Chances are that encryption is already turned on on your iPhone, but this article will show you the steps to make sure that your data are protected.

How to Encrypt Your iPhone (lifewire.com)