HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual S 2.188 Security guidelines and rules for the use of mobile phones

S 2.188 Security guidelines and rules for the use of mobile phones

Initiation responsibility: Head of IT Section, IT Security Management

Implementation responsibility: Head of IT Section, IT Security Management

A number of different ways of protecting mobile phones against misuse are available. In order that the methods are also used, a set of security guidelines specifying all the security mechanisms to be implemented should be drawn up. In addition, a short and clear instruction sheet covering the secure use of mobile phones should be prepared for the users.

Data classes found

As soon as a mobile phone is switched on, it registers itself with the network provider through the nearest base station. At the network provider, data on the identity of the user, the serial number of the mobile phone and the identity of the base station over which registration has occurred is logged and stored. This is done even if no conversation takes place. Moreover, every time a number is dialled this event is stored, irrespective of whether a connection is established or not.

The classes of data generated during use of mobile phones fall into three rough categories:

Recommendations are provided below as to how this data can be protected against misuse.

Protection against card misuse

The mobile phone and SIM card must always be kept safe. They should never be left unattended during business trips. In particular they should not be left in parked vehicles.

Mobile phones and related services offered can be protected at various points by means of PINs and passwords. These include:

All these security mechanisms should be used (see also S 4.114 Use of the security mechanisms provided on mobile phones). Under no circumstances should the personal identification number (PIN) be kept in the same place as the SIM card for the mobile phone.

If the SIM card is lost, arrangements should be taken immediately for the network provider to block the card so as to prevent possible misuse and any resulting financial loss (see S 2.189 Blocking of the mobile phone in the event of its loss).

To ensure that misuse of the SIM card is noticed promptly, the itemised call breakdown should always be checked for inexplicable charges and destination numbers.

Itemised call breakdowns

The network provider stores the call data for billing purposes. In Germany, under the directive concerning data protection for companies which provide telecommunications services (TDSV) the network provider is only allowed to retain this data up to the date on which an invoice is prepared, but no longer than 80 days. However, it can be appropriate for the customer to allow the network provider to store the call data for longer in case any problems should subsequently occur in connection with invoicing.

Every customer should demand itemised call breakdowns in order to be able to review mobile phone usage. In Germany customers are entitled to receive itemised call breakdowns free of charge. The following data can be obtained from this source:

All users who share the telephone must be informed of the fact that an itemised call breakdown has been requested and what data will be collected by this means.

If an organisation maintains and analyses itemised call breakdowns for cost control reasons, the procedure must be agreed with the works council or staff council, and the Data Privacy Officer and users must be advised.

The itemised call breakdowns should always be checked following receipt to ensure that they are correct. This will provide insight into possible ways of reducing costs.

Disclosure of call numbers

It is possible to choose whether and what data on mobile phone connections should be entered in public phone directories and/or be available to users of directory enquiry services. If a call number is entered it is easier for other people to call one. However, this is not appropriate for all applications, e.g. where a mobile phone pool is used or if it is desirable to keep the number of incoming calls low.

If the calling number display function is enabled, persons called can see the number from which they are being called (assuming their equipment has the appropriate configuration). This service can generally be enabled or disabled by the network provider for a given mobile phone.

Call number suppression

In the GSM network, the number from which a call is being made can be indicated to the recipient of a call. If this is not desirable, then the precautions suggested in S 5.79 Protection against call number identification during use of mobile phones should be heeded.

Protection against interception of phone calls

The only effective protection against interception of the contents of phone calls is to employ interoperable, network-wide end-to-end encryption. As this encryption is not implemented, every connection over either the landline network or the mobile communication network can potentially be intercepted. However, in Germany and most other countries communications between mobile phone and base station are automatically encrypted.

The following measures are recommended as a means of reducing the threat:

Raising the awareness of users

Because people are often careless about the danger of communications being intercepted, organisations should check that existing measures aimed at creating staff awareness of the relevant dangers are sufficient. If necessary it may be appropriate to inform staff at regular intervals about the dangers of having their calls intercepted and of making them fully aware.

Employees should also be briefed on the requirement not to disclose confidential information on the telephone without taking additional precautions. In particular, checks should be made as to the identity of callers before giving out any detailed information (see also T 3.45 Inadequate checking of the identity of communication partners). Where mobile phones are used, care should also be taken to ensure that confidential information is not discussed in public.

Spectacular but false warning messages are always in circulation (see also T 5.80 Hoaxes). To avoid wasting valuable working time checking whether such messages are true or not, all staff should be informed as soon as possible following the occurrence of a new hoax. There are various information services which send out appropriate warnings.

Rules on the use of mobile phones

Where mobile phones are used in an organisation, a number of aspects needs to be subject to control. These concern the use of both private and also work mobile phones.

Use of private mobile phones

If there are not enough mobile phones to go round within the organisation, it is possible that private mobile phones could be used for business purposes. However, the following aspects must be settled in advance:

Use of business mobile phones

Similarly, a number of items need to be regulated with regard to the use of mobile phones belonging to the company/organisation:

General rules

Irrespective of whether the mobile phones used have been purchased privately or by the business, the employer should issue the following rules in writing:

As far as possible, a mobile phone should never be left unattended. If a mobile phone has to be left behind in a motor vehicle, then the device must not be visible from outside. Alternatives are to cover the device or to lock it up in the boot. Mobile phones have a certain value which could attract potential thieves.

If the mobile phone is used on-site in offices which do not belong to the organisation, then the security rules in force in the organisation being visited must be observed.

Mobile phones should not be left around unprotected on third-party premises such as hotel rooms. All password protection mechanisms should be enabled now if this has not already been done. Locking the phone up in a cabinet will discourage casual thieves.

Cost information

Every year GSM phone calls become cheaper, but there are certain options which in the long run can incur high charges. As charging structures are changed frequently, users should be informed at regular intervals as to how much the various types of connection cost and how these are affected by the time of the call, as well as the cost of other options.

When mobile phones are used, receiving a call itself can cost money if the person being called is abroad, for example, or has activated call forwarding to the landline network. As the caller has no means of knowing where the person he is calling is, the forwarding costs are not charged to him.

Rules regarding contactability

Even when people have a mobile phone there are times when they either cannot or would not wish to be called. Thus it can create a bad impression if mobile phones are used at every opportunity. If possible, mobile phones should be switched off during meetings or presentations. As a minimum, the ringing tone should be disabled or be set so that it is barely noticeable. Whenever it will not be possible to talk freely (e.g. during meetings, in restaurants etc) use of the mobile phone should be avoided from the outset.

On the other hand, steps should be taken to ensure that the user can be contacted. Various options are available for ensuring this. For example,

Banning the use of mobile phones

Consideration should be given as to whether the use or even the carrying of mobile phones should be restricted in all or certain areas of the company/agency. For example, this could be a good idea for meeting rooms (see also S 5.80 Protection against bugging of indoor conversations using mobile phones). If the IT security policy of the institution does not allow mobile phones to be brought into the building, clear notices to this effect must be placed on all the entrances. Checks should then be made at regular intervals to ensure that the policy is being adhered to.

The use of mobile phones can sometimes have an adverse effect on the proper functioning of other technical devices. This is why mobile phones have to be switched off, for example, in aircraft or intensive care wards. Mobile phones can also exercise interference on other, sensitive IT systems. For example, such interference has been observed in server rooms and computer centres. The lower the transmitting power of the mobile phone or the further away that the mobile phone is from any sensitive equipment, the less likely it is to cause interference.

Where IT systems are used to process sensitive data or are connected to a computer network, no mobile phone cards should be permitted (see also S 5.81 Secure transmission of data over mobile phones).

There is no foolproof way of protecting against the unauthorised transmission of data over mobile phones, especially by insiders. However, taking mobile phones into sensitive areas should be forbidden and checks should be made at regular intervals to ensure that this ban is being adhered to.

Telephone directories

Call numbers and the associated names and/or additional details can be stored in the telephone directory of a mobile phone. Telephone directories can be stored on the terminal device, i.e. on the mobile phone or SIM card. They do not have to have the same content. PINs can be used to restrict access to a given telephone directory in the memory of the terminal device and/or of the SIM card.

Whether it is best to hold telephone numbers in the mobile terminal or on the SIM card will depend on various factors, for example how easy it is to back up the data to other media (see S 6.72 Precautions relating to mobile phone failures). Generally it is recommended that the data is stored on the SIM card, since

If possible, only one type of storage should be chosen. All important call numbers should be stored in this telephone directory to ensure that they are available at all times. The stored call numbers should be checked from time to time to ensure that they are still correct and are necessary. All call numbers should be stored in such a way that they can be called from anywhere in the world, i.e. including the country and area codes. Since only the country code is internationally agreed, and not the zero, every call number should be entered with a "+" at the beginning, followed by the country code (e.g. +49 for Germany), area code without leading zero and then the actual phone number. For example, a possible entry might be +492289582369 GS hotline.

If the mobile phone is used by several users, only phone numbers which are shared should be stored here. In addition, any facilities allowing the prevention of changes to the telephone directory via the existing blocking mechanisms should be used.

Use of answerphone functionality

Most network providers offer a service allowing an answerphone function on a mobile phone. Under such arrangements, incoming calls are stored at the network provider's in a mailbox or mobile box which can be retrieved by the user at any time. This can be very useful, but generally use of the service incurs additional costs.

Access to the mailbox should be protected by a PIN. Even when the mailboxes not used, the preconfigured PIN should be changed early on to prevent use by third parties.

Messages recorded should be listened to at regular intervals. All the users must be informed as to how the answerphone function works.

Call diversion

The call diversion function enables incoming calls to be diverted to the mailbox or to a different call number. There are several variants of this:

However, it should be noted here that call diversions to landline network connections can incur high charges as the person who is being called has to pay the diversion costs himself.

Call restrictions

Call restrictions can be used to block calls to or from a call number. These functions are provided via the network provider and can be modified on the mobile phone. Normally it is necessary to enter a password.

Call restrictions can be a good idea if the mobile phone is to be passed on to third parties. There are various types of call restrictions:

Whether any call restrictions should be chosen and, if so, which ones, will depend on the way in which the mobile phone concerned is used.

Closed User Group

The "Closed User Group" service allows communications to be restricted to the members of that group (see also S 5.47 Configuration of a Closed User Group).

The group members must be registered with the network provider. The "Closed User Group" option can be activated on the mobile phone. It can be appropriate to set up closed user groups, for example, to restrict the transmission of data by mobile phone.

Additional controls:


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
October 2000
home