SlideShare a Scribd company logo
1 of 2
Download to read offline
Smartphone kill switch now required in California
Apple's "kill switch" has decreased the number of stolen iPhones, reports
http://www.law.virginia.edu/ say. Steve Parsons/PA Wire
California is the latest -- and biggest -- state to require that new smartphones have "kill switch" anti-
theft technology. Governor Jerry Brown signed the kill switch bill into law on Monday, CBS San
Francisco reports.
The law will require smartphone manufacturers to include technology to render the phone
inoperable if it is stolen.
"Getting mugged or robbed just because you have your cell phone in your hand is soon to be a thing
of the past," the co-author of the bill, state assembly member Nancy
http://bml.ym.edu.tw/tfeid/userinfo.php?uid=40913 Skinner, said in a press release. She called it "a
victory for consumer safety."
Minnesota became the first state to pass a smartphone kill switch law in May of this year.
The California bill does not specify exactly how smartphone makers meet the requirements, only that
they must keep up with the evolving technology and produce a way to render stolen phones
inoperable. The law applies to smartphones only, not tablets or other mobile devices.
Several major manufacturers have already
begun implementing the technology. Last
year Apple introduced its "activation lock"
feature on iPhones running iOS 7, which
prevents anyone from erasing, activating, or
otherwise using your phone without knowing
your Apple ID and password. Samsung
smartphones have similar protections built
in.
Nearly 50 percent of property crimes in
major cities like San Francisco, New York
and Washington, D.C. involve the theft of
mobile devices. According to a report by New
York Attorney General Eric Schneiderman,
thieves stole 3.1 million mobile devices in the
U.S. last year.
But the kill switch can make a big difference. Schneiderman's report cites police data showing that
since Apple introduced its anti-theft technology in September 2013, the number of iPhones stolen in
San Francisco, New York City and London dropped by up to a third.
© 2014 CBS Interactive Inc. All Rights Reserved.

More Related Content

What's hot

Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters? Viral Parmar
 
Cyber laws
Cyber lawsCyber laws
Cyber lawsmadhu190
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ictsafa
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crimeishmecse13
 
Cognitive hacking
Cognitive hackingCognitive hacking
Cognitive hackingvishnu1236
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesAshesh R
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptxPranavRaj96
 
Amb's Herbal Bath Care
Amb's Herbal Bath CareAmb's Herbal Bath Care
Amb's Herbal Bath CareAnika Mckenzie
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Adv Prashant Mali
 
A View from the Hill: Defending Vulnerable Populations in the Digital World
A View from the Hill: Defending Vulnerable Populations in the Digital WorldA View from the Hill: Defending Vulnerable Populations in the Digital World
A View from the Hill: Defending Vulnerable Populations in the Digital WorldCloudera, Inc.
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idhambuu
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrTushar Rajput
 

What's hot (20)

Why Privacy matters?
Why Privacy matters? Why Privacy matters?
Why Privacy matters?
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Presentation Ict
Presentation IctPresentation Ict
Presentation Ict
 
Cyber law for suresh
Cyber law for sureshCyber law for suresh
Cyber law for suresh
 
Case study on cyber crime
Case study on cyber crimeCase study on cyber crime
Case study on cyber crime
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cognitive hacking
Cognitive hackingCognitive hacking
Cognitive hacking
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
Amb's Herbal Bath Care
Amb's Herbal Bath CareAmb's Herbal Bath Care
Amb's Herbal Bath Care
 
Cyber law
Cyber lawCyber law
Cyber law
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
A View from the Hill: Defending Vulnerable Populations in the Digital World
A View from the Hill: Defending Vulnerable Populations in the Digital WorldA View from the Hill: Defending Vulnerable Populations in the Digital World
A View from the Hill: Defending Vulnerable Populations in the Digital World
 
Assigment Idham
Assigment IdhamAssigment Idham
Assigment Idham
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 

Similar to Smartphone kill switch now required in California

Individual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxIndividual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxannettsparrow
 
2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and securityGolden Locksmith
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxnettletondevon
 
Payment Week - Andrew Barnes, Managing Director___Gemalto
Payment Week - Andrew Barnes, Managing Director___GemaltoPayment Week - Andrew Barnes, Managing Director___Gemalto
Payment Week - Andrew Barnes, Managing Director___GemaltoAndrew Barnes
 
SENATOR Sherrod Brown (Internet Stalking Law)
SENATOR Sherrod Brown (Internet Stalking Law)SENATOR Sherrod Brown (Internet Stalking Law)
SENATOR Sherrod Brown (Internet Stalking Law)VogelDenise
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial CrimesRaj Goel
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Chelsea Porter
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone SecurityMalasta Hill
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014EMC
 
Internet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docxInternet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docxmariuse18nolet
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensicsi4box Anon
 
Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyFrances Coronel
 
The 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementThe 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementBernard Marr
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docxEdwardk3aWallacey
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police forceK J Singh
 

Similar to Smartphone kill switch now required in California (20)

Individual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docxIndividual privacy vs. law enforcement. Every law enforcement of.docx
Individual privacy vs. law enforcement. Every law enforcement of.docx
 
2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 
776 s0005
776 s0005776 s0005
776 s0005
 
Payment Week - Andrew Barnes, Managing Director___Gemalto
Payment Week - Andrew Barnes, Managing Director___GemaltoPayment Week - Andrew Barnes, Managing Director___Gemalto
Payment Week - Andrew Barnes, Managing Director___Gemalto
 
SENATOR Sherrod Brown (Internet Stalking Law)
SENATOR Sherrod Brown (Internet Stalking Law)SENATOR Sherrod Brown (Internet Stalking Law)
SENATOR Sherrod Brown (Internet Stalking Law)
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986Electronic Communication Privacy Act 1986
Electronic Communication Privacy Act 1986
 
Smartphone Security
Smartphone SecuritySmartphone Security
Smartphone Security
 
The Current State of Cybercrime 2014
The Current State of Cybercrime 2014The Current State of Cybercrime 2014
The Current State of Cybercrime 2014
 
Internet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docxInternet of Things in Reach Companies Rush Into Devices Li.docx
Internet of Things in Reach Companies Rush Into Devices Li.docx
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
Apple vs FBI on Data Privacy
Apple vs FBI on Data PrivacyApple vs FBI on Data Privacy
Apple vs FBI on Data Privacy
 
The 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law EnforcementThe 5 Biggest Tech Trends In Policing And Law Enforcement
The 5 Biggest Tech Trends In Policing And Law Enforcement
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Modern trends in police force
Modern trends in police forceModern trends in police force
Modern trends in police force
 

Smartphone kill switch now required in California

  • 1. Smartphone kill switch now required in California Apple's "kill switch" has decreased the number of stolen iPhones, reports http://www.law.virginia.edu/ say. Steve Parsons/PA Wire California is the latest -- and biggest -- state to require that new smartphones have "kill switch" anti- theft technology. Governor Jerry Brown signed the kill switch bill into law on Monday, CBS San Francisco reports. The law will require smartphone manufacturers to include technology to render the phone inoperable if it is stolen. "Getting mugged or robbed just because you have your cell phone in your hand is soon to be a thing of the past," the co-author of the bill, state assembly member Nancy http://bml.ym.edu.tw/tfeid/userinfo.php?uid=40913 Skinner, said in a press release. She called it "a victory for consumer safety." Minnesota became the first state to pass a smartphone kill switch law in May of this year. The California bill does not specify exactly how smartphone makers meet the requirements, only that they must keep up with the evolving technology and produce a way to render stolen phones inoperable. The law applies to smartphones only, not tablets or other mobile devices. Several major manufacturers have already begun implementing the technology. Last year Apple introduced its "activation lock" feature on iPhones running iOS 7, which prevents anyone from erasing, activating, or otherwise using your phone without knowing your Apple ID and password. Samsung smartphones have similar protections built in. Nearly 50 percent of property crimes in major cities like San Francisco, New York and Washington, D.C. involve the theft of mobile devices. According to a report by New York Attorney General Eric Schneiderman, thieves stole 3.1 million mobile devices in the U.S. last year. But the kill switch can make a big difference. Schneiderman's report cites police data showing that since Apple introduced its anti-theft technology in September 2013, the number of iPhones stolen in San Francisco, New York City and London dropped by up to a third.
  • 2. © 2014 CBS Interactive Inc. All Rights Reserved.