This article is part of a series on corporate surveillance, highlighting civil liberty, privacy, cybersecurity, safety, and tech-product user exploitation threats associated with connected products that are supported by the Android (Google) OS, Apple iOS, and Microsoft Windows OS.
In part 1 of this article, Business Users of Smartphones May be Breaking the Law, I addressed the use of smartphones within a confidential and protected environment such as the defense industry, critical infrastructure, government, and legal and medical profession.
My findings, coupled with admissions made by T-Mobile and Verizon, led to the conclusion that smartphones, tablet PCs, voice-automated assistants, connected products, and PCs supported by surveillance and data-mining business practices should not be used within a confidential and protected environment.
All products concerned are supported by intrusive pre-installed content that will leak confidential and protected telecommunications, information, and data to numerous unauthorized third-parties such as AT&T, T-Mobile, Verizon, Sprint, Google, Apple, Microsoft, Samsung, Facebook, Amazon, Baidu, and other telecom and tech giants.
The article concluded that it may, in fact, be illegal to use any smartphone or connected technology supported by surveillance and data-mining content, such as apps, within a confidential and protected environment governed by confidentiality agreements, non-disclosure agreements (NDAs), industry and federal cyber security standards, federal information processing standards (FIPS), and confidentiality laws that govern medical information, client–attorney privilege, and classified information.
Read the full article at The Epoch Times.