You don’t have to be a data thief or stalker to access someone’s smartphone. This is necessary, for example, in the event of an accident or other emergency, to get contact details of relatives, to find an indispensable photo or to access accounts. We explain what you can do to gain access.
It is very important to lock your smartphone so that in case of loss or theft, others cannot access all the highly personal (or maybe even business) data on your smartphone. There are several ways to lock your device. For example with a pin code, password or pattern. Many smartphones also have biometric unlocking techniques such as facial recognition and fingerprint scanner. However, biometric locks also use a PIN as a trap in case the technique fails.
locked with password
The code with which you lock your phone is also the key to all data on the device. This is because all data on your smartphone is stored encrypted. You cannot remove anything from the smartphone without the key. Even the smartphone manufacturer itself, whether Apple or Samsung, cannot gain access to the device or data if the code is not available. It is solely up to the phone owner to determine who can access the device. Very safe…
This security also has an annoying side when disaster strikes: not all data is accessible. You don’t want to put an unconscious person’s thumb on the phone, and face unlock usually doesn’t work at all when eyes are closed. So it’s important to think about it now.
Grant access
If you cannot access the smartphone afterwards, this must be set up in advance. Communicate with loved ones about whether (and how) you can access the smartphone. This can be done, for example, by handing over the access code to loved ones or by writing it down on a document you hold, for example, for an inheritance. Of course, this applies not only to the smartphone of your loved ones, but also to your smartphone.
Organize your course package digital heritage
When it comes to inheritance, it’s more than just access to the smartphone. Digital will is becoming more and more important as digital issues play an increasingly important role in our lives. For example, for accessing your social media – and what to do with it. For example, your music, games and music collection, mail accounts, cloud storage deserve attention. A password vault can help with this.
Tech Academy’s ‘Edit your digital legacy’ course package teaches you what to consider for yourself and the people around you.
Source: Computer Totaal
