data integrity

FrontlineSMS User Guide on Data Inegrity

Posted by ccarlon on Sep 16, 2011
FrontlineSMS User Guide on Data Inegrity data sheet 285 Views
Lugo, Kristina and Carol Waters
Publication Date: 
Aug 2011
Publication Type: 
Report/White paper

FrontlineSMS is a software platform that enables structured communication via text messaging, using only a computer and a mobile phone or GSM (Global System for Mobile) modem. The platform enables two-way messaging between users and groups of people via mobile networks without the need for an Internet connection.

The purpose of this guide is to provide users with a framework to understand, analyze, and address the vulnerabilities, risks and threats that can affect the integrity of the information communicated through the FrontlineSMS platform. That said, mobile networks are inherently insecure and end users are only able to mitigate, as opposed to prevent, a significant number of the possible threats to data integrity. While there are a large number of ways that user information can be lost, altered, stolen, changed, or read by third parties, this guide focuses on the ways that users experience information corruption and steps that they can take to mitigate individual threats. This guide is intended to be a useful resource and framework, but is not intended to be comprehensive or prescriptive.

Users and potential users have different needs for protecting sensitive information. The goal of this guide is to outline the actions that can be taken to mitigate the risks posed by information being lost, changed or read by unauthorized third parties. However, it is important to recognize that FrontlineSMS may not be an appropriate tool to use in some environments where data integrity needs go beyond the capabilities of the platform and SMS itself, and that incautious use may put the organization, program and users at risk.

FrontlineSMS does not define the exact details of how users should deploy the software or address issues of data integrity. Users should evaluate their individual program goals, standards, and operating context to decide on the steps that should be taken to protect the integrity of their information