- ページ 6

ソフトウェア Blackberry ENTERPRISE SOLUTION SECURITY - ERASING FILE SYSTEMS ON DEVICES - TECHNICALのPDF 概要をオンラインで閲覧またはダウンロードできます。Blackberry ENTERPRISE SOLUTION SECURITY - ERASING FILE SYSTEMS ON DEVICES - TECHNICAL 10 ページ。 Erasing file systems on blackberry devices

4

Types of remote BlackBerry device wipes

The BlackBerry device wipe process is designed to delete all data in internal memory and overwrite that memory
with zeroes.
Type
factory default device wipe
security wipe of data (standard
security wipe)
security wipe of data and third-
party applications (standard
security wipe with Include third
party applications option
selected on device)
security wipe of data on a
content-protected device
(standard security wipe on a
content-protected device)
The BlackBerry device performs the following actions, depending on the method used to wipe the internal device
memory:
BlackBerry device action
deletes user data
deletes corporate PIN-to-PIN
encryption key
deletes the master encryption
key
unbinds the smart card (if
applicable)
unbinds the IT policy
password history
stored BlackBerry MDS device
policy
deletes stored IT policy
deletes third-party applications
©
2008 Research In Motion Limited. All rights reserved.
Description
This method of removing BlackBerry device data is initiated by the
BlackBerry® Enterprise Server administrator remotely using the Remote
Wipe Reset to Factory Defaults IT policy rule. See "Resetting a BlackBerry
device to factory default settings" on page 6 for more information.
This method of removing BlackBerry device data is initiated by the
BlackBerry Enterprise Server administrator remotely, or by the BlackBerry
device user locally on the BlackBerry device. See "Erasing data from
BlackBerry device memory and making the BlackBerry device unavailable"
on page 5 for more information.
This method of removing BlackBerry device data is initiated by the
BlackBerry device user locally on the BlackBerry device. The BlackBerry
Enterprise Server administrator can achieve the same result by performing
a factory default device wipe. See "Removing third-party applications
during a user-initiated security wipe" on page 5 for more information.
If content protection is turned on, during a security wipe the BlackBerry
device uses a memory scrub process to overwrite the BlackBerry device
flash memory file system. The BlackBerry memory scrub process complies
with United States government requirements for clearing sensitive user
data, including Department of Defense directive 5220.22-M and National
Institute of Standards and Technology Special Publication 800-88.
Description
The BlackBerry device permanently deletes all user data in memory.
The BlackBerry device permanently deletes its references to the corporate
peer-to-peer, or PIN-to-PIN, encryption key in memory.
The BlackBerry device permanently deletes its references to the master
encryption key in memory.
The BlackBerry device permanently deletes the smart card binding
information from the NV store so that a user can authenticate with the
BlackBerry device using a new smart card.
The BlackBerry device permanently deletes the IT policy public key from
its NV store so that it can receive a new IT policy and IT policy public key
from a BlackBerry Enterprise Server.
The BlackBerry device permanently deletes its references to past
BlackBerry device password hashes in memory.
The BlackBerry device permanently deletes its BlackBerry® Mobile Data
System device policy from its NV store.
The BlackBerry device permanently deletes its stored IT policy.
The BlackBerry device permanently deletes all third-party applications
stored on the BlackBerry device.
www.blackberry.com
Erasing file systems on BlackBerry devices