DIGITALSECURITYGUIDE To make a Playlist private, go to Account > Playlists under "My Videos." Select the Playlist you want to make private. You can create a Group to focus your YouTube communications on your organization go to Account > Groups, then click "Create a Group". After you've filled in all the information, click the "Create a Group" button. You will then be directed to a blank Group homepage where you'll invite Group members, post videos for the Group, and so on. Mobile phone security Mobile phones are an integral part of our daily communications. All mobile phones have the capacity for voice and simple text messaging services. Their small size, relatively low cost and many uses make these devices popular. In Zimbabwe the mobile penetration rate is more than 100 percent. Recently, mobile devices with many more functions have become available. They may feature GPS, multimedia capacity (photo, video and audio recording and sometimes transmitting), data processing and access to the internet. However, the way the mobile networks operate, and their infrastructure, are fundamentally different from how the internet works. This creates additional security challenges, and risks for users' privacy and the integrity of their information and communications. It is important to start with the understanding that mobile phones are inherently insecure: • Information sent from a mobile phone is vulnerable. • Information stored on mobile phones is vulnerable. • Phones are designed to give out information about their location. People often carry mobile phones that contain sensitive information. Communications history, text and voice messages, address books, calendar, photos and many other useful phone functions can become highly compromising if the phone or the data is lost or stolen. It is vital to be aware of the information that is stored, both actively and passively, on your mobile phone. Information stored on a phone could implicate the person using the phone as well as everyone in their address book, message inbox, photo album, etc. Mobile phones that connect to the internet are also subject to the risks and vulnerabilities associated with the internet and computers, as discussed in our other tactics guides regarding information security, anonymity, information retrieval, loss, theft and interception. In order to reduce some of these security risks, users should be aware of their phone's potential for insecurity, as well as its set-up options. Once you know what the possible problems may be, you can put safeguards into place and take preventative measures. Physical security for your mobile phone As is the case with other devices, the first line of defence for the safety of the information on your mobile phone is to physically protect the phone and its SIM card from being taken or tampered with. • Keep your phone with you at all times. Never leave it unattended. Avoid displaying your phone in public. • Always use your phone's security lock codes or Personal Identification Numbers (PINs) and keep them secret (unknown to others). Always change these from the default factory settings. • Physically mark (draw on) the SIM card, additional memory card, battery and phone with something unique and not immediately noticeable to a stranger (make a small mark, drawing, letters or numbers, or try using ultra-violet marker, which will be invisible in normal light). Place printed tamper-proof security 23