S 2.305 Selection of suitable PDAs

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Purchasing Department, Head of IT, Administrator

There are numerous types and device classes of PDAs. These not only differ in terms of their dimensions and functional range, but also in terms of their security mechanisms and ease of use. In addition, they place different requirements on hardware and software components in the operational environment.

Given the large number of different PDA models equipped with a wide variety of operating systems, compatibility issues regarding hardware, software on PDA and PC, as well as interfaces are natural.

If the use of PDAs has been decided on within an organisation, a list of requirements should be drawn up that can be used in order to evaluate the products available on the market. The products to be purchased should then be selected based on the evaluation. Based on various requirements for use, it has been shown in practical applications that it may be perfectly sensible to select several types of devices for purchase. The variety of devices should be limited, though, to simplify support.

Moreover, steps should be taken to ensure that facilities are available for the central, effective administration of the individual end devices and the software used on them. The necessary server infrastructure should require as little administrative effort as possible.

Some functions on PDAs can only be used in conjunction with external service providers. No internal data should be exchanged via an external service provider unless the confidentiality and integrity of the data can be guaranteed. For example, although transmissions over a cellular network are usually encrypted ("air interface"), the data is then often transmitted unencrypted within the network of the mobile communications provider and stored unencrypted on the server of the service provider. In case of doubt, such services should therefore not be used.

Initially, a requirements analysis should be performed. The goal of the requirements analysis is to determine possible operational scenarios which come into question for the specific case on the one hand, and to derive the requirements for the necessary hardware and software components from these on the other hand.

The following list provides an overview of possible general evaluation criteria, but it is by no means complete and additional general requirements may be added to it.

General criteria

Functions

Even though the IT management may have decided on a particular product, it is to be expected that some employees will prefer other PDAs and attempt to use them at work and possibly even seek support for them. A suitable procedure should be defined to cover such cases.

Review questions: