Method for mitigating the unauthorized use of a device - You...
A security compromise event may be detected by the mobile device itself, and may be also be reported by an authorized user directly to the device or indirectly such as through a security authority or other entit