User guide

Data flow: Deleting only work data from a device
When you delete only work data from a BlackBerry device using the Delete all organizational device data IT administration
command, the device performs the following actions:
1. Adds a Corporate Device Under Attack flag to the NV store
If a user removes the battery or the battery power drops to zero before the device deletes all work data, when the user
replaces the battery, the process continues because the Corporate Device Under Attack flag is still present.
2. Displays a notification that the device will begin deleting work data in 2 minutes
If a user removes the battery or the battery power drops to zero before the process ends, when the user replaces the
battery, the process of deleting work data continues but the device does not display a notification that the device will
begin deleting work data.
3. Turns off the wireless transceiver
4. Notifies any applications on the device (for example, the Messages application, Calendar application, and registered
third-party applications) that manage work data that they must delete the work data that they are responsible for from
the device. The applications then delete the work data that they manage on the device.
Any applications on the device that manage work data must register with the device to receive a notification from the
device when they must delete the work data that they are responsible for. If applications on the device that manage
work data do not register with the device, the work data that they are responsible for may not be deleted.
5. Deletes all device transport keys
6. Sends an acknowledgement to the BlackBerry Enterprise Server that the work data was successfully deleted from the
device
7. Displays a notification that the device successfully removed work data from the device and that the device is going to
restart
8. Restarts
9. Deletes the IT policy public key from the NV store to remove the binding between the device and the BlackBerry
Enterprise Server which terminates its connection with the BlackBerry Enterprise Server
The device can bind to another BlackBerry Enterprise Server at a later time. The device does not use the memory-scrub
process to overwrite the IT policy public key because it is not a protected value or hidden value.
10. Deletes the Corporate Device Under Attack flag from the NV store
11. Sends an IT policy change notification to all applications so that applications that depend on the IT policy can make
changes if required
Security Technical Overview Securing devices in your organization’s environment for personal use and work use
61