What Tech Teams Should Look for in a Secure Mobile Signing Platform
A buyer’s guide to secure mobile signing platforms: encryption, MFA, audit trails, integrations, and compliance for enterprise teams.
What Tech Teams Should Look for in a Secure Mobile Signing Platform
If your team signs device contracts, procurement approvals, NDAs, HR paperwork, or internal change requests on the move, a secure signing platform is no longer optional—it is part of your operational control plane. The challenge is that not every e-signature tool is built for enterprise risk, and not every “mobile-friendly” workflow is actually secure once you look at identity proofing, encryption, auditability, and policy enforcement. For tech teams, the right choice sits at the intersection of mobile security, document management, and enterprise software integration. If you are building a buying shortlist, it helps to think about it the same way you would assess an endpoint tool or cloud service—see our guide on how to audit endpoint network connections on Linux before you deploy an EDR for the same mindset of verifying controls before rollout.
Mobile signing also creates friction in places that usually go unmeasured. A sales manager on the road, an IT admin approving device replacements, or a procurement lead authorizing a vendor agreement cannot wait for a scanned signature cycle without slowing the business down. The best platforms remove that bottleneck while preserving legal defensibility, traceability, and policy enforcement. That balance is what separates a consumer-grade signature app from a true secure signing platform, and it is why the decision deserves the same scrutiny as any mission-critical software purchase. For broader vendor-vetting discipline, our guide on how to vet a marketplace or directory before you spend a dollar is a useful framework.
Why Mobile Signing Security Matters More for Tech Teams
Device contracts travel faster than your approval chain
Tech teams rarely sign one simple document in isolation. A mobile device lease, carrier addendum, MDM policy acknowledgement, or hardware refresh agreement may need input from IT, finance, legal, and operations. That means the signing flow has to work across devices, time zones, and roles without creating loopholes. The more distributed the process, the more important it is that every action is authenticated, timestamped, and linked to the correct person and document version.
In practice, the riskiest failures are usually not dramatic breaches—they are process failures. Someone signs from an unmanaged phone, a contract changes after approval, or a manager forwards a signing link to the wrong person. A secure platform needs to prevent those outcomes rather than just record them after the fact. That is similar to the logic behind adapting UI security measures from iPhone changes: the interface should make safe behavior the default, not the exception.
Paperless does not automatically mean safer
Many buyers assume that moving from paper to digital removes risk, but digital workflows can introduce new attack surfaces. Email-based signing links, weak identity checks, permissive sharing, and poor access controls can make a workflow faster while making it easier to misuse. The right platform should support strong authentication, document integrity checks, and controlled access to each signing step.
Think of it as the difference between convenience and governance. A team can close approvals faster with a consumer app, but if the platform cannot show who signed, when they signed, how they were authenticated, and whether the file was altered, the organization may be left with weak evidence in a dispute. That is why tech leaders should treat signing platforms like any other compliance-sensitive system, especially when they touch contracts or regulated records. For a parallel discussion on trust and policy controls, see navigating complex trust compliance.
Remote work raises the bar on evidence
When a manager signs from a conference, airport, or customer site, the platform must still create a defensible record. That record should tell a complete story: identity assurance, document version history, signing order, device context, IP or location signals if permitted, and tamper-evident logs. In disputes, that evidence becomes as important as the signature itself. The buyers who think ahead are usually the ones who ask, “Can we prove the entire chain later?”
Pro tip: If a vendor says “legally binding,” ask for the exact audit evidence, retention controls, and identity methods that support that claim in your jurisdiction. Marketing language is not a control.
Encryption and Data Protection: The Non-Negotiables
Encryption in transit and at rest should be baseline
Every secure signing platform should encrypt documents in transit using modern TLS and encrypt stored documents at rest using strong, managed keys. That sounds basic, but the distinction matters because contract files often contain sensitive commercial terms, device serials, user data, and signature artifacts. If the vendor cannot clearly explain where documents live, how keys are managed, and how backups are protected, keep looking. This is one of the first places enterprise buyers should separate true security posture from polished UX.
Encryption also needs to extend beyond the PDF itself. Metadata, signing events, notifications, and stored attachments may all contain sensitive information that should be protected according to your retention policy. A strong platform will explain its cryptographic architecture in plain language and provide evidence through security documentation, audits, and certifications. That is the same kind of diligence you would apply when choosing infrastructure for sensitive workloads, like the thinking behind building a quantum readiness roadmap for enterprise IT teams, where the buyer is evaluating how long security assumptions will remain valid.
Key management is where mature vendors stand out
For many teams, the real question is not whether encryption exists, but who controls the keys. Enterprise-grade secure signing platforms should disclose whether they use vendor-managed keys, customer-managed keys, hardware security modules, or bring-your-own-key options. For regulated environments or large enterprises, customer-controlled key strategies can matter because they help reduce dependency on a single provider and can support stricter governance requirements.
Look for clear documentation on key rotation, backup encryption, and access boundaries. If the platform stores documents in multiple regions, you also want to understand whether key residency matches data residency requirements. These details may sound like procurement footnotes, but they become crucial during an audit or incident response. Tech teams are often comfortable with cryptography in theory, but a buying decision should focus on the operational realities of how keys are created, stored, rotated, and revoked.
Document integrity and tamper evidence protect the signature chain
The signature process is only trustworthy if the document cannot be modified without detection after signing. A secure platform should use tamper-evident sealing, version control, and hash-based integrity checks so that any change invalidates the original signed record or is clearly visible in the audit trail. For device agreements, that matters because a single altered clause about indemnity, service credits, or device ownership can create major financial or legal exposure.
Teams evaluating platforms should ask for examples of how the system handles post-signature modifications, voiding, and resend workflows. You want a system that preserves the original record and creates a transparent chain of custody. That discipline resembles how organizations should treat other critical digital assets: once a record is finalized, it needs an immutable trail, not a rewrite. For a related perspective on security-first purchasing, see how to vet smart security brands before you buy.
Identity Verification and Multi-Factor Authentication
Multi-factor authentication should be mandatory, not optional
For internal approvals, MFA is not just a nice extra; it is the simplest way to reduce unauthorized access to signing events. A secure signing platform should support app-based OTPs, push authentication, FIDO2 or hardware keys where appropriate, and session controls that limit reuse of signed-in sessions. Password-only access is too weak for any workflow that might approve contracts, change orders, or device issuance decisions.
Ask whether MFA can be required by policy for specific document types, user groups, or risk tiers. A platform that lets admins enforce step-up authentication for high-value agreements is more useful than one that applies the same access rule to every workflow. Tech teams often manage risk dynamically in other systems, and signing should be no different. This is also consistent with the direction of digital wallet identity verification, where context-aware security matters more than a single login event.
Identity assurance should match the document’s risk level
Not every document needs the same verification strength. An internal PTO acknowledgment may only require corporate SSO and MFA, while a device procurement agreement or reseller contract may warrant stronger identity checks. A capable platform should support layered identity workflows such as email verification, SSO, knowledge-based checks, SMS fallback only when justified, and optional government ID verification for higher-risk transactions.
The key is proportionality. Overly aggressive identity checks can frustrate users and kill adoption, but too little verification undermines legal confidence. The best vendors help you assign the right assurance level to each workflow so IT and legal can create policy without creating bottlenecks. For a practical example of balancing convenience and control, look at privacy-policy changes and shopper behavior, which shows how quickly trust can erode when controls are unclear.
SSO and directory sync reduce account sprawl
Enterprise teams should prefer platforms that support SAML or OIDC single sign-on and directory synchronization through tools like Entra ID or Okta. SSO makes access revocation cleaner when an employee leaves, and directory sync helps keep signer permissions aligned with real roles. If a vendor relies on unmanaged local accounts for important approval flows, the administrative overhead and offboarding risk both rise.
Directory integration also enables better policy mapping. You can assign signing privileges by group, role, business unit, or region, which is especially useful for companies with multiple procurement thresholds or device approval tiers. The broader the organization, the more valuable this becomes. Think of SSO as the control layer that prevents a signing platform from becoming another shadow IT island.
Audit Trails, Logging, and Legal Defensibility
Every action should be traceable
Audit trails are one of the clearest differentiators between consumer e-sign tools and enterprise-grade secure signing platforms. A useful audit trail should show who accessed the document, when it was opened, what authentication method was used, what device or channel was involved, and when each signature event occurred. Ideally, the log should also capture IP context, timestamps synchronized to a trusted clock, and any change in signing order or document version.
For tech teams, auditability is about more than legal defense. It also supports internal accountability, troubleshooting, and process optimization. If approvals are slow, the trail helps reveal whether the bottleneck is legal review, delayed routing, or identity friction. That operational insight is similar to the data-driven thinking in endpoint network auditing: visibility is not just for incident response, but for continuous improvement.
Tamper-evident logs matter in disputes and audits
A log that can be edited is not much of a log. Buyers should look for tamper-evident or immutable logging mechanisms, export options, and long-term retention settings that match organizational policy. If the vendor supports legal holds or WORM-style storage, that is often a strong sign the platform is built for serious compliance use cases.
Ask how the platform handles deleted users, revoked access, or canceled envelopes. Good systems preserve the historical record even when identities or workflows change later. That continuity is essential when the audit trail needs to survive personnel turnover, vendor transitions, or a regulatory inquiry. For similar thinking in platform governance, see crafting AI governance for domain registrars, where the rule is the same: recordkeeping must outlast the immediate transaction.
Exportability and legal review support operational resilience
It is not enough to store the audit trail; teams need to be able to export it in a format legal, compliance, or external counsel can use. Look for downloadable certificates, event logs, and signed document packages that can be archived in your document management system or eDiscovery workflow. If the vendor traps critical evidence in a proprietary interface, the platform becomes harder to rely on over time.
Strong export support also matters during mergers, audits, or vendor exits. Tech teams should assume systems change, but records must remain accessible. A secure signing platform should make retention and portability straightforward rather than punitive. That philosophy aligns with the practical guidance in data storage and management solutions for extreme weather events, where resilience depends on portability and backup planning.
Integrations: Where Signing Becomes Part of the Workflow
Document management integration is table stakes
For most tech teams, a signing platform that does not integrate with document management systems is a half-solution. Contracts should flow into repositories such as SharePoint, Google Drive, Box, OneDrive, or a dedicated document management platform with metadata preserved. That way, signed files are searchable, governed, and retrievable without depending on inbox archaeology.
The best integrations move documents with context intact. That means preserving signer names, completion status, timestamp metadata, tags, and approval history so records remain useful after signing. When that context disappears, the document may be signed but operationally incomplete. Buyers evaluating enterprise software should demand proof that integrations do not break the record chain, much like you would when reviewing workflow enhancements for recipient systems.
CRM, ITSM, procurement, and HR integrations reduce manual work
The right secure signing platform should connect into the systems where approvals originate. Sales teams may need CRM integration, procurement teams may need ERP or procurement suite connectivity, IT teams may need integration with service management tools, and HR teams often want workflow hooks into onboarding systems. Without those links, users end up copying data between tools, which creates both inefficiency and error risk.
For device contract workflows, integration with procurement and asset management is especially powerful. You can route approvals based on spending thresholds, create records automatically after signature, and attach executed agreements to the asset lifecycle. This is where signing becomes part of operational automation rather than just a standalone action. If your organization is also studying broader enterprise tooling decisions, building emerging technology skills is a useful reminder that workflow literacy is now part of IT strategy.
APIs and webhooks matter for custom enterprise use cases
Many tech organizations need more than off-the-shelf connectors. A platform with strong APIs, webhooks, and SDKs allows teams to embed signing directly into internal portals, onboarding flows, procurement dashboards, or custom admin tools. That matters when you want the signing experience to feel native rather than bolted on.
Ask about rate limits, event delivery guarantees, sandbox support, and documentation quality. Poor API design is often a hidden source of operational drag. A secure signing platform should fit into your architecture cleanly, not require a brittle series of workarounds. For teams evaluating technical product depth, the same approach applies as in streamlining TypeScript setup: good defaults and clean interfaces reduce long-term maintenance.
Compliance: What Enterprise Buyers Need to Verify
Match compliance claims to your actual obligations
Vendors often advertise compliance badges, but the buyer must map those claims to real obligations. Depending on your industry and geography, you may care about SOC 2, ISO 27001, GDPR, HIPAA, FedRAMP, eIDAS, ESIGN, UETA, or industry-specific retention policies. The platform should have documentation that explains which controls are covered and which are not.
Do not assume that “compliant” means “compliant for every use case.” A strong vendor will help you understand where electronic signatures are legally acceptable, where stronger identity checks are advisable, and where document types may need extra policy review. That clarity is crucial when handling internal approvals and device contracts that may span multiple jurisdictions. For a good model of regulatory awareness, compare with how pilots must know air-travel regulations: the operating environment determines the rule set.
Data residency and retention controls can influence the shortlist
For global teams, data residency may be as important as signature legality. If contracts or identity records must stay within a specific region, the platform should support regional storage and clearly document how it processes backups, logs, and metadata. Retention controls should let admins align records with corporate policy, tax rules, and legal hold requirements.
Retention is often overlooked during the pilot phase and only becomes important when the company needs a signed agreement from years ago. A platform that supports policy-based retention, legal holds, and deletion workflows gives the organization more control and less risk. That is especially important in enterprise software procurement, where the cost of a record-management failure can exceed the cost of the software itself. For another angle on data governance, see how laboratories cut waste without sacrificing safety.
Compliance reporting should be easy to evidence
During an audit or vendor review, you want the platform to produce evidence quickly. Look for admin reports, activity exports, access logs, and policy documentation that can be shared without manual reconstruction. If the compliance story depends entirely on screenshots and internal tribal knowledge, the vendor is not mature enough for serious use.
Good compliance support also includes role-based access controls, approval routing, and evidence of who changed settings. In other words, the system should prove not only that documents were signed correctly, but that the platform itself is governed correctly. That layered view is similar to the evaluation logic in spotting a “public interest” campaign that is actually self-defense: always verify the structure behind the story.
Workflow Design: Speed Without Sacrificing Control
Policy-based routing prevents approval chaos
One reason teams adopt signing platforms is to eliminate email chains and manual routing. But unless the workflow engine is policy-aware, you can still end up with approvals bypassed, documents sent to the wrong owner, or signing order errors. The platform should let admins define routing rules based on document type, dollar threshold, department, geography, or signer role.
This matters for device contracts because different devices and purchase amounts can require different approval paths. A high-value executive phone replacement may need finance sign-off, while a standard laptop refresh might only need IT and manager approval. That logic should be encoded once, not recreated by every team member. If you are optimizing operational friction elsewhere, the same principle shows up in deal hunting and purchase timing: the right rule reduces waste.
Mobile-first usability must not weaken security
Many teams confuse “easy to sign on mobile” with “secure on mobile.” The best platforms design for touch workflows, smaller screens, and intermittent connectivity while preserving strong authentication and access controls. Mobile signing should still support identity verification, readable document review, and secure session handling, not just a quick tap-to-approve flow.
Test the platform on real devices, not just in a sales demo. Try it on a locked-down corporate phone, a BYOD device, and a tablet with a narrow display. If the experience becomes confusing or encourages risky shortcuts, adoption will fall or people will start bypassing controls. For a related example of consumer behavior driven by UX and trust, see how Apple Watch trends reveal consumer preferences.
Exception handling is where mature platforms prove themselves
Real workflows fail in real life. A signer may leave the company mid-process, a document may need to be voided and reissued, or a buyer may need to swap approvers after a re-org. A mature platform should handle exceptions cleanly while preserving the original record and rationale.
Ask vendors to walk you through failure scenarios, not just happy-path demos. How are incomplete envelopes tracked? Can you revoke access without destroying the audit chain? Can you clone a template while preserving prior evidence? These questions often reveal more about platform quality than any feature checklist. For teams dealing with product or launch uncertainty, a similar mindset appears in launch-showcase planning, where preparedness matters as much as excitement.
Buying Checklist: How to Evaluate Vendors in a Real Pilot
Build a use-case matrix before you compare features
Before you schedule demos, list the exact workflows you need to support: device contracts, procurement approvals, internal policy acknowledgments, NDAs, vendor onboarding, and signature-heavy HR forms. For each use case, define the required identity assurance, approvers, retention policy, and integration points. That matrix becomes your scorecard and prevents the buying process from being swayed by polished UX alone.
This approach also helps you separate must-have controls from nice-to-have conveniences. A platform with excellent design but weak logging might be fine for low-risk forms, yet unsuitable for procurement contracts. Conversely, a platform with deep compliance features but clunky mobile UX may not gain user adoption. For inspiration on making structured decisions under uncertainty, see how to decide whether to hold or upgrade.
Run a proof-of-control, not just a proof-of-concept
Most pilots prove that a document can be signed. A better pilot proves that the organization can control the document throughout its lifecycle. That means testing MFA enforcement, SSO provisioning, audit trail export, retention rules, signing order, and role-based access across realistic workflows.
Ask the vendor to demonstrate how the platform behaves when a user loses access, when a signature is challenged, or when an admin tries to change a policy setting. Those scenarios are where hidden risk shows up. It is also smart to involve legal and compliance early so the pilot reflects the eventual operating model. If your team likes structured risk testing, building an AI security sandbox offers a similar philosophy: test boundaries before production.
Score vendor maturity, not just feature count
Feature checklists can be misleading because most vendors can say “integration,” “encryption,” and “audit log.” What matters is whether the vendor can explain implementation details, support scale, document controls, and help your team operationalize the platform. Look for security documentation, status history, support SLAs, admin controls, and public evidence of product maturity.
The same is true when you evaluate other categories of software. A polished front end is not enough if the product cannot withstand enterprise use. Buying teams should prioritize reliability, policy control, and evidence over novelty. If you want a broader lens on software maturity, our article on future acquisition strategies is not a valid internal link in this set, so instead use the operational analogy: mature vendors are easier to govern because they expose the controls you actually need.
Decision Framework: Which Platform Is Right for Your Team?
Choose based on risk tier, not just price
For a low-risk team, a lightweight secure signing platform with SSO, basic MFA, and strong audit logs may be sufficient. For a mid-market or enterprise organization handling device contracts, internal approvals, and vendor agreements, the bar is higher: advanced identity options, policy routing, retention controls, integrations, and exportable evidence should all be on the table. Price matters, but so does the cost of rework, compliance exceptions, and manual reconciliation.
If your organization signs only occasional forms, a simpler product may be economical. But once signing becomes part of procurement, IT asset management, or legal review, the platform must behave like infrastructure. That shift is comparable to the difference between a consumer accessory and a managed enterprise endpoint: the price tag is only part of the real cost. For a buying perspective on value and timing, see how to judge last-minute deal value, where timing and fit matter more than headline savings.
Use a scorecard to avoid feature bias
A practical scoring model might assign weight to encryption, MFA and identity assurance, audit trail quality, integration depth, compliance fit, admin controls, and mobile usability. This makes it easier to compare vendors that excel in different areas without getting distracted by flashy extras. For example, a vendor may offer a slick mobile app but no robust API, which could make it a poor long-term choice for enterprise software environments.
Your scorecard should also include operational factors such as support responsiveness, onboarding quality, and documentation clarity. These are not secondary features—they are part of the ownership experience. Teams that ignore them often discover hidden costs after rollout. That risk-management mindset mirrors the caution needed in home security device buying, where the cheapest option is not always the best value.
Plan for growth and future workflows
The best secure signing platform is one that can expand with your use cases. Today it may handle device contracts; tomorrow it may need to support procurement, HR, legal, and partner onboarding. If the platform cannot scale permissions, workflow complexity, or integration needs, you may end up migrating sooner than expected.
That is why technical buyers should ask how templates, permissions, retention rules, and APIs scale over time. A platform that supports your current workflow but not your future governance model is only a partial solution. The safest purchase is often the one that reduces future migration risk, not just current friction.
Final Recommendation: What Best-in-Class Looks Like
For tech teams, the ideal secure signing platform combines strong encryption, mandatory MFA, flexible identity assurance, tamper-evident audit trails, practical integrations, and compliance controls that are specific enough to govern real business processes. It should work well on mobile without weakening the security model, and it should connect cleanly to document management, procurement, and identity systems. If the vendor can prove those capabilities with documentation and a realistic pilot, it deserves serious consideration.
In short, buy the platform that makes the secure path the easiest path. That is the hallmark of mature enterprise software, and it is the difference between a tool that merely signs documents and a system that supports trustworthy operations. If you want to continue evaluating adjacent categories, our coverage of enterprise buying timing, vendor vetting, and smart home security ecosystems can help you build the same disciplined procurement habit across your stack.
Detailed Comparison Table
| Evaluation Area | What Strong Looks Like | Red Flags |
|---|---|---|
| Encryption | TLS in transit, strong encryption at rest, clear key management options | No explanation of keys, vague “bank-level security” claims |
| Multi-factor authentication | Policy-enforced MFA, SSO, step-up auth for high-risk docs | Password-only access or MFA that cannot be enforced by admin |
| Audit trail | Immutable, exportable logs with timestamps, events, and signer context | Editable logs, incomplete event history, no export capability |
| Integrations | Native connectors, robust APIs, webhooks, document management sync | Manual uploads, brittle connectors, no event automation |
| Compliance | Clear mapping to SOC 2, ISO, GDPR, ESIGN/UETA, retention policies | Badge-driven marketing with no control documentation |
| Mobile security | Secure sessions, device-aware authentication, safe mobile UX | Mobile convenience that bypasses policy controls |
| Admin controls | Role-based permissions, lifecycle management, policy routing | Flat permissions and heavy reliance on manual oversight |
FAQ
Is a secure signing platform different from a basic e-signature app?
Yes. A basic e-signature app may let users sign documents quickly, but a secure signing platform adds stronger authentication, encryption, auditability, policy controls, and integrations designed for enterprise workflows. If you are handling device contracts, procurement approvals, or internal policies, those differences matter because they affect legal defensibility and operational control.
Do all mobile signing workflows need MFA?
In enterprise environments, yes, MFA should be the default for any workflow involving contracts, approvals, or sensitive records. At minimum, it should be enforceable for higher-risk documents and privileged users. If the platform cannot require MFA by policy, that is a significant weakness.
What should an audit trail include?
A strong audit trail should capture signer identity, timestamps, document version history, authentication method, access events, and any routing or status changes. It should be tamper-evident and exportable for legal, compliance, or investigation purposes. The more complete the record, the easier it is to defend the signature later.
Which integrations matter most for tech teams?
Document management, identity/SSO, procurement systems, HR platforms, CRM, and API/webhook support are usually the most important. For device contracts and internal approvals, integration with asset management and procurement workflows can eliminate duplicate entry and reduce approval delays. The right mix depends on where your documents start and where you need the records to end up.
How do we compare vendors in a pilot?
Use a scorecard that weights encryption, MFA, audit trail quality, integrations, compliance fit, mobile usability, and admin controls. Then test real workflows, not just demo documents. Include failure scenarios such as revoked access, unsigned envelopes, policy changes, and document version disputes so you can see how the platform behaves under pressure.
What compliance claims should we verify?
Confirm which standards and regulations the vendor actually supports, such as SOC 2, ISO 27001, GDPR, ESIGN, UETA, or eIDAS depending on your region and use case. Also verify retention, data residency, and export capabilities. A compliance badge alone is not enough without supporting controls and documentation.
Related Reading
- Building a Quantum Readiness Roadmap for Enterprise IT Teams - A useful framework for judging long-term security assumptions in enterprise platforms.
- How to Audit Endpoint Network Connections on Linux Before You Deploy an EDR - A practical model for validating controls before rollout.
- Maximizing Transaction Security: The Future of Digital Wallet Apps in Identity Verification - Helpful context for modern authentication and identity assurance.
- Google’s AI: A Case Study on Future Enhancements for Recipient Workflows - Shows how workflow automation can improve business operations without losing visibility.
- Winter Is Coming: Data Storage and Management Solutions for Extreme Weather Events - A strong reminder that retention, resilience, and portability matter when records must outlast the moment.
Related Topics
Jordan Ellis
Senior Tech Editor
Senior editor and content strategist. Writing about technology, design, and the future of digital media. Follow along for deep dives into the industry's moving parts.
Up Next
More stories handpicked for you
Why Battery Life Is the New Compatibility Test: What Mobile Buyers Can Learn from Data-Hungry Systems and Supply Chain Consolidation
Why Marketing Operations Matter in Tech Retail: Lessons from Vertical Ownership and E-Commerce Hiring
Best Phones and Accessories for Quiet Practice: What Mobile Pros Can Learn from the Alesis Nitro Kit
From Club Audio to Creator Workflows: What the Best Dance Podcasts Reveal About Mobile Content Consumption
The Hidden Risks of Buying from Regional Electronics Dealers: What IT Buyers Should Verify
From Our Network
Trending stories across our publication group
Why Repairability Scores Should Matter When Choosing Your Next Phone — Lessons from the Aftermarket Auto Parts World
Flash Sales and Daily Deals: A Shopper’s Guide to Saving on Smartphones
