What should be your first action when it becomes necessary to store sensitive information on a mobile device?

(Select The Best Answer)