Mobile devices, such as mobile phones, are becoming multi-purpose devices. These devices are capable of storing data as well as running custom applications. As more people adopt these devices and begin to use them for personal or business tasks, the need for controlling access to the data stored within the device will become vital. This paper presents an investigation of the current trends and techniques being used for access control on mobile devices. It will identify the features that the various embedded operating systems and current mobile applications employ for access control. This investigation also identifies some of the gaps that are apparent in the implementation of these access controls. The aim of this investigation is to motivate further research into a standard access control framework that will engender trust in users of mobile devices. Such a framework should also allow for corporate access control policies to extend onto the mobile device, thereby gaining the trust of...