Unintended Data Leakage
The focus on protecting data often considers the typical mobile app use cases and attempts to protect data from that point-of-view.

The truth is that there are a lot of other ways your data gets viewed, copied, cached, screen captured, backed-up and logged. How to address: Consider that a native mobile operating system often provides ways for users to copy/paste data, take screen captures, create mobile data backups, use custom keyboards and collect analytics with third-party apps.

Consider the data and risk presented by these scenarios and determine if it is acceptable in your mobile app.
If not, then you must explicitly prevent these capabilities from within the mobile application or through control of the device with a mobile-device management or mobile-application management (MDM or MAM) solution.