Retain the device lock until the user reestablishes access using established identification and authentication procedures.