Security Guidelines
Guidelines to maintain security while using the ISM mobile application:
- 
           
Use unmodified devices to ensure that the application runs only on devices that are not rooted or jail-broken and have the latest security patches installed.
Note:Using the application on modified, rooted, or jail-broken devices can:
- Compromise data security and integrity
 - Expose sensitive information to unauthorized entities
 - Cause unpredictable application behavior
 - Increase vulnerability to attacks
 
 - Follow organizational security policies by adhering to the mobile device usage policies defined by the organization.
 - Update regularly to keep the operating system and security patches up to date, on the device.
 - Report security issues to the system administrator immediately.
 - Avoid bypassing or disabling any security features of an application.
 - Monitor and be cautious with applications that have access to external storage.
 - Review and update location services settings regularly.
 - Use trusted networks by paying attention to network security warnings and avoid connecting to untrusted Wi-Fi networks.