Security Guidelines

Guidelines to maintain security while using the ISM mobile application:

  • Use unmodified devices to ensure that the application runs only on devices that are not rooted or jail-broken and have the latest security patches installed.

    Note: 

    Using the application on modified, rooted, or jail-broken devices can:

    • Compromise data security and integrity
    • Expose sensitive information to unauthorized entities
    • Cause unpredictable application behavior
    • Increase vulnerability to attacks
  • Follow organizational security policies by adhering to the mobile device usage policies defined by the organization.
  • Update regularly to keep the operating system and security patches up to date, on the device.
  • Report security issues to the system administrator immediately.
  • Avoid bypassing or disabling any security features of an application.
  • Monitor and be cautious with applications that have access to external storage.
  • Review and update location services settings regularly.
  • Use trusted networks by paying attention to network security warnings and avoid connecting to untrusted Wi-Fi networks.