Security Guidelines
Guidelines to maintain security while using the ISM mobile application:
-
Use unmodified devices to ensure that the application runs only on devices that are not rooted or jail-broken and have the latest security patches installed.
Note:Using the application on modified, rooted, or jail-broken devices can:
- Compromise data security and integrity
- Expose sensitive information to unauthorized entities
- Cause unpredictable application behavior
- Increase vulnerability to attacks
- Follow organizational security policies by adhering to the mobile device usage policies defined by the organization.
- Update regularly to keep the operating system and security patches up to date, on the device.
- Report security issues to the system administrator immediately.
- Avoid bypassing or disabling any security features of an application.
- Monitor and be cautious with applications that have access to external storage.
- Review and update location services settings regularly.
- Use trusted networks by paying attention to network security warnings and avoid connecting to untrusted Wi-Fi networks.