certME - Recommended Security Precautions

Recommended
Security Precautions

  1. The certME mobile app only works on mobile devices equipped with secure elements or enclaves for storing keys and passwords.
  2. For ease of use and increased security, the certME mobile app works only on mobile devices equipped with secure biometric authentication means.
  3. The certME mobile app only works on mobile devices that have the screen lock feature active through PIN, pattern, password or biometric authentication. For the protection of Users, disabling the screen lock function leads to the deletion of all data associated with the certME EIM and the impossibility of using it until the identity verification is re-performed at the Identity Validator.
  4. The certME mobile app does not work on rooted or jailbroken mobile devices. For the protection of users, the application of a process of rooting or jailbreak on the device leads to the deletion of all data associated with certME EIM and the impossibility of its use.
  5. Don't allow others to record biometrics on your device, not even your family members. As long as you are the only person who can biometrically log in to your device, no one else can use your certME EIM to identify you online or to access your data.
  6. Do not authorize requests for identification or authentication if you have not initiated the transaction yourself. If you see a random identification/authentication request on the screen, ignore it. If it happens again, please contact our customer service and we will help you identify what needs to be done next.
  7. Do not download unauthorized / illegal software applications or access links that promise you free access to goods or functions that normally cost you. Google Play and App Store are the recommended locations to make software updates and install new apps.
  8. Keep your software up to date. Regular updates to your operating system and apps ensure that you have the best protection against security risks. The most effective way to make sure that the software is always up to date is to enable automatic updates.
  9. Purchase mobile terminals only from authorized sellers or trusted persons who can prove that they are their rightful owners. Stolen devices are susceptible to hacking, are insecure, and can cause problems in the performance of installed applications.
  10. The only way to make sure no one else is adding apps or doing unwanted operations on your device is to not share your device with others.
  11. If you want to alienate your mobile device, you must delete the application before alienation.