The certME mobile app only works on mobile devices equipped with secure elements or enclaves for
storing keys and passwords.
For ease of use and increased security, the certME mobile app works only on mobile devices equipped with secure biometric authentication
means.
The certME mobile app only works on mobile devices that have the screen lock feature active through
PIN, pattern, password or biometric authentication. For the protection of Users,
disabling the screen lock function leads to the deletion of all data associated with
the certME EIM and the impossibility of using it until the identity verification is re-performed at the Identity
Validator.
The certME mobile app does not work on rooted or jailbroken mobile devices. For the protection of
users, the application of a process of rooting or jailbreak on the device leads to the deletion of all data
associated with certME EIM and the impossibility of its use.
Don't allow others to record biometrics on your device, not even your family members. As long as
you are the only person who can biometrically log in to your device, no one else can use your certME EIM to
identify you online or to access your data.
Do not authorize requests for identification or authentication if you have not initiated the transaction yourself.
If you see a random identification/authentication request on the screen, ignore it. If it happens again, please
contact our customer service and we will help you identify what needs to be done next.
Do not download unauthorized / illegal software applications or access links that promise you free
access to goods or functions that normally cost you. Google Play and App Store are the recommended locations to
make software updates and install new apps.
Keep your software up to date. Regular updates to your operating system and apps ensure that you
have the best protection against security risks. The most effective way to make sure that the software is always
up to date is to enable automatic updates.
Purchase mobile terminals only from authorized sellers or trusted persons who can prove that they
are their rightful owners. Stolen devices are susceptible to hacking, are insecure, and can cause problems in
the performance of installed applications.
The only way to make sure no one else is adding apps or doing unwanted operations on your device is to not share your device with others.
If you want to alienate your mobile device, you must delete the application before alienation.