Security rules
|  | Use of IoT IoT devices that have proven security and reliability |  | The user can only identify passwords of smart devices connected to the IoT Internet of Things | 
|---|---|---|---|
|  | Execute software updates provided by smart device manufacturers |  | Periodically delete personal information remaining on IoT IoT devices | 
|  | If IoT devices have unnecessary functions or apps, remove them |  | Refrain from using public networks unless necessary | 
 
             
           
                   
                 
                   
                 
             
             
             
             
             
             
             
             
             
             
       
       
      