2. Secondly, record the storage space of the checked person's mobile phone to assess the risk of storing confidential information.
3. Then record the applications installed on the checked person's mobile phone, and evaluate whether there are security risks.
4. Finally, record the password settings of the checked mobile phone to evaluate the password strength and security.