
Asset disposal procedures utilized

Production inventory maintained

Portable media encrypted

Anti-malware technology utilized

Employee background checks performed

Code of Conduct acknowledged by contractors

Code of Conduct acknowledged by employees and enforced

Confidentiality Agreement acknowledged by contractors

Confidentiality Agreement acknowledged by employees

Performance evaluations conducted

Password policy enforced

MDM system utilized

Visitor procedures enforced

Security awareness training implemented