Asset disposal procedures utilized
Production inventory maintained
Portable media encrypted
Anti-malware technology utilized
Employee background checks performed
Code of Conduct acknowledged by contractors
Code of Conduct acknowledged by employees and enforced
Confidentiality Agreement acknowledged by contractors
Confidentiality Agreement acknowledged by employees
Performance evaluations conducted
Password policy enforced
MDM system utilized
Visitor procedures enforced
Security awareness training implemented