Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
• Maintaining secure and locked facilities
• Requiring badges for employees, and visitor passes and escorts for all outsiders admitted into the facility
• Ensuring that all sensitive documents are marked and numbered, and maintaining logs tracking who is issued what documents
• Utilizing a need-to-know policy on who can access proprietary material, and restricting on a need-to-know basis access to networks where proprietary data are kept
0 Comments
View Comments
Maggie Dewitt
Author's page
Related Content
Comments