Asset disposal procedures utilized

Confidentiality Agreement acknowledged by employees

Production inventory maintained

Confidentiality Agreement acknowledged by contractors

Security awareness training implemented

Password policy enforced

MDM system utilized

Anti-malware technology utilized

Portable media encrypted