Vulnerability and system monitoring procedures established

System activity logged

Data transmission encrypted

Penetration testing performed

Asset disposal procedures utilized

Confidentiality Agreement acknowledged by employees

Production inventory maintained

Confidentiality Agreement acknowledged by contractors

Security awareness training implemented

Password policy enforced