• Physical security of personal computers, terminals, and workstations is adequate. (ie: doors are locked when no one is in the office).
  • Data security precautions for administrative data are adequate. (ie: adequate password protection).
  • Backup and recovery procedures for computers and LANs are adequate.
  • All software on computers is licensed.

For a printable version of this report click here.