Does your organization prepared for damage to computers and IT equipment caused by flooding, fire, power loss, etc.?
Pursuant to local laws, regulations, ethics and contractual constraints are all employment candidates, contractors and third parties subject to background verification?
Are physical security perimeters (fences, walls, barriers, guards, gates, electronic surveillance, physical authentication mechanisms, reception desks and security patrols) implemented?
Are ingress and egress points such as service areas and other points where unauthorized personnel may enter the premises monitored, controlled and isolated from data storage and process?
Do you manage and implement policies and procedures for maintaining a safe and secure working environment in offices, rooms, facilities and secure areas?
Please describe the means by which your organization accomplishes that.
Please upload evidence from a protection consultant or company of their existence.
Is your organization prepared for damage to computers and IT equipment caused by flooding, fire, power loss, etc.?
Please describe the preparations that have been made to prevent and recovery from damages.
Does your organization have a formal process for limiting physical access to areas such as: communications rooms, server rooms, and industrial areas?