- Physical security of personal computers, terminals, and workstations is adequate. (ie: doors are locked when no one is in the office).
- Data security precautions for administrative data are adequate. (ie: adequate password protection).
- Backup and recovery procedures for computers and LANs are adequate.
- All software on computers is licensed.