ACCESS CONTROL POLICY AND PROCEDURES

How the Company will permit remote access for privileged functions only for compelling operational needs and documents the rationale for such access in the security plan for the information system. ... Clock / calendar settings for the main server, the alarm system, and the video surveillance system shall be checked and adjusted approximately ... ................
................