ACCESS CONTROL POLICY AND PROCEDURES

However, all other applicable procedures related to how the Company’s computer communication systems will be monitored and controlled to ensure compliance with the mitigation agreement will nevertheless apply to computer-based video teleconferences regardless of the device used to access the Company’s computer communication systems. ................
................