Guidelines
Apply appropriate technology as required by risk assessment
Can technology enforce IT Control Policy
No additional software for user’s desktop
Adherence to recognized standards
Previous slide
Next slide
Back to first slide
View graphic version