9/11/23
17. ARE CONTROLS ESTABLISHED AND PROCEDURES IMPLEMENTED TO PROTECT ALL SYSTEMS AND TO ENSURE THAT ACCESS TO THE FOLLOWING IS RESTRICTED AND SECURED: SYSTEMS’ SOFTWARE AND APPLICATION PROGRAMS? (INQUIRY AND REVIEW OTHER – AUTHORIZATION LISTS)
27
18. ARE CONTROLS ESTABLISHED AND PROCEDURES IMPLEMENTED TO PROTECT ALL SYSTEMS AND TO ENSURE THAT ACCESS TO THE FOLLOWING IS RESTRICTED AND SECURED: DATA ASSOCIATED WITH CLASS II GAMING? (INQUIRY AND REVIEW OTHER – AUTHORIZATION LISTS)
28
14
Made with FlippingBook - Online catalogs