10/21/24
(F) USER CONTROLS
33
24.ARE SYSTEMS, INCLUDING APPLICATION SOFTWARE, SECURED WITH PASSWORDS OR OTHER MEANS FOR AUTHORIZING ACCESS? (INQUIRY AND PERFORM LOG-IN TESTS ON NETWORK SYSTEM(S) AND EACH STAND-ALONE SYSTEM)
34
17
Made with FlippingBook - Online catalogs