(1) | Clearly regulating the responsibility and authority of employees and subcontracted parties engaged in security management. |
(2) | Establishing internal codes of behavior and manuals regarding security management, and instructing employees to comply with such codes and manuals, as well as supervising compliance with such codes and manuals where appropriate. |
(3) | Appropriate supervision of employees and subcontracted parties involved with the security management through measures such as confidentiality agreements with employees and subcontracted parties. |
(4) | A necessary training for employees involved with the security management. |
(5) | Physically secured data center premises. |
(6) |
Logically protected IKT infrastructure associated with the storage, transportation and processing of personal information. |