If requested, can you make the Information Security Policies and Procedures that are applicable for the service/project available? Jonathan van Driessen September 03, 2021 13:40 Yes, these are available upon request. Related articles Are policies and procedures established and mechanisms configured and implemented to protect the wireless network environment perimeter and to restrict unauthorized wireless traffic? Do you have a written password management policy? Comments 0 comments Please sign in to leave a comment.