- Do you encrypt devices holding personal data or confidential information (e.g. laptops, hard drives, USB,…)?
- Do you use encryption protocols when transferring data? If yes, which ones?
- Do you use at-rest database encryption for data?
- Do you have a mean to remotely wipe data on a lost or stolen phone, laptop or similar device?