The access of Emails, Internet access and Outgoing communications are limited to only the required staff on project matters and all communications are screened and monitored every day. Robust firewalls to withstand internal and external threats. Possible threats are completely eliminated by proper implementation of ISMS data security |