leakage in case of using virtual desktop technology; (5) prevention of unauthorized access to information by other persons using the accommodation, e.g., family and friends; (6) inspection of the access