enterprise information technology and operating systems for information security; (2) supervision, monitoring and examinaion of compliance with the policies, measures and the operating systems under (1); (3