time objectives) and set a recovery order of every critical business function suitable for possible impacts. 4.2 Companies should consider to determine a data class and latest data set to recover
accessing the password by other person, the user should change the password instantly. · Having an encryption the file that keeping the password for the purpose accessing or modifying. [M] · Inspecting