leakage in case of using virtual desktop technology; (5) prevention of unauthorized access to information by other persons using the accommodation, e.g., family and friends; (6) inspection of the access
business to demonstrate the availability of system to prevent conflict of interest, system to prevent leakage of information among working units and personnel, risk management system, operational management
prevent leakage of information among work units and personnel, risk management, operational management, and internal audit and internal control are put in place, so as to efficiently accommodate the