leakage in case of using virtual desktop technology; (5) prevention of unauthorized access to information by other persons using the accommodation, e.g., family and friends; (6) inspection of the access
appropriate consultation took place for difficult or contentious matters? If yes, Please describe the policies and procedures. If no, How does the firm ensure that the difficult or contentious matters have been