system such as virus scanning, value specifying inspection related to security etc.. and cancel absolutely connection of physical disconnect and disable port that unnecessary to connect to network system
mobile devices; (7) arrange for actions to mitigate impact when an information security incident occurs, for example, immediate disconnection upon being aware of an incident, etc. In the case that the