personnel working in the secure areas; 5. The intermediary should isolate the delivery and loading areas where unauthorized persons could enter the premises from data center; 6. The intermediary should site
intermediary should isolate the delivery and loading areas where unauthorized persons could enter the premises from data center; 6. The intermediary should site the information processing facilities such as the