22. Must ensure that hard copies of classified and proprietary information are destroyed (after it is no longer needed).
23. Must ensure that classified information is protected against unauthorized access using encryption, according to company standards, when sending it via electronic means
24. Must not install company unapproved software onto the system. Only company designated personnel are authorized to load software.
25. Must not add additional hardware or peripheral devices to the system. Only designated personnel can direct the installation of hardware on the system.
26. Must not reconfigure hardware or software on any company systems, networks, or interfaces.
27. Must follow all company wireless access policies.
28. Must not retrieve information for someone who does not have authority to access that information.
29. Must not remove computer resources from the facility without prior approval. Resources may only be removed for official use.