Information Technology Security

We use Access



  • All company computers are protected by passwords.

  • Lock screens activate automatically after a few minutes of inactivity.

  • Password changes are mandated every 30 days on all computers.

We use Documentation



  • Regent IT Security Policy

We use Accountability



  • Management approval is required to gain access into unauthorized software applications.

  • Computer servers are kept in locked cabinet. Only authorized personnel are allowed to hold cabinet key and access the servers.

Office Location



...