Other measures in addition to background checks:
- Define information security policies, which are approved by management and widely distributed (members of staff, stakeholders)
 - Define an additional security policy for the use of mobile devices
 - Define an additional security policy for working from home
 - Define an access control policy
 - Put in place appropriate end-of-contract arrangements (deletion of access, confidentiality)
 

