Mechanisms exist to configure thin nodes to have minimal functionality and information storage.
Mechanisms exist to configure thin nodes to have minimal functionality and information storage.
Mechanisms exist to physically disable or remove unnecessary connection ports or input/output devices from sensitive systems.
Mechanisms exist to configure embedded sensors on systems to: â–ª Prohibit the remote activation of sensing capabilities; and â–ª Provide an explicit indication of sensor use to users.
Mechanisms exist to utilize organization-defined measures so that data or information collected by sensors is only used for authorized purposes.
Mechanisms exist to notify individuals that Personal Data (PD) is collected by sensors.
Mechanisms exist to utilize sensors that are configured to minimize the collection of information about individuals.
Mechanisms exist to verify embedded technology sensors are configured so that data collected by the sensor(s) is only reported to authorized individuals or roles.
Mechanisms exist to unplug or prohibit the remote activation of collaborative computing devices with the following exceptions: â–ª Networked whiteboards; â–ª Video teleconference cameras; and â–ª Teleconference microphones.
Mechanisms exist to disable or remove collaborative computing devices from critical information systems and secure work areas.
Automated mechanisms exist to provide an explicit indication of current participants in online meetings and teleconferences.