Strict access control;
Each employee signs a confidentiality agreement;
Confidential area monitoring;
Internet behavior control and monitoring;
Apply the leading edge document management system, all generated files are automatically encrypted