Technologies to protect confidentiality

- Environment decontamination, in order to identify any bugs

- Telephone decontamination, in order to identify any radio micro-transmitters.

- Telephone and environment decontamination, in order to identify any line interceptors.

- Building windows : protection from remote directional interceptors.

Protection against infidelity to the company

- Monitoring the clients.

- Unfair competition activities, by the staff.