Technologies to protect confidentiality
- Environment decontamination, in order to identify any bugs
- Telephone decontamination, in order to identify any radio micro-transmitters.
- Telephone and environment decontamination, in order to identify any line interceptors.
- Building windows : protection from remote directional interceptors.
Protection against infidelity to the company
- Monitoring the clients.
- Unfair competition activities, by the staff.