• Is there a plan in place to ensure that, when key information (such as access codes) or hardware (secure phones) is lost, stolen or misplaced, it can be protected or deactivated so that the communications system is not compromised? •