Mechanisms exist to ensure the availability of information in the event of the loss of cryptographic keys by individual users.
Does the organization ensure the availability of information in the event of the loss of cryptographic keys by individual users?