Mechanisms exist to manage personnel security risk by screening individuals prior to authorizing access.
Does the organization manage personnel security risk by screening individuals prior to authorizing access?