Mechanisms exist to identify contractors and other third-party users through unique username characteristics.
Does the organization identify contractors and other third-party users through unique username characteristics?