Mechanisms exist to prevent unauthorized and unintended information transfer via shared system resources.
Does the organization prevent unauthorized and unintended information transfer via shared system resources?