Appearance
Only trusted and vetted personnel are granted access to systems, applications and data repositories.