3

Configure Devices

All devices must be configured for secure storage, transport, and disposal of confidential information.