| End users | 
Does the end-user training include the new functionality that Endpoint Encryption
                                            provides?Is the Acceptable Use Policy (AUP) updated to include
                                            encryption services, especially any penalties for not
                                            using or bypassing encryption?Are users notified when they log on to the endpoint that
                                            aligns with the AUP?Are all users fully trained on how to report a lost or
                                            stolen device?Have users been trained on procedures regarding failed
                                            login attempts and password recovery? Is there a policy regarding encryption of confidential
                                            documents that are sent outside of the
                                        organization?Have any new password policies been added to the
                                        AUP? | 
| Incident response | 
Has the Incident Response (IR) policy been updated to
                                            include actions taken when a device is lost or
                                            stolen?Has an audit log review schedule been established for the
                                            PolicyServer logs?Have the email alerts been added to the IR policy,
                                            including the recipients and the expected response when
                                            an alert is received?Have specific criteria been developed to allow a device
                                            to be killed or wiped, including any audit trail
                                            documentation after the action is completed? | 
| Risk assessment | 
Has a new risk assessment been conducted to show the
                                            change in risk profile Endpoint Encryption has
                                            provided?Have Risk Assessment procedures been updated to include
                                            the audit data that the PolicyServer provides? | 
| Disaster recovery | 
Has PolicyServer been added to the Critical Services
                                            list?Is the DR/BC plan updated to include the restoration of the PolicyServer service?Is a process developed to allow user data to be recovered
                                            from a device? | 
| Human resources | 
Is the New Employee checklist updated to include any new
                                            process for Endpoint Encryption?Is the termination process updated to include Endpoint Encryption?
                                            Consider the following: 
                                            
                                                Backing up, formatting, or restoring devices
                                                Locking or killing devices
                                                Disabling accounts in PolicyServer | 
| Removeable media | 
                                        What USB and other removeable media devices are allowed
                                            in your network?
                                        Will removeable media devices be accessible at all hours
                                            of the day, or will you have set times where removeable
                                            device authentication is not allowed?
                                        Where can users access removeable media devices:
                                            on-network, off-network, over VPN, at home? | 
| Compliance | 
Is the compliance profile updated to include the benefits
                                            that Endpoint Encryption
                                            provides?Has a compliance review been conducted on all aspects on
                                            the Endpoint Encryption
                                            implementation and deployment? |