• Protection and destruction of photographic and video drones in the field of data acquisition.
  • Secret reports for other Management Board conferences.
  • Checking telecommunications devices.
  • Checking the scope of work at the employees workers at IT and computer.
  • Programs checking the effectiveness of employees in the company.
  • Checking the security of server rooms and passwords.
  • Conscious detection of IT information and data transmission.
  • Participating observation in the field of employee correlation with other competing companies.
  • Big date in terms of competition format.
  • Preparation of strategy, planning, implementation of enterprise security and employees – terrorist and hacker attacks.