Risk analysis and monitoring systems: studies, monthly reporting, alerts on anything that could have an impact on your company's activities and the lives of your employees
Evaluation of your security procedures: audits, mystery visits, intrusion tests, behavioral analysis
Definition of internal security and information protection policies
Evaluation of your technical tools and installation of equipment (video surveillance systems, access control, alarms, etc.)
*Article L612-14 of the Internal Security Code: "The authorization to operate does not confer any prerogative of public authority on the company or the persons benefiting from it. "