Can have security access code to alarm system, control safe, etc.
a) Upon completion of a background check and approval from the security department
b) Upon receiving specialized training on security protocols and procedures
c) Upon signing a confidentiality agreement regarding sensitive information
d) Upon verification of employment status and authorization from management