There is a mechanism in place to regularly inspect (at least 1 time a year) whether or not information is being handled properly based on the information security policy and procedures. Efforts are then made to improve information handling based on the r