1) Security verifies identity
2) Personal items are deposited into secure locker
3) Individual uses badge to enter secure lab
1) Authorized individual works at dedicated work station
2) Dedicated PC runs on trusted, separate network
3) Client systems are accessed via secure network connection or remote work environment
1) Individual logs out of secure network station
2) Individual badges out of lab, ensuring a record of entry and exit
3) Personal items are collected from secure locker
4) Departure