1. Access & Monitoring: This system is strictly for authorized personnel. All actions, logins, and tool usages are cryptographically audited and monitored.
2. Data Integrity: Users must not share, export, or compromise sensitive data viewed within this Secure Workspace.
3. Mandatory Hardware Requirement: This platform operates on a Zero-Trust architecture secured by Time-Based One-Time Passwords (TOTP). An alternate device (such as a smartphone) capable of running an Authenticator application is strictly mandatory to access this system. Failure to maintain an active authenticator will result in account lockout.