Mechanisms exist to establish an alternate processing site that provides security measures equivalent to that of the primary site.
Does the organization establish an alternate processing site that provides security measures equivalent to that of the primary site?