| http://www.w3.org/ns/prov#value | - They use biometrics including retinal scanning and thermographics for access control, their data centre hardware is built by them, and they completely destroy decommissioned discs by overwriting the data, crushing them, shredding them, and then recycling the materials.
|