(1) The licensee:
(a) designs its information security program to control the identified risks, commensurate with the sensitivity of the information, as well as the complexity and scope of the licensee's activities;
(b) trains staff, as appropriate, to implement the licensee's information security program; and
(c) regularly tests or otherwise monitors the key controls, systems and procedures of the information security program. The frequency and nature of these tests are determined by the licensee's risk assessment.