To show compliance with Postal Service information security requirements, suppliers may submit reports generated by credible third-party auditing authorities. These reports may be used as evidence of compliance, but do not necessarily replace other Postal Service monitoring activities, listed above. Examples of acceptable evidence include the following: