|

 
|
| | Name : | James C. Johnson III | Organization : | N/A | Post Date : | 9/30/2005 |
| Section : | 6.7.2 | Page no. : | 26 | Line no.: | | Comment : | 6.7.2 Controlling Usage P.26
Does this imply that the vendor has to include the necessary subsystems
to allow secure operation? With this language it might be sufficient for a
manufacturer to supply documentation only.
| |
|
|