PRIVACY-BP-B. RECOMMENDED TECHNOLOGY ENFORCEMENT
INTEROP-BP-F. RECOMMENDED FEDERATION COMPLIANCE
SECURE-15. SECURITY AUDITS
SECURE-11. KEY MANAGEMENT
SECURE-1. SECURITY PRACTICES
INTEROP-8. ACCOUNTABILITY
INTEROP-7. USER REDRESS
INTEROP-5. DOCUMENTED PROCESSES
PRIVACY-13. CONTROLS PROPORTIONATE TO RISK
PRIVACY-6. USAGE NOTICE