PRIVACY-BP-B. RECOMMENDED TECHNOLOGY ENFORCEMENT

INTEROP-BP-F. RECOMMENDED FEDERATION COMPLIANCE

SECURE-15. SECURITY AUDITS

SECURE-11. KEY MANAGEMENT

SECURE-1. SECURITY PRACTICES

INTEROP-8. ACCOUNTABILITY

INTEROP-7. USER REDRESS

INTEROP-5. DOCUMENTED PROCESSES

PRIVACY-13. CONTROLS PROPORTIONATE TO RISK

PRIVACY-6. USAGE NOTICE