PRIVACY-BP-A. RECOMMENDED QUALITY CONTROLS

SECURE-9. AUTHENTICATION RISK ASSESSMENT

SECURE-1. SECURITY PRACTICES

INTEROP-7. USER REDRESS

PRIVACY-13. CONTROLS PROPORTIONATE TO RISK

PRIVACY-5. DATA AGGREGATION RISK

PRIVACY-4. CREDENTIAL LIMITATION