We need to make sure the user is kept safe. For example characteristic that can be mapped to user vulnerabilities must not be exploited or made available for others to exploit All the best Lisa Seeman Athena ICT Accessibility Projects LinkedIn, TwitterReceived on Monday, 15 February 2016 10:46:23 UTC
This archive was generated by hypermail 2.4.0 : Thursday, 24 March 2022 20:23:55 UTC