diff --git a/CertificationPracticeStatement.html b/CertificationPracticeStatement.html index 0c7de01..8263fac 100755 --- a/CertificationPracticeStatement.html +++ b/CertificationPracticeStatement.html @@ -234,12 +234,11 @@ for each class of certificate.

.x will change to .1 in the first approved instance.

  • - © CAcert Inc. 2006-2009. + © CAcert Inc.
  • - Issued under the CAcert document licence policy, - as and when made policy. + Licensed under the CAcert document licence. See PolicyDrafts/DocumentLicence.

    @@ -573,8 +564,6 @@ for these applications: in any application that requires or expects identity.

  • - -

    1.4.4. Limited certificate uses

    @@ -1213,8 +1202,6 @@ Email addresses are verified according to §4.2.2.

    - -

    3.1.3. Anonymity or pseudonymity of subscribers

    @@ -1550,10 +1537,6 @@ Each Member is assured according to Assurance Policy (COD13).

    - - - -

    Certificates. Based on the total number of Assurance Points @@ -1992,8 +1975,6 @@ and the Organisation Handbook.

    4.3. Certificate issuance

    - -

    4.3.1. CA actions during certificate issuance

    @@ -2409,7 +2390,6 @@ or servers within that organisation, but the Organisation is the responsible person.

    -

    Software Agent. If a Member is relying on a CAcert root embedded in @@ -2612,8 +2592,6 @@ No stipulation.

    5. FACILITY, MANAGEMENT, AND OPERATIONAL CONTROLS

    - -

    5.1. Physical controls

    @@ -2758,7 +2736,6 @@ Roles strive in general for separation of duties, either along the lines of

    Refer to Security Policy 9.1.3 (COD8).

    -

    5.3.3. Training requirements

    No stipulation.

    @@ -2943,8 +2920,6 @@ the same, save for some other party filing the dispute.

    6. TECHNICAL SECURITY CONTROLS

    - -

    6.1. Key Pair Generation and Installation

    6.1.1. Key Pair Generation

    @@ -3050,8 +3025,6 @@ This is effected by means of the 'template' system. - -

    6.2. Private Key Protection and Cryptographic Module Engineering Controls

    @@ -3426,8 +3399,6 @@ networks, law (including multijurisdictional issues), identity systems, fraud, IT management.

    - -

    Code Auditors. See Security Policy, sections 7, 9.1. @@ -3622,7 +3593,6 @@ or rulings by Arbitrator.

    9.4. Privacy of personal information

    -

    Privacy is covered by the CCA (COD9) @@ -3697,8 +3667,6 @@ and the commitment to security of Members, some deviations are necessary.

    - -

    9.5.1. Ownership and Licence