>There's also the question of being able to check the credentials of the outsourcing provider's employees.
>I wonder how hard it would be for someone to slip into the outsourcing organisation intent on a little commercial terrorism relating to application >development for major financial institutions who maybe clients? Hasn't happened yet but more damage could probably be done with a little bit of coding >compared to a bombing. Ok, I know I should be more serious but this statement made me think .... Judging by some of the code I've seen from application developers ... How could we tell? ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

