> think that Charles is asking the opposite question.  He works for a vendor 
> and some of their code runs authorized.  He is asking what audit requirements 
> customers typically have for authorized code from small vendors.

He specifically asked about 'stealing secrets'.
That's more than audit requirements.
If it was just that I would not have responded.
-
Ted MacNEIL
[email protected]
Twitter: @TedMacNEIL

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to