> think that Charles is asking the opposite question. He works for a vendor > and some of their code runs authorized. He is asking what audit requirements > customers typically have for authorized code from small vendors.
He specifically asked about 'stealing secrets'. That's more than audit requirements. If it was just that I would not have responded. - Ted MacNEIL [email protected] Twitter: @TedMacNEIL ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: INFO IBM-MAIN
