diff options
-rw-r--r-- | www/policy/CertificationPracticeStatement.html | 25 |
1 files changed, 10 insertions, 15 deletions
diff --git a/www/policy/CertificationPracticeStatement.html b/www/policy/CertificationPracticeStatement.html index 2ceacfc..624575b 100644 --- a/www/policy/CertificationPracticeStatement.html +++ b/www/policy/CertificationPracticeStatement.html @@ -558,8 +558,8 @@ and risks, liabilities and obligations in </tr>
</table>
-<span class="figure">Table 1.4. Types of Certificate</span>
-</center>
+<div class="c figure">Table 1.4. Types of Certificate</div>
+
<h4><a id="p1.4.1">1.4.1. Appropriate certificate uses</a></h4>
@@ -818,9 +818,7 @@ and will be submitted to vendors via the (Top-level) Root. </tr>
</table>
-<span class="figure">Table 1.4.5.b Certificate under Audit Roots</span>
-</center>
-
+<div class="c figure">Table 1.4.5.b Certificate under Audit Roots</div>
<p class="q">
Following information on OLD roots here for
@@ -884,8 +882,7 @@ look at the CPS to figure it out. </tr>
</table>
-<span class="figure">Table 1.4.5. Certificates under Old Roots - <b>Audit Fail</b> </span>
-</center>
+<div class="c figure">Table 1.4.5. Certificates under Old Roots - <strong>Audit Fail</strong> </div>
<p>
<b> Old Roots.</b>
@@ -1688,7 +1685,7 @@ certificates that state their Assured Name(s). </tr>
</table>
-<span class="figure">Table 3.2.b - How Assurance Points are used in Certificates</span>
+<div class="c figure">Table 3.2.b - How Assurance Points are used in Certificates</div>
<br>
@@ -2161,7 +2158,8 @@ algorithm following the process: </tr>
</tbody></table><br>
-<span class="figure">Table 4.3.1. Permitted Data in Signed OpenPgp Keys</span>
+<div class="c figure">Table 4.3.1. Permitted Data in Signed OpenPgp Keys</div>
+
<h4><a id="p4.3.2">4.3.2. Notification to subscriber by the CA of issuance of certificate</a></h4>
@@ -2436,7 +2434,7 @@ See Table 4.5.2. </tr>
</table>
-<span class="figure">Table 4.5.2. Statements of Reliance</span>
+<div class="c figure">Table 4.5.2. Statements of Reliance</div>
<p>
<b>Software Agent.</b>
@@ -2816,9 +2814,7 @@ Roles strive in general for separation of duties, either along the lines of </td>
</tr>
</table>
-
-<span class="figure">Table 5.3.1. Controls on Roles</span>
-
+<div class="c figure">Table 5.3.1. Controls on Roles</div>
<a id="p5.3.2"></a><h4>5.3.2. Background check procedures</h4>
@@ -2904,8 +2900,7 @@ Following types of records are archived: <td>Security Policy 9.1.3</td>
</tr>
</table>
-
-<span class="figure">Table 5.5. Documents and Retention </span>
+<div class="c figure">Table 5.5. Documents and Retention </div>
<a id="p5.6"></a><h3>5.6. Key changeover</h3>
|