summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--www/policy/CertificationPracticeStatement.html25
1 files changed, 10 insertions, 15 deletions
diff --git a/www/policy/CertificationPracticeStatement.html b/www/policy/CertificationPracticeStatement.html
index 2ceacfc..624575b 100644
--- a/www/policy/CertificationPracticeStatement.html
+++ b/www/policy/CertificationPracticeStatement.html
@@ -558,8 +558,8 @@ and risks, liabilities and obligations in
</tr>
</table>
-<span class="figure">Table 1.4. Types of Certificate</span>
-</center>
+<div class="c figure">Table 1.4. Types of Certificate</div>
+
<h4><a id="p1.4.1">1.4.1. Appropriate certificate uses</a></h4>
@@ -818,9 +818,7 @@ and will be submitted to vendors via the (Top-level) Root.
</tr>
</table>
-<span class="figure">Table 1.4.5.b Certificate under Audit Roots</span>
-</center>
-
+<div class="c figure">Table 1.4.5.b Certificate under Audit Roots</div>
<p class="q">
Following information on OLD roots here for
@@ -884,8 +882,7 @@ look at the CPS to figure it out.
</tr>
</table>
-<span class="figure">Table 1.4.5. Certificates under Old Roots - <b>Audit Fail</b> </span>
-</center>
+<div class="c figure">Table 1.4.5. Certificates under Old Roots - <strong>Audit Fail</strong> </div>
<p>
<b> Old Roots.</b>
@@ -1688,7 +1685,7 @@ certificates that state their Assured Name(s).
</tr>
</table>
-<span class="figure">Table 3.2.b - How Assurance Points are used in Certificates</span>
+<div class="c figure">Table 3.2.b - How Assurance Points are used in Certificates</div>
<br>
@@ -2161,7 +2158,8 @@ algorithm following the process:
</tr>
</tbody></table><br>
-<span class="figure">Table 4.3.1. Permitted Data in Signed OpenPgp Keys</span>
+<div class="c figure">Table 4.3.1. Permitted Data in Signed OpenPgp Keys</div>
+
<h4><a id="p4.3.2">4.3.2. Notification to subscriber by the CA of issuance of certificate</a></h4>
@@ -2436,7 +2434,7 @@ See Table 4.5.2.
</tr>
</table>
-<span class="figure">Table 4.5.2. Statements of Reliance</span>
+<div class="c figure">Table 4.5.2. Statements of Reliance</div>
<p>
<b>Software Agent.</b>
@@ -2816,9 +2814,7 @@ Roles strive in general for separation of duties, either along the lines of
</td>
</tr>
</table>
-
-<span class="figure">Table 5.3.1. Controls on Roles</span>
-
+<div class="c figure">Table 5.3.1. Controls on Roles</div>
<a id="p5.3.2"></a><h4>5.3.2. Background check procedures</h4>
@@ -2904,8 +2900,7 @@ Following types of records are archived:
<td>Security Policy 9.1.3</td>
</tr>
</table>
-
-<span class="figure">Table 5.5. Documents and Retention </span>
+<div class="c figure">Table 5.5. Documents and Retention </div>
<a id="p5.6"></a><h3>5.6. Key changeover</h3>