diff options
Diffstat (limited to 'www')
-rw-r--r-- | www/policy/CertificationPracticeStatement.html | 32 |
1 files changed, 17 insertions, 15 deletions
diff --git a/www/policy/CertificationPracticeStatement.html b/www/policy/CertificationPracticeStatement.html index 8e7d1e7..334a63e 100644 --- a/www/policy/CertificationPracticeStatement.html +++ b/www/policy/CertificationPracticeStatement.html @@ -1,7 +1,7 @@ <!DOCTYPE html> <html> <head> - <meta http-equiv="Content-Type" content="text/html; charset=utf-8" lang="en"> + <meta http-equiv="Content-Type" content="text/html; charset=UTF-8" lang="en"> <title>Certification Practice Statement (CPS)</title> <style type="text/css"> <!-- @@ -1880,7 +1880,7 @@ The CAcert Inc. Board has the authority to decide to add or remove accepted TLD <p> Identity verification is controlled by the -<a href="http://svn.cacert.org/CAcert/Policies/AssurancePolicy.html"> +<a href="https://www.cacert.org/policy/AssurancePolicy.html"> Assurance Policy</a> (<a href="http://www.cacert.org/policy/AssurancePolicy.php">COD13</a>). The reader is refered to the Assurance Policy, the following is representative and brief only. @@ -2524,7 +2524,7 @@ algorithm following the process: </ol> <center> -<table valign="top" border="1" cellpadding="5" align="center"> +<table valign="top" align="center" border="1" cellpadding="5"> <tbody> <tr> @@ -3222,7 +3222,7 @@ No stipulation. <h3 id="p5.1">5.1. Physical controls</h3> <p> -Refer to Security Policy (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>) +Refer to Security Policy (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>) </p> <ul> <li> @@ -3237,19 +3237,19 @@ Refer to Security Policy (<a href="http://svn.cacert.org/CAcert/Policies/Securit <h4 id="p5.1.1">5.1.1. Power and air conditioning</h4> <p> -Refer to Security Policy 2.1.2 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>) +Refer to Security Policy 2.1.2 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>) </p> <h4 id="p5.1.2">5.1.2. Water exposures</h4> <p> -Refer to Security Policy 2.1.4 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>) +Refer to Security Policy 2.1.4 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>) </p> <h4 id="p5.1.3">5.1.3. Fire prevention and protection</h4> <p> -Refer to Security Policy 2.1.4 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>) +Refer to Security Policy 2.1.4 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>) </p> <h4 id="p5.1.4">5.1.4. Media storage</h4> <p> -Refer to Security Policy 4.3 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>) +Refer to Security Policy 4.3 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>) </p> <h4 id="p5.1.5">5.1.5. Waste disposal</h4> <p> @@ -3257,7 +3257,7 @@ No stipulation. </p> <h4 id="p5.1.6">5.1.6. Off-site backup</h4> <p> -Refer to Security Policy 4.3 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>) +Refer to Security Policy 4.3 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>) </p> <h3 id="p5.2">5.2. Procedural controls</h3> @@ -3278,7 +3278,7 @@ Refer to Security Policy 4.3 (<a href="http://svn.cacert.org/CAcert/Policies/Sec <li>controllers of keys</li> </ul> - Refer to Security Policy 9.1 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>) + Refer to Security Policy 9.1 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>) </li> @@ -3328,7 +3328,7 @@ Refer to Assurance Policy (<a href="http://www.cacert.org/policy/AssurancePolicy <p> <b>Technical.</b> -Refer to Security Policy 9.1 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>). +Refer to Security Policy 9.1 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>). </p> <h4 id="p5.2.4">5.2.4. Roles requiring separation of duties</h4> @@ -3401,7 +3401,7 @@ Roles strive in general for separation of duties, either along the lines of <h4 id="p5.3.2">5.3.2. Background check procedures</h4> <p> -Refer to Security Policy 9.1.3 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>). +Refer to Security Policy 9.1.3 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>). </p> <h4 id="p5.3.3">5.3.3. Training requirements</h4> @@ -3432,7 +3432,7 @@ Refer to DRP. <h3 id="p5.4">5.4. Audit logging procedures</h3> <p> -Refer to Security Policy 4.2, 5 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>). +Refer to Security Policy 4.2, 5 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>). </p> <h3 id="p5.5">5.5. Records archival</h3> @@ -3518,13 +3518,13 @@ Following types of records are archived: <h3 id="p5.6">5.6. Key changeover</h3> <p> -Refer to Security Policy 9.2 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>). +Refer to Security Policy 9.2 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>). </p> <h3 id="p5.7">5.7. Compromise and disaster recovery</h3> <p> -Refer to Security Policy 5, 6 (<a href="http://svn.cacert.org/CAcert/Policies/SecurityPolicy.html">COD8</a>). +Refer to Security Policy 5, 6 (<a href="http://www.cacert.org/policy/SecurityPolicy.html">COD8</a>). (Refer to <a href="#p1.4">ยง1.4</a> for limitations to service.) </p> @@ -4692,5 +4692,7 @@ No stipulation. </p> <h2 id="p10">---This is the end of the Policy---</h2> + + </body> </html> |