c) Enclosed proving files, together with: documents describing and outlining the overview of the data process; design style and design files authorized by qualified authorities or equivalences; paperwork proving the suitability with the standards for inclusion in the Listing of big nationwide security info methods; files conveying alternatives to s… Read More