11.3.2.12. Execution of available actions
When permitted by security requirements, software that provides a user interface shall, by using the services as described in clause 11.3.2.3, allow the programmatic execution of the actions exposed according to clause 11.3.2.11 by assistive technologies.
Notes
- In some cases the security requirements imposed on a software product may forbid external software from interfering with the ICT product. Examples of systems under strict security requirements are systems dealing with intelligence activities, cryptologic activities related to national security, command and control of military forces.
- Assistive technologies may be required to maintain the same level of security as the standard input mechanisms supported by the platform.
Testing methods
Type of compliance | Inspection and testing |
---|---|
Pre-conditions |
|
Procedure |
|
Result | Pass: Checks 1 and 2 are true Fail: Check 1 or 2 is false |
There is currently no content classified with this term.