188.8.131.52: Execution of available actions
When permitted by security requirements, software that provides a user interface shall, by using the services as described in clause 184.108.40.206, allow the programmatic execution of the actions exposed according to clause 220.127.116.11 by assistive technologies.
- In some cases the security requirements imposed on a software product may forbid external software from interfering with the ICT product. Examples of systems under strict security requirements are systems dealing with intelligence activities, cryptologic activities related to national security, command and control of military forces.
- Assistive technologies may be required to maintain the same level of security as the standard input mechanisms supported by the platform.
|Type of compliance||Inspection and testing|
|Result||Pass: Checks 1 and 2 are true
Fail: Check 1 or 2 is false