Electronic Communications Security Needs Analysis Regulations, 2014 |
2. Objectives of the Electronic Communications Security Needs Analysis
4. Procedure for the distribution of the request-documents
5. Procedure for the completion of the request-documents
6. Format for completing request documents
7. Procedure for the submission of the request-documents
8. The procedure for one-site and off-site interviews
11. Failure to comply with provisions of Regulations