This is a read-only archive. Find the latest Linux articles, documentation, and answers at the new Linux.com!

Linux.com

Re:Processing

Posted by: EnigmaOne on August 31, 2006 03:30 AM
I do not see any article of the 2004 CISP requirements/PCI framework, which would have prohibited the vendor from providing the required activation key to Stan; given sufficient means of confirming prior customer relationship with the vendor.

The vendor had no defensible foundation, under the CISP requirements/PCI framework, for the refusal; and were merely trolling for unjust enrichment, in response to a reasonable request.

#

Return to Why proprietary software is dangerous for business-critical applications