( 1 MB )
You do not have the required access level. To download this file, see below for more information.
M CNA Member
If you are not currently a member, click here for information on fees and to Apply to join.
The main topics of this document concern the best practices in the development of a Hoplink software in a terminal. This set of recommendations is complementary with the Hoplink specification which already includes a chapter related to the terminal specifications.
Requirements in the specifications are mandatory to ensure interoperability, when the best practices provide operational advices on their implementation.
Before detailing these best practices, the document reminds the key features of Hoplink and gives information for a general understanding.
Public documents : There is no constraint on the document diffusion. Reproduction is authorised and diffusion by e-mail is possible. It is not necessary to login to download public documentation.
Restricted documents : Diffusion is restricted to the designated persons. The information contained in these documents is not public and must be kept confidential. The original recipient is fully responsible for its re-transmission, which may only concern people involved in the project, on a need-to-know basis. You must login to download restricted classified documents (e.g. Card Specifications). Access can be requested by completing the application form for registration.
Confidential documents : Diffusion of the document is strictly restricted to the individually authorised persons. The original recipient is fully responsible for its re-transmission, which may only concern people involved in the project, on a need-to-know basis. These persons must not reproduce or transmit the document again without prior authorisation from the original recipient. It must be stored in a secure place, or encrypted (for electronic documents whose access is not secure). It can only be exchanged in a sealed envelope, or in encrypted form (if electronic version). Therefore, it is stored encrypted on the Calypso File Repository. Access can be requested by completing the application form for registration and completing the subsequent NDA.