Visitors can check out the Forum FAQ by clicking this link. You have to register before you can post: click the REGISTER link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. View our Forum Privacy Policy.
Want to receive the latest contracting news and advice straight to your inbox? Sign up to the ContractorUK newsletter here. Every sign up will also be entered into a draw to WIN £100 Amazon vouchers!
You are not logged in or you do not have permission to access this page. This could be due to one of several reasons:
You are not logged in. If you are already registered, fill in the form below to log in, or follow the "Sign Up" link to register a new account.
You may not have sufficient privileges to access this page. Are you trying to edit someone else's post, access administrative features or some other privileged system?
If you are trying to post, the administrator may have disabled your account, or it may be awaiting activation.
Originally posted by TheCyclingProgrammerView Post
If OP ever works on public WiFi and has a requirement to ensure the secure transmission of client data then that would surely suffice, even if there is incidental private use of said service.
I would put it in the books as software.
And how often, in the modern day, would the application not be encrypted anyway?
Is it wholly and exclusively for business?????
Really?
If OP ever works on public WiFi and has a requirement to ensure the secure transmission of client data then that would surely suffice, even if there is incidental private use of said service.
Leave a comment: