|
|
|
•In addition to the technical issues there are also very
difficult policy issues.
|
|
•Issues such as who will be the certifying authority, and
how will the devices and applications be certified for operation in a
critical safety environment? Who will
enforce that operation?
|
|
•How is privacy handled?
|
|
•How will we fund wireless communication or necessary
infrastructure?
|
|
•Risk and liability are other issues, as well as data
ownership.
|
|
•Many of these policy issues are directly linked to the
technical questions, and will be addressed over time together.
|
|
|