--- a/Symbian3/PDK/Source/GUID-97FFA8D2-4515-448B-8107-61151F252048.dita Tue Jul 20 12:00:49 2010 +0100
+++ b/Symbian3/PDK/Source/GUID-97FFA8D2-4515-448B-8107-61151F252048.dita Fri Aug 13 16:47:46 2010 +0100
@@ -1,35 +1,35 @@
-<?xml version="1.0" encoding="utf-8"?>
-<!-- Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies) All rights reserved. -->
-<!-- This component and the accompanying materials are made available under the terms of the License
-"Eclipse Public License v1.0" which accompanies this distribution,
-and is available at the URL "http://www.eclipse.org/legal/epl-v10.html". -->
-<!-- Initial Contributors:
- Nokia Corporation - initial contribution.
-Contributors:
--->
-<!DOCTYPE concept
- PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd">
-<concept id="GUID-97FFA8D2-4515-448B-8107-61151F252048" xml:lang="en"><title>Content
-security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
-<p>Information content security can be defined in many ways. The most common
-way is to determine the confidentiality, integrity, and availability of information.</p>
-<ul>
-<li><p>Confidentiality defines the privacy level of the information
-and the importance of its content to critical operations. There may be different
-levels of confidentiality, which are defined by the author and the policies
-of the system. Information that is not classified as confidential is considered
-public.</p></li>
-<li><p>Integrity classifies information according to its importance
-to operations. At the highest level of integrity, the information should remain
-intact at all times, without fragmentation or delays in updates.</p></li>
-<li><p>Availability is the most important factor if the information
-must be accessible without interruption for operational reasons.</p></li>
-</ul>
-<p>By applying <xref href="GUID-A1ED2377-E196-423F-A5A2-1889C1CC3E05.dita">cryptography</xref> to
-the elements above, you can introduce additional security features, such as
-traceability, access control, authentication, and repudiation.</p>
-<p>Any data that is stored in the application <codeph>\private\<SID>\</codeph> folder
-can be considered safe, since other applications need the <codeph>AllFiles</codeph> <xref href="GUID-6971B0A2-F79B-4E05-8AF3-BB1FC1932A22.dita">capability</xref> to read
-or write to this location.</p>
-<p>The following aspects of content security are covered in this section:</p>
+<?xml version="1.0" encoding="utf-8"?>
+<!-- Copyright (c) 2007-2010 Nokia Corporation and/or its subsidiary(-ies) All rights reserved. -->
+<!-- This component and the accompanying materials are made available under the terms of the License
+"Eclipse Public License v1.0" which accompanies this distribution,
+and is available at the URL "http://www.eclipse.org/legal/epl-v10.html". -->
+<!-- Initial Contributors:
+ Nokia Corporation - initial contribution.
+Contributors:
+-->
+<!DOCTYPE concept
+ PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd">
+<concept id="GUID-97FFA8D2-4515-448B-8107-61151F252048" xml:lang="en"><title>Content
+security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
+<p>Information content security can be defined in many ways. The most common
+way is to determine the confidentiality, integrity, and availability of information.</p>
+<ul>
+<li><p>Confidentiality defines the privacy level of the information
+and the importance of its content to critical operations. There may be different
+levels of confidentiality, which are defined by the author and the policies
+of the system. Information that is not classified as confidential is considered
+public.</p></li>
+<li><p>Integrity classifies information according to its importance
+to operations. At the highest level of integrity, the information should remain
+intact at all times, without fragmentation or delays in updates.</p></li>
+<li><p>Availability is the most important factor if the information
+must be accessible without interruption for operational reasons.</p></li>
+</ul>
+<p>By applying <xref href="GUID-A1ED2377-E196-423F-A5A2-1889C1CC3E05.dita">cryptography</xref> to
+the elements above, you can introduce additional security features, such as
+traceability, access control, authentication, and repudiation.</p>
+<p>Any data that is stored in the application <codeph>\private\<SID>\</codeph> folder
+can be considered safe, since other applications need the <codeph>AllFiles</codeph> <xref href="GUID-6971B0A2-F79B-4E05-8AF3-BB1FC1932A22.dita">capability</xref> to read
+or write to this location.</p>
+<p>The following aspects of content security are covered in this section:</p>
</conbody></concept>
\ No newline at end of file