11.3.2.17. Modifications of values and text
When permitted by security requirements, software that provides a user interface shall, by using the services as described in 11.3.2.3, allow assistive technologies to modify values and text of user interface elements using the input methods of the platform, where a user can modify these items without the use of assistive technology.
Notes
- In some cases the security requirements imposed on a software product may forbid external software from interfering with the ICT product and so this requirement would not apply. Examples of systems under strict security requirements are systems dealing with intelligence activities, cryptologic activities related to national security, command and control of military forces.
- Assistive technologies may be required to maintain the same level of security as the standard input mechanisms supported by the platform.
Testing methods
Type of compliance | Testing |
---|---|
Pre-conditions |
|
Procedure |
|
Result | Pass: all checks are true. Fail: any check is false. |
There is currently no content classified with this term.