The documentation shall list the software identifications and describe
how the software identification is created, how it is inextricably linked
to the software itself, how it may be accessed for viewing and how it is
structured in order to differentiate between version changes with and
without requiring a type examination.
Required Documentation (in
addition to the documentation
required for risk classes B and
C):
The documentation shall show
the measures taken to protect
the software identification from