�Introduction���� � iv
�1����
Methods of validation
�2����
Full validation procedures
������� 2.1���� Validation information flow
������� 2.2���� Authorization request
������� 2.3���� Request response
������� 2.4���� Call disposition (optional)
�3����
Limited validation procedures
������� 3.1���� Types of limited validation procedures
������� 3.2���� Location of personal identifying information
Annex� A� �� Security during
validation over an X.25 network
������� A.2���� Recommendations
������� A.3���� Validation security procedures