Hart Voting System Support Procedures Training Manual Hart

Total Page:16

File Type:pdf, Size:1020Kb

Hart Voting System Support Procedures Training Manual Hart Hart Voting System Support Procedures Training Manual Hart Voting System System Version 6.2 © 1999-2006, Hart InterCivic, Inc. 6300-006 62D Confidential and Proprietary Hart Voting System Support Procedures Training Manual 6300-006 62D Hart InterCivic Quality and Information Security Policy Hart InterCivic is committed to election integrity, customer satisfaction, and continual improvement of the hardware, software, and services provided to our customers. Continual improvement will be visible from planned and documented activities leading to fulfillment of quality and information security objectives. All products, components, and services provided to our customer shall be safe, secure, and effective for their intended use, and they shall meet or exceed the quality and reliability levels expected by the marketplace. This commitment includes the security of the information used in the product development process. Management at Hart InterCivic will implement information security to ensure contractual requirements are met, employees are trained in information security, and that risks to information security are understood and minimized. Employees of Hart InterCivic are required to comply with information security procedures and to report any instances of known of possible information security breach. This DOCUMENT and the SOFTWARE, HARDWARE, and FIRMWARE to which it pertains contain confidential and proprietary information belonging exclusively to Hart InterCivic, Inc. No part of this publication may be modified, reproduced, stored in a retrieval system, or transmitted in any form, distributed by any electronic or mechanical means, photocopied, recorded, or otherwise reproduced or distributed without prior written permission of Hart InterCivic, Inc. Any person receiving this manual has a duty to take reasonable precautions preventing unauthorized disclosure of the contents. Trademarks eSlate is a registered trademark of Hart InterCivic, Inc. Ballot Now, Ballot Origination Software System, eScan, Disabled Access Unit, Hart InterCivic, Judge’s Booth Controller, Mobile Ballot Box, Rally, Tally, and Verifiable Ballot Option are trademarks of Hart InterCivic, Inc. Hart InterCivic disclaims any proprietary interest in the marks and names of others. Hart InterCivic, Inc. P.O. Box 80649 Austin, TX 78708 Help Desk Telephone: 866.ASK.HART/866.275.4273 Fax: 800.831.1485 Help Desk email: [email protected] Help Desk URL: http://hartsupport.hartic.com Product Number 6300-006 62D © Hart InterCivic, Inc. All Rights Reserved Confidential and Proprietary Hart Voting System Support Procedures Training Manual 6300-006 62D IMPORTANT SAFEGUARDS Hart Voting System Equipment Follow all warnings and instructions marked on the equipment and on this sheet. 1. READ INSTUCTIONS All of the safety and operating instructions must be read before operating this voting system. 2. RETAIN INSTRUCTIONS These safety and operating instructions should be retained for future use. 3. CLEANING Unplug the equipment from the wall outlet and any other equipment before cleaning. Do not use aerosol cleaners. Use a spray glass cleaner to dampen a soft cloth, and then wipe off any dirt or fingerprints. Do not spray cleaner directly on the unit. DANGER: Never push objects of any kind into this product through openings as they may touch dangerous voltage points or short out parts that could result in fire or electric shock. Never spill or spray anything on or into the product. If liquid is spilled on the product, turn it off immediately, wipe away the liquid, and then return the unit to the local election officials for servicing. 4. ATTACHMENTS Use only Hart InterCivic approved attachments in this voting system. Use of other attachments is unsafe. DANGER: Do not place this product on an unstable cart, stand, tripod, bracket, or table. The product may fall, causing serious injury and serious damage to the product. Use only with a booth, cart, or stand approved by Hart InterCivic or sold with the product. A product and caddy combination must be moved with care. Quick stops, excessive force, and uneven surfaces may cause the product and caddy combination to overturn, causing serious injury. 5. WATER and MOISTURE Do not use this product near water – for example, near a bathtub, washbowl, kitchen sink, laundry tub, in a wet basement, or near a swimming pool. 6. POWER SOURCES Use only battery packs or 110V AC wall power as shown on the equipment. If you are not sure of the type of power supplied to a polling location, call the local power company before proceeding. Use only grounded, three prong outlets, and the power cord supplied with the equipment by Hart InterCivic. Power cords should be routed so that they are not likely to be walked on or have objects placed on them. Do not overload wall power outlets or extension cords as this may cause a fire. 7. SERVICING CAUTION: Do not attempt to service this unit yourself. Opening the unit will result in exposure to dangerous voltages or other hazards. Only the battery and printer doors should be opened by polling place personnel. Refer all other servicing to qualified personnel only. When replacement parts are required, be sure to use only Hart InterCivic approved parts. Unplug the unit from the wall outlet and refer servicing to qualified personnel under the following conditions: • When the power cord or plug is damaged • If liquid has been spilled on the product • If the product has been exposed to rain • If the product does not operate normally after following the operating instructions Confidential and Proprietary Hart Voting System Support Procedures Training Manual 6300-006 62D Confidential and Proprietary Hart Voting System Support Procedures Training Manual 6300-006 62D Support Procedures Main Table of Contents Hart Voting System Support Procedures – Getting Started ...................................... 1 Storage, Delivery and Maintenance Procedures ........................................................ 9 System Computer and Peripheral Devices Setup .................................................... 25 Polling Place Equipment Acceptance and Functionality Test Procedures............ 37 Pre-Election and Post-Election Procedures ............................................................. 87 Establishing Procedures for Field Technicians and Help Desk Operators.......... 115 Troubleshooting Procedures for Support Personnel............................................. 125 Reading Device Reports ........................................................................................... 219 MBB Processing and Election Night Procedures................................................... 249 Glossary of Terms..................................................................................................... 257 SERVO Procedures and Operations Manual .......................................................... 271 Election Labels........................................................................................... Refer to Tab Election Logs (Forms) ............................................................................... Refer to Tab Equipment Maintenance and Supplements ............................................. Refer to Tab © Hart InterCivic, Inc. Confidential and Proprietary Page i Confidential and Proprietary Hart Voting System Support Procedures Training Manual 6300-006 62D Hart Voting System Support Procedures Getting Started Hart Voting System System Version 6.2 Series © Hart InterCivic, Inc. Confidential and Proprietary Page 1 Hart Voting System Support Procedures Training Manual 6300-006 62D Page 2 Confidential and Proprietary © Hart InterCivic, Inc. Hart Voting System Support Procedures Training Manual 6300-006 62D Table of Contents Introduction to The Hart Voting System Support Procedures Course..................... 4 This Document .............................................................................................................. 4 Course Objectives......................................................................................................... 4 Hart Voting System Data Flowchart............................................................................. 5 Hart Voting System Security Features ........................................................................ 6 Hart Voting System Workflow ...................................................................................... 7 © Hart InterCivic, Inc. Confidential and Proprietary Page 3 Hart Voting System Support Procedures Training Manual 6300-006 62D Introduction to the Hart Voting System Support Procedures Course In the Hart Voting System Support Procedures Course, elections officials, support personnel, and warehouse staff complete the following: • review storage, delivery, and maintenance procedures • set up polling place system hardware (eScan, Judge’s Booth Controller, Disabled Access Unit, and eSlate with, or without, the Verifiable Ballot Option) • perform Acceptance and Functionality Testing • reset and prepare the hardware systems for an election • practice maintenance and troubleshooting procedures • apply backup procedures in SERVO A segment of this course also provides training to Resolution Board members and/or ballot transmittal personnel. This Document This training manual is designed to guide operator training. Each section is intended to be its own stand-alone document. Included at the end of this training manual is the SERVO Operations Manual, as well as operations manuals for the polling place equipment and
Recommended publications
  • Designing PCI Cards and Drivers for Power Macintosh Computers
    Designing PCI Cards and Drivers for Power Macintosh Computers Revised Edition Revised 3/26/99 Technical Publications © Apple Computer, Inc. 1999 Apple Computer, Inc. Adobe, Acrobat, and PostScript are Even though Apple has reviewed this © 1995, 1996 , 1999 Apple Computer, trademarks of Adobe Systems manual, APPLE MAKES NO Inc. All rights reserved. Incorporated or its subsidiaries and WARRANTY OR REPRESENTATION, EITHER EXPRESS OR IMPLIED, WITH No part of this publication may be may be registered in certain RESPECT TO THIS MANUAL, ITS reproduced, stored in a retrieval jurisdictions. QUALITY, ACCURACY, system, or transmitted, in any form America Online is a service mark of MERCHANTABILITY, OR FITNESS or by any means, mechanical, Quantum Computer Services, Inc. FOR A PARTICULAR PURPOSE. AS A electronic, photocopying, recording, Code Warrior is a trademark of RESULT, THIS MANUAL IS SOLD “AS or otherwise, without prior written Metrowerks. IS,” AND YOU, THE PURCHASER, ARE permission of Apple Computer, Inc., CompuServe is a registered ASSUMING THE ENTIRE RISK AS TO except to make a backup copy of any trademark of CompuServe, Inc. ITS QUALITY AND ACCURACY. documentation provided on Ethernet is a registered trademark of CD-ROM. IN NO EVENT WILL APPLE BE LIABLE Xerox Corporation. The Apple logo is a trademark of FOR DIRECT, INDIRECT, SPECIAL, FrameMaker is a registered Apple Computer, Inc. INCIDENTAL, OR CONSEQUENTIAL trademark of Frame Technology Use of the “keyboard” Apple logo DAMAGES RESULTING FROM ANY Corporation. (Option-Shift-K) for commercial DEFECT OR INACCURACY IN THIS purposes without the prior written Helvetica and Palatino are registered MANUAL, even if advised of the consent of Apple may constitute trademarks of Linotype-Hell AG possibility of such damages.
    [Show full text]
  • Power Macintosh 6100/ WS 6150
    K Service Source Power Macintosh 6100/ WS 6150 Power Macintosh 6100/60, 6100/60AV, 6100/66, 6100/66AV, 6100/DOS Compatible, and Workgroup Server 6150 K Service Source Basics Power Macintosh 6100/WS 6150 Basics Power Macintosh System Overview - 1 Power Macintosh System Overview PowerPC microprocessors are a family of processors built on reduced instruction-set computing (RISC) technology. RISC processors streamline the internal workings of computers. Whereas traditional (complex instruction-set computing, or CISC) processors contain a wide variety of instructions to handle many different tasks, RISC processors contain only those instructions that are used most often. When a complex instruction is needed, a RISC processor builds it from a combination of basic instructions. RISC processors are designed to execute these basic instructions extremely quickly. The performance gains achieved by speeding up the most-used instructions more than compensate for the time spent creating less-used instructions. Basics Power Macintosh System Overview - 2 Previously, RISC technology had been used only in high-end workstations and commercial database servers. With the introduction of Macintosh PowerPC computers, Apple succeeded in bringing RISC technology to personal computing. Key Points Three key points to remember about a PowerPC processor- based Macintosh system: It's a Macintosh; it's compatible; it offers tremendous performance. Apple's PowerPC computers feature the same user interface as their 680x0-based predecessors. Users can mix RISC- based and 680x0-based Macintosh systems on the same net- work and exchange files and disks between them. In addition, users can run both 680x0 and native PowerPC applications on the same Power Macintosh system simultaneously.
    [Show full text]
  • Usbwall: a Novel Security Mechanism to Protect Against Maliciously Reprogrammed USB Devices
    USBWall: A Novel Security Mechanism to Protect Against Maliciously Reprogrammed USB Devices Myung-gu Kang M.S., Computer Science, University of Kansas, 2015 Submitted to the graduate degree program in Electrical Engineering & Computer Science and the Graduate Faculty of the University of Kansas in partial fulfillment of the requirements for the degree of Master of Science. Hossein Saiedian, Ph.D., Professor and Thesis Advisor Bo Luo, Ph.D., Professor Fengjun Li, Ph.D., Professor Date Defended The Thesis Committee for Myung-gu Kang certifies that this is the approved version of the following thesis: USBWall: A Novel Security Mechanism to Protect Against Maliciously Reprogrammed USB Devices Hossein Saiedian, Ph.D. Professor and Thesis Adviser Date Approved ii Abstract Universal Serial Bus (USB) is a popular choice of interfacing computer systems with peripherals. With the increasing support of modern operating systems, it is now truly plug-and-play for most USB devices. However, this great convenience comes with a risk which can allow a device to perform arbitrary actions at any time while it is connected. Researchers have confirmed that a simple USB device such as a mass storage device can be disguised to have an additional function such as a keyboard. An unauthorized keyboard attachment can compromise the security of the host by allowing arbitrary keystrokes to enter the host. This undetectable threat differs from traditional virus that spreads via USB devices due to the location it is stored and the way it behaves. Therefore, it is impossible for current file-level antivirus to be aware of such risk. Currently, there is no commercially available protection for USB devices other than mass storage devices.
    [Show full text]
  • Parallel Card
    PARALLEL CARD Single Port ISA EPP/ECP Parallel Card ISA1P Instruction Guide * Actual product may vary from photo Revised: December 5, 2002 The Professionals’ Source For Hard-to-Find Computer Parts 7 FCC COMPLIANCE STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: • Reorient or relocate the receiving antenna. • Increase the separation between the equipment and receiver. • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. • Consult the dealer or an experienced radio/TV technician for help. 6 1 Technical Support Table of Contents The following technical resources are available for this StarTech.com product: Introduction . 2 On-line help: Installation . 3 We are constantly adding new information to the Tech Support section of our web site. To Setting Your Jumpers . 4 access this page, click the Tech Support link on our homepage, www.startech.com.
    [Show full text]
  • PC 99 System Design Guide
    PC 99 System Design Guide A Technical Reference for Designing PCs and Peripherals for the Microsoft® Windows® Family of Operating Systems Intel Corporation and Microsoft Corporation © 1997-1998 Intel Corporation and Microsoft Corporation. All rights reserved. ii Contents The information contained in this document represents the current view of Intel Corporation and Microsoft Corporation on the issues discussed as of the date of publication. Because Intel and Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Intel and Microsoft, and Intel and Microsoft cannot guarantee the accuracy of any information presented. This document is for informational purposes only. INTEL AND MICROSOFT MAKE NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Intel Corporation and Microsoft Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. The furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property rights. Intel and Microsoft do not make any representation or warranty regarding specifications in this document or any product or item developed based on these specifications. Intel and Microsoft disclaim all express and implied warranties, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and freedom from infringement. Without limiting the generality of the foregoing, Intel and Microsoft do not make any warranty of any kind that any item developed based on these specifications, or any portion of a specification, will not infringe any copyright, patent, trade secret, or other intellectual property right of any person or entity in any country.
    [Show full text]
  • Implementarea Mecanismelor De Intrare-Ieșire Gestionarul Plug and Play La Windows
    Uniersitatea “Politehnica” din București Facultatea de Electronică, Telecomunicații și Tehnologia Informației Implementarea mecanismelor de intrare-ieșire Gestionarul Plug and Play la Windows Profesor coordonator: prof. univ. dr. ing. Ştefan Stăncescu Studenți: Sorescu-Moreels Raluca- Elena Vasile Alin- Florentin Răducanu Marilena Grupa: 431A București 2015 Cuprins 1. Ce reprezintă conceptul de Plug and Play? (Sorescu- Moreels Raluca- Elena) ..................................... 3 1.1. Beneficii aduse de Plug and Play ................................................................................................... 3 2. Evoluţia Plug and Play (Sorescu- Moreels Raluca- Elena) ..................................................................... 4 2.1. Windows 95................................................................................................................................... 4 2.2. Windows 2000 .............................................................................................................................. 5 2.3. Windows XP .................................................................................................................................. 7 2.4. Windows 7 ..................................................................................................................................... 7 2.5. Windows 8/ Windows 8.1 ............................................................................................................. 8 3. Note Bibliografice Capitol 1 și 2 ...........................................................................................................
    [Show full text]
  • System Management BIOS Reference Specification
    Specification DSP0130 STATUS: Preliminary Copyright © "2000, 2001" Distributed Management Task Force, Inc. (DMTF). All rights reserved. DMTF is a not-for-profit association of industry members dedicated to promoting enterprise and systems management and interoperability. DMTF specifications and documents may be reproduced for uses consistent with this purpose by members and non-members, if correct attribution is given. As DMTF specifications may be revised from time to time, the particular version and release cited should always be noted." System Management BIOS (SMBIOS) Reference Specification Version 2.3.2 October 12, 2001 Abstract Continuing the DMTF's mission of leading the development of management standards for distributed desktop, network, enterprise and Internet environments, the System Management BIOS Reference Specification addresses how motherboard and system vendors present management information about their products in a standard format by extending the BIOS interface on Intel architecture systems. The information is intended to allow generic instrumentation to deliver this data to management applications that use DMI, CIM or direct access and eliminates the need for error prone operations like probing system hardware for presence detection. This specification is intended to provide enough information for BIOS developers to implement the necessary extensions to allow their product's hardware and other system-related information to be accurately determined by users of the defined interfaces. This specification is also intended to provide enough information for developers of management instrumentation to develop generic routines for translating from SMBIOS format to the format used by their chosen management technology whether it is a DMTF technology like DMI or CIM, or another technology like SNMP.
    [Show full text]
  • PCI Bus Demystified.Pdf
    PCI Bus Demystified by Doug Abbott A VOLUME IN THE DEMYSTIFYING TECHNOLOGY™ SERIES Eagle Rock, Virginia www.LLH-Publishing.com Copyright © 2000 by LLH Technology Publishing All rights reserved. No part of this book may be reproduced, in any form or means whatsoever, without written permission of the publisher. While every precaution has been taken in the prepara- tion of this book, the publisher and author assume no responsibil- ity for errors or omissions. Neither is any liability assumed for damages resulting from the use of information contained herein. Printed in the United States of America. ISBN 1-878707-78-7 (LLH eBook) LLH Technology Publishing and HighText Publications are trade- marks of Lewis Lewis & Helms LLC, 3578 Old Rail Road, Eagle Rock, VA, 24085 To Susan: My best friend, my soul mate. Thanks for sharing life’s journey with me. To Brian: Budding DJ, future pilot and all around neat kid. Thanks for keeping me young at heart. Contents Introduction ......................................................................... 1 Intended Audience .......................................................................2 The Rest of This Book .................................................................. 3 Chapter 1: Introducing the Peripheral Component Interconnect (PCI) Bus .......................................................... 5 So What is a Computer Bus? ........................................................ 6 Bus Taxonomy...............................................................................7 What’s Wrong with
    [Show full text]
  • ACPI in Linux Architecture, Advances, and Challenges
    ACPI in Linux Architecture, Advances, and Challenges Len Brown Anil Keshavamurthy David Shaohua Li Robert Moore Venkatesh Pallipadi Luming Yu Intel Open Source Technology Center {len.brown, anil.s.keshavamurthy, shaohua.li}@intel.com {robert.moore, venkatesh.pallipadi, luming.yu}@intel.com Abstract providing major portions of an ACPI imple- mentation in OS-independent ACPI modules ACPI (Advanced Configuration and Power In- that can be integrated into any operating sys- terface) is an open industry specification es- tem. tablishing industry-standard interfaces for OS- The ACPICA software can be hosted on any directed configuration and power management operating system by writing a small and rel- on laptops, desktops, and servers. atively simple OS Services Layer (OSL) be- ACPI enables new power management technol- tween the ACPI subsystem and the host oper- ogy to evolve independently in operating sys- ating system. tems and hardware while ensuring that they continue to work together. The ACPICA source code is dual-licensed such that Linux can share it with other operating sys- This paper starts with an overview of the tems, such as FreeBSD. ACPICA architecture. Next a section describes the implementation architecture in Linux. 1.1 ACPICA Overview Later sections detail recent advances and cur- rent challenges in Linux/ACPI processor power ACPICA defines and implements a group of management, CPU and memory hot-plug, software components that together create an legacy plug-and-play configuration, and hot- implementation of the ACPI specification. A keys. major goal of the architecture is to isolate all operating system dependencies to a relatively small translation or conversion layer (the OS 1 ACPI Component Architecture Services Layer) so that the bulk of the ACPICA code is independent of any individual operat- The purpose of ACPICA, the ACPI Component ing system.
    [Show full text]
  • Toolware Manual Outline
    ToolWare Version 7.0 Operations Manual PO Box 16460, Portland OR 97292-0460 • 800-852-1368 • Fax 800-582-9015 www.aimco-global.com Table of Contents Introduction ................................................................................................ 2 Setup Setting Up Parallel Connection ........................................................ 3 Setting Up a USB Connection ......................................................... 4 Setting Up an Ethernet Connection ................................................. 4 Features ..................................................................................................... 7 File ................................................................................................... 7 Tool ................................................................................................. 7 Calibrate .......................................................................................... 8 Encrypt File...................................................................................... 8 DSP ................................................................................................. 8 Socket Tray ................................................................................... 13 System .......................................................................................... 13 Curveware ..................................................................................... 15 Parameter Sets .............................................................................. 17
    [Show full text]
  • Controlling the Boostrap Process
    UPTEC F11 064 Examensarbete 30 hp December 2011 Controlling the Bootstrap Process Firmware Alternatives for an x86 Embedded Platform Svante Ekholm Lindahl Abstract Controlling the Bootstrap Process: Firmware Alternatives for an x86 Embedded Platform Svante Ekholm Lindahl Teknisk- naturvetenskaplig fakultet UTH-enheten The viability of firmware engineering on a lower-tier computer manufacturer (OEM) level, where the OEM receives processor and chipset components second hand, was Besöksadress: investigated. It was believed that safer and more reliable operation of an embedded Ångströmlaboratoriet Lägerhyddsvägen 1 system would be achieved if system startup times were minimised. Theoretical Hus 4, Plan 0 knowledge of firmware engineering, methods and standards for the x86 platform was compiled and evaluated. The practical aspects of firmware engineering were Postadress: investigated through the construction of an open source boot loader for a rugged, Box 536 751 21 Uppsala closed-box embedded x86 Intel system using Coreboot and Seabios. The boot loader was compared with the original firmware and the startup times were found to be Telefon: reduced ninefold from entry vector to operating system handover. 018 – 471 30 03 Telefax: Firmware engineering was found to be a complex field stretching from computer 018 – 471 30 00 science to electrical engineering. Firmware development on a lower-tier OEM level was found to be possible, provided that the proper documentation could be obtained. Hemsida: To this end, the boot loader prototype was proof of concept. This allowed an http://www.teknat.uu.se/student alternative, open-source oriented model for firmware development to be proposed. Ultimately, each product use case needed to be individually evaluated in terms of requirements, cost and ideology.
    [Show full text]
  • PC 98 System Design Guide a Technical Reference for Designing Pcs and Peripherals for the Microsoft Windows Family of Operating Systems
    PC 98 System Design Guide A Technical Reference for Designing PCs and Peripherals for the Microsoft Windows Family of Operating Systems Intel Corporation and Microsoft Corporation With special contributions by Compaq Computer Corporation ii The information contained in this document represents the current view of Intel Corporation and Microsoft Corporation on the issues discussed as of the date of publication. Because Intel and Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Intel and Microsoft, and Intel and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This document is for informational purposes only. INTEL AND MICROSOFT MAKE NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Intel Corporation and Microsoft Corporation may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. The furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property rights except as expressly provided in any written license agreement from Intel Corporation and Microsoft Corporation. Intel and Microsoft do not make any representation or warranty regarding specifications in this document or any product or item developed based on these specifications. Intel and Microsoft disclaim all express and implied warranties, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and freedom from infringement. Without limiting the generality of the foregoing, Intel and Microsoft do not make any warranty of any kind that any item developed based on these specifications, or any portion of a specification, will not infringe any copyright, patent, trade secret, or other intellectual property right of any person or entity in any country.
    [Show full text]