How are the secure keys and formats in smart cards handled?

 When it comes to secure keys and formats, you can look at it like this: The customer, owns that config, we just have permission to use it.  They have to authorize people to use their cards and formats.  They need to go through the company that owns it and get permission for us to create a programming card for our readers.



DISCLAIMER:

INFORMATION PROVIDED THROUGH THIS SITE IS PROVIDED TO YOU AS IS WITHOUT ANY EXPRESS REPRESENTATIONS OR WARRANTIES OF ANY KIND, AND WE MAKE NO REPRESENTATION OR WARRANTY THAT THIS SITE(OR ANY INFORMATION PROVIDED IN RESPONSE TO YOUR INQUIRY), WILL BE ACCURATE, COMPLETE, OR ERROR-FREE.

YOU AGREE THAT YOU MUST EVALUATE ALL INFORMATION AND RESPONSES, AND THAT YOU BEAR ALL RISKS ASSOCIATED WITH, THE USE OF THIS SITE, INCLUDING ANY RELIANCE ON THE ACCURACY,COMPLETENESS, OR USEFULNESS OF ANY INFORMATION OR MATERIALS MADE AVAILABLE THROUGH THIS SITE.