Technical Strategies
? Replacement noncompliant applications with compliant ones (e.g., new versions of packages)
? Repair noncompliant applications (e.g., in-house applications)
? Terminate noncompliant programs on an as-needed basis
? Mask the data exchange between applications
? Object code interception