- System needs to cope with loss of network, power, or air
- System should not be accessable by unauthorised people
- Only one person should access system at a time
- System needs to cope with loss of network, power, or air
- System should not be accessable by unauthorised people
- Only one person should access system at a time