(1) What are your views on an appropriate model for the ISDI?
(2) What constraints could there be for your organisation in adopting either of the 'extreme' models set out above?
(3) Are there security difficulties that could arise from the different models?
(4) Should some form of system that combines elements of both models be developed? If so, can you provide an idea of how such a system could be arranged?
(5) Are there alternative models that should be considered?