Previous Topic: STATUSNext Topic: LOCK


Preauthorization

The next five areas of concern are all addressed by the use of preauthorizations. They are: