- Lack of user management capabilities (uncontrolled access) for example:
▪ Anonymous Access
▪ Absence of user session management
- Tampering of e-invoices or their associated notes or logs
- Multiple Electronic Invoice sequences
- For additional details on the prohibited functionalities, please refer to Annex (1) “Technical Requirements of E-invoice Generation Solutions” in the resolution.