The following steps shall be considered:
entering an alert,
check for multiple alerts,
misused identity,
entering an alias,
information exchange when issuing alerts at the request of authorities responsible for State security,
adding a flag;
the exchange of information after a hit.
(1)
This text is identical to the text in the Annex to Commission Decision 2008/334/JHA (see page 41 of this Official Journal).