First and foremost, one must understand that the development of standards such as Common Criteria or technologies such as Conference Connecting, have been introduced because of the need of several methods through which communication of data and its security can be assured. This is especially the case in multi-scalar environments, such as servers, networks, or even conferences. Furthermore, the Common Criteria (also known as the Common Criteria for Information Technology Security Evaluation), was developed as an international standard for evaluating computer security.

The framework imposed by the Common Criteria dictates that all the computer systems that fall within it, are able to specify the security requirements, both functional and assuring, by implementing the use of protection profiles. What this process does, is allow third party users to easily implement or make claims about the security attributes and characteristics of the products that are enlisted in the respective computing network.

In other words, the ability to provide assurance about process, product or standard specifications, can be implemented and evaluated for computer systems in a repeatable manner, and at a variable-scalar level, depending on the target environment.

Where this comes into play for connected conferences, is that it allows all the users who are currently attending the conference to be able to stay connected at all times, and perform the required evaluation processes for multiple entities or objects, at different scales, in the same network, while preserving the quality and consistency of the chosen processes.