Why Use a Fully Trusted Form?
Fully trusted forms have more permissions than sandboxed forms do. For example, they can contain code that uses external objects for accessing system resources; they can use software components or Microsoft ActiveX controls that are not marked as safe for scripting; and they can use custom business logic provided by Component Object Model (COM) components. In addition, some members of the InfoPath object model are set to security level 3, which means that they can only be used in a fully trusted form. For example, to access the Microsoft Office CommandBars object, you use the CommandBars property of the InfoPath Window object to set a reference to it. Because this property is set to security level 3, it cannot be used in a form that is not fully trusted. There are two ways to convert a standard form to a fully trusted form: by registering the standard form using the RegForm tool, or by digitally signing the form. For more information about using the RegForm tool to convert a form to a