Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Secure transmission of confidential information over a data network

Critical
High
Normal
Low

Authoritis must carry out data transfer in a public data network using an encrypted or otherwise protected data transfer connection or method, if the data to be transferred must be kept secret. In addition, the data transfer must be organized in such a way that the recipient is verified or identified in a sufficiently secure manner before the recipient can process the transferred confidential information.

Connected other frameworks and requirements:
4 luku, 14 §: Tietojen siirtäminen tietoverkossa
No items found.