The organization has to execute data transfers in public network using encrypted or otherwise protected data transfer connection or procedure, if the data is confidential.
The data transfer also has to be set up in a way where recipient can be identified securely enough before recipient can access any confidential data.
Information included in application services transmitted over public networks must be protected against fraudulent and non-contractual activity and against unauthorized disclosure and alteration.
We use strong encryption and security protocols (eg TLS, IPSEC, SSH) to protect confidential information when it is transmitted over public networks in connection with the IT services we develop.