Secured system environment / Technical requirements

Only use the secure system environment of your company. The technical requirements are based on the IT Basic Protection Compendium:

Above all, it is important to have secure VPN access to the company network and an encrypted hard disk. Furthermore, two-factor authentication is
authentication is also a legal standard. A complete overview of all technical requirements can be found at the end of this checklist.

Technical details

All technical details for a correct technical implementation of the legal requirements can be found under the following links:

Subscribe to our newsletter

and stay always updated on data protection.