Secure system environment / technical requirements
Only use the secure system environment of your company. The technical requirements are based on the IT basic protection compendium:
Above all, secure VPN access to the company network and an encrypted hard disk are important. Furthermore, two-factor
authentication is a legal standard. A complete overview of all technical requirements can be found at the end of this checklist.
Here you can find the complete newsletter article in PDF format.
Technical details
All technical details for correct technical implementation of the legal requirements can be found under the following links:




