Secure system environment / technical requirements

Only use the secure system environment of your company. The technical requirements are based on the IT basic protection compendium:

Above all, secure VPN access to the company network and an encrypted hard disk are important. Furthermore, two-factor
authentication is a legal standard. A complete overview of all technical requirements can be found at the end of this checklist.

Subscribe to the newsletter

and always up to date on data protection.