State of the art security for encrypted communication should be used. Cryptographic keys should also be stored in a secure location. Random number generation should be employed for encryption.
Click on the paperclip or four line icons to access more information about the source document and provision information.
Download this data
Download a copy of this map