What Requirements Apply When Transmitting Secret Info