What Requirements Apply When Transmitting Secret Information