Which Requirements Apply When Transmitting Secret Information