Share
Consult the relevant guidance (such as a data policy or specific protocols for a given data management activity) or focal point within your organization to see which methods and tools are considered appropriate for the secure transfer of (sensitive) data. In general, a secure method or tool will enable encryption of the data in transit and at rest, offer secure authentication functionality and access restrictions, among other security features. For example, most email service providers allow you to turn on encryption of emails and their attachments.
Consult the relevant guidance (such as a data policy or specific protocols for a given data management activity) or focal point within your organization to see which methods and tools are considered appropriate for the secure transfer of (sensitive) data. In general, a secure method or tool will enable encryption of the data in transit and at rest, offer secure authentication functionality and access restrictions, among other security features. For example, most email service providers allow you to turn on encryption of emails and their attachments.