Authoritis must carry out data transfer in a public data network using an encrypted or otherwise protected data transfer connection or method, if the data to be transferred must be kept secret. In addition, the data transfer must be organized in such a way that the recipient is verified or identified in a sufficiently secure manner before the recipient can process the transferred confidential information.