When wireless connections are used instead of physical ones (e.g. WLAN, Bluetooth), the connection is interpreted as leaving the protected area.
In this case, the wireless communication is encrypted with an encryption solution that has no known vulnerabilities and that, according to information received from the manufacturer, supports modern encryption strengths and settings.
Data transfer also includes traffic between peripherals and terminals, i.e. wireless mice, keyboards and headphones. Wireless data transmission (e.g. wireless peripherals) protected less than the requirements for taking place inside a physically protected area can be accepted, if it can be ensured that the confidentiality of the information is not compromised through these connections.
The use of the wireless network is secured with sufficient keys and the connection traffic to the network router is encrypted. The wireless network for guest use is isolated from the company's own internal network.