Watch this video on YouTube
What must be adequately controlled when transmitting personal information across networks?