IT basic protectionFurther informationWhat protection requirements do the data processed in the system have?What IT infrastructure requirements are recommended?