Is the pseudonymised data protected from third-party access during transmission? - LSM 3.6 Basic Online

Yes. In addition to the measures described in Chapter 2 (see System-wide measures and methods in detail), we use HTTPS transport encryption (TLS 1.2/1.3) in cloud communication between two secure endpoints (security block, secure element).