This chapter describes the requirements that apply to the information security measures that are implemented.