{"version":"1.0","provider_name":"Gathering Tools - Improve the reliability and security of Excel processes","provider_url":"https:\/\/www.gathering-tools.com\/en\/","title":"Are information transmissions secure? by what ways ? - Gathering Tools - Improve the reliability and security of Excel processes","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"7FBabWYYbq\"><a href=\"https:\/\/www.gathering-tools.com\/en\/documentation\/are-information-transmissions-secure-by-what-ways\/\">Are information transmissions secure? by what ways ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.gathering-tools.com\/en\/documentation\/are-information-transmissions-secure-by-what-ways\/embed\/#?secret=7FBabWYYbq\" width=\"600\" height=\"338\" title=\"&#8220;Are information transmissions secure? by what ways ?&#8221; &#8212; Gathering Tools - Improve the reliability and security of Excel processes\" data-secret=\"7FBabWYYbq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.gathering-tools.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Security is a fundamental concern of Gathering Tools. When information is transmitted, transactions are authenticated. Authentication can be based on your corporate directory, or owner GT authentication. It is also possible to use certificates in the framework of a public key infrastructure. Transactions are secured by the https protocol. Data can be stored in an [&hellip;]"}