Common security requirements for radio equipment - Part 3: Internet connected radio equipment processing virtual money or monetary value — RED Compliance Requirements
Scope
Common security requirements for radio equipment - Part 3: Internet connected radio equipment processing virtual money or monetary value
Essential Requirements Covered
| Article | Description |
|---|---|
| RED | RED cybersecurity standards also cover internet-connected radio equipment that processes virtual money or monetary value. |
How to Cite
Cite the exact standard reference and version listed in the Official Journal for the applicable directive.
Data sourced from the Official Journal. Verify current OJ publication status before citing in your Declaration of Conformity.
Related pages
More compliance requirements and references on Krono Compliance