They are point to point communication devices with no intermediate storage along the way.
So from a point of view of “don’t store copies of this data except at the sender’s and receiver’s locations, which are already set up to handle sensitive data”, they meet requirements in a simple to implement manner.
They are point to point communication devices with no intermediate storage along the way.
So from a point of view of “don’t store copies of this data except at the sender’s and receiver’s locations, which are already set up to handle sensitive data”, they meet requirements in a simple to implement manner.