Is it safe to use the internet dialog?

  • Share
    Two clicks for more data privacy: click here to activate the button and send your recommendation. Data will be transfered as soon as the activation occurs.
  • Read out

Security and encryption

Is the transmission of my personal data secure?
Your connection to the server used for the shareholders' meeting services offered by Deutsche Telekom is established via SSL (Secure Socket Layer) with 128-bit encryption. I.e. personal data such as passwords and so on cannot be viewed by any third party over the Internet during the session.

How safe is it to receive shareholders' meeting documents by e-mail?
E-mails sent on the Internet are normally not encrypted. We cannot guarantee security on the general Internet here. However, the shareholders' meeting invitation sent by e-mail do not contain any personal data. You can, of course, opt to have your shareholders' meeting invitations sent by encrypted e-mail. We will then require your public PGP certificate, which you can make available to us at http://www.telekom.com/hv-service

What is SSL?
SSL stands for Secure Socket Layer and is an extension to standard information transmission over the Internet. The function of this extension involves the exchange of an encryption logarithm and a session key between the Internet server and your own computer prior to transmission of the actual data. Only when this has taken place is the application data itself transmitted. It is encrypted in compliance with the previously "agreed" procedure and is therefore protected from access by third parties. Whenever a site is visited whose URL (Uniform Resource Locator) begins with https:// instead of the usual http://, it is potentially a secure site. Normally, SSL is transparent for the user. The first time a secure site is used by a web server, browser and server negotiate the requested or possible encryption. The defined encryption is used again for the following sites that are requested.

How does SSL work?
SSL uses certificates for authentication. Central offices in charge of the commercial operation of certification services manage the so-called root certificates that can be recognized by the browser (the key for recognizing these certificates is provided for the browser by the manufacturer). These certification offices grant temporary subcertificates to website operators confirming the authenticity of the services they offer. From a technical point of view, subcertificates are granted in accordance with the public key procedure. The encryption is initiated by the browser. It generates a session key that is sent to the server with the key that belongs to the certificate. This server, in turn, divides the key into a server key and a client key, sends the client key back to the browser and from then on encrypts the data with the server key in the exact same way as the browser does with the client key.

How can I check encryption strength?
To check the encryption strength of the link to the Internet Dialog, please click on the lock symbol in the address or status bar in your browser.