The information system maintains the [one or more of confidentiality/integrity] of information during preparation for transmission and during reception.
Supplemental
Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission or during reception including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information.