Automated mechanisms exist to uniquely identify and authenticate source and destination points for information transfer.
Does the organization use automated mechanisms to uniquely identify and authenticate source and destination points for information transfer?