You will probably have to give more information.
There are several different types of ECC methods, and inside these, there are a couple of different elliptic curves you can choose from, and some of them are standardized requirements for certain applications.
Furthermore, ECC is often used as a tool in a larger toolbox. It's used to agree on a (shared) secret key for an underlying block or stream cipher, and in some situations also for agreeing on message authentication (which protects the message integrity against tampering).
Getting this toolbox / tooling construction wrong can result in the proposed solution being insecure, so beware.