Compression and Encryption Sample Clauses

The Compression and Encryption clause establishes requirements for reducing data size and securing information through cryptographic methods during storage or transmission. Typically, this clause specifies the types of data that must be compressed or encrypted, outlines acceptable technologies or standards, and may assign responsibility for implementing these measures to one or both parties. Its core function is to protect sensitive data from unauthorized access and to optimize data transfer efficiency, thereby mitigating risks related to data breaches and improving system performance.
Compression and Encryption. Compression shall be used to reduce transfer times between the Registry and the Escrow agent, and to reduce storage capacity requirements. Data encryption shall be used to ensure the privacy of registry escrow data. Files processed for compression and encryption shall be in the binary OpenPGP format as per OpenPGP Message Format - RFC 4880, see [6]. Acceptable algorithms for Public-key cryptography, Symmetric-key cryptography, Hash and Compression are those enumerated in RFC 4880, not marked as deprecated in OpenPGP IANA Registry, see [7], that are also royalty-free.
Compression and Encryption. Directrix's compression and encryption of the Network by means of a Directrix-provided Encoder System and authorization computer configured as part of the Encoder System. Directrix shall provide, through GI or another Califa-approved subcontractor, maintenance and repair of the Encoder System in accordance with terms of the Encoder System Maintenance Agreement. Directrix shall be responsible for all software license fees and maintenance costs in connection with the Encoder System and authorization computer.
Compression and Encryption. Compression shall be usedProcessing of Deposit files. The use of compression is recommended in order to reduce electronic data transfer times between the Registry and the Escrow agent, and to reduce storage capacity requirements. Data encryption shallwill be used to ensure the privacy of registry escrow data. Files processed for compression and encryption shallwill be in the binary OpenPGP format as per OpenPGP Message Format - RFC 4880, see [62]. Acceptable algorithms for Public-key cryptography, Symmetric-key cryptography, Hash and Compression are those enumerated in RFC 4880, not marked as deprecated in OpenPGP IANA Registry, see Error! Reference source not found.[3], that are also royalty-free.
Compression and Encryption. Directrix's compression and encryption of the Networks by means of a Directrix-provided Encoder System and authorization computer configured as part of the Encoder System. Directrix shall provide, through GI or another Playboy-approved subcontractor, maintenance and repair of the Encoder System in accordance with terms of the Encoder System Maintenance Agreement. Directrix shall be responsible for all software license fees and maintenance costs in connection with the Encoder System and authorization computer. In the event that Playboy desires Compression and Encryption for more than two (2) Networks, then Directrix and Playboy shall negotiate in good faith to agree upon a fee for such additional Compression and Encryption. In the event Directrix and Playboy are unable to agree upon such a fee, Playboy shall have the right to independently purchase such additional Compression and Encryption equipment as would be necessary to increase the number of networks the Encoder System can compress, which Compression and Encryption equipment shall be exclusively owned by Playboy.
Compression and Encryption. Compression shall be used to reduce transfer times between the Registry and the Escrow agent, and to reduce storage capacity requirements. Data encryption shall be used to ensure the privacy of registry escrow data.

Related to Compression and Encryption

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.