Data Transmission Controls Clause Samples

POPULAR SAMPLE Copied 9 times
Data Transmission Controls. Processes, procedures, and controls must be documented, reviewed, and approved, with management oversight, on a periodic basis, to ensure data integrity during transmission and to validate that the data transmitted is the same as data received.
Data Transmission Controls. In-transit: We implement encryption on all data communication (logins, customer sites) using NIST based cryptographic algorithms. All web traffic is via https with TLS. At-rest: We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.
Data Transmission Controls. Except as necessary for the provision of the NT-ware Services in accordance with the relevant Agreement, Personal Data must not be read, copied, modified or removed without authorization during transfer. Where data carriers are physically transported, adequate measures are implemented at NT-ware to provide the agreed-upon service levels (for example, encryption and lead-lined containers). Measures: a. Personal Data in transfer over NT-ware internal networks is protected according to NT-ware Security Policy. Network segmentation is in place to ensure isolation between low and high security infrastructure. b. When data is transferred between NT-ware and its customers this is always conducted across secure encryption transport protocols. In any case, the Customer assumes responsibility for any data transfer once it is outside of NT-ware-controlled systems (e.g. data being transmitted outside the firewall of the NT-ware Infrastructure).

Related to Data Transmission Controls

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128-bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data. b. User Access - DST shall have a process to promptly disable access to Fund Data by any DST personnel who no longer requires such access. DST will also promptly remove access of Fund personnel upon receipt of notification from Fund.