Encrypted Storage Clause Samples

Encrypted Storage. All Cellco Highly Confidential Information must be stored only using Storage Encryption.
Encrypted Storage. In certain circumstances, users of Zoom’s services may elect to store encrypted text-based chat message communications sent over Zoom’s servers. In all cases, the encryption keys to such communications are retained only by the persons using Zoom’s services and Zoom does not have encryption keys for any content communicated between persons using its services when those services are subject to a Business Associate Agreement.
Encrypted Storage. Just In Time, role controlled access
Encrypted Storage. All data, including PII and education records, is stored on encrypted storage infrastructure, such as Azure encrypted storage.
Encrypted Storage. All Data at rest shall be encrypted using a minimum of industry standard 256-bit. • Passwords. Privileged user passwords will meet the following complexity and age requirements: o Minimum 15 characters including 2 upper, 2 lower, 2 numbers, 2 special characters o Expire every 30 days

Related to Encrypted Storage

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Storage The ordering agency is responsible for storage if the contractor delivers within the time required and the agency cannot accept delivery.