Common use of Encryption Keys Clause in Contracts

Encryption Keys. For the security of clients’ backed up data, the C-▇▇▇▇ Client Software installed in the C-▇▇▇▇ ▇▇- CLIENT encrypts every file it sends with an encryption key provided by the client. The files are stored and remain encrypted on the C-▇▇▇▇ ▇▇-SYSTEM at all times. The decryption process occurs during recovery and is performed by the C-▇▇▇▇ ▇▇-CLIENT. This ensures that all backed up data transferred and stored outside the client location is always encrypted. The C-▇▇▇▇ ▇▇-CLIENT uses up to 256 AES encryption and can be configured with private and account encryption keys. Encryption meets National Institute of Standards and Technology (NIST) FIPS 140-2 compliance and has been validated by NIST with Certificate #1240.

Appears in 2 contracts

Sources: Service Level Agreement, Service Level Agreement

Encryption Keys. For the security of clients’ backed up data, the C-▇▇▇▇ Client Software installed in the C-▇▇▇▇ ▇▇- CLIENT -CLIENT encrypts every file it sends with an encryption key provided by the client. The files are stored and remain encrypted on the C-▇▇▇▇ ▇▇-SYSTEM at all times. The decryption process occurs during recovery and is performed by the C-▇▇▇▇ ▇▇-CLIENT. This ensures that all backed up data transferred and stored outside the client location is always encrypted. The C-▇▇▇▇ ▇▇-CLIENT uses up to 256 AES encryption and can be configured with private and account encryption keys. Encryption meets National Institute of Standards and Technology (NIST) FIPS 140-2 compliance and has been validated by NIST with Certificate #1240.

Appears in 1 contract

Sources: Service Level Agreement