Encryption Tools Clause Samples

The 'Encryption Tools' clause establishes requirements for the use of encryption technologies to protect sensitive data. It typically mandates that parties use specific encryption standards or approved tools when storing, transmitting, or processing confidential information, such as customer data or proprietary business records. By setting these requirements, the clause helps ensure data security and compliance with privacy regulations, thereby reducing the risk of unauthorized access or data breaches.
POPULAR SAMPLE Copied 1 times
Encryption Tools. The public/private key pair used for both encryption and signing are simply keys. They can’t do anything on their own. In order actually encrypt and sign messages/data you will need an encryption tool. Customers that wish to take advantage of SET will need to source a suitable encryption tool compliant with RFC4880 (e.g. PGP Desktop v9.5) which applies the appropriate keys for encryption and decryption. The Client will validate that the file(s) are correctly named and checked .• We will provide you with a username and password to connect to the Government Gateway.• We will ensure that endpoints (your location and our location) are recognised and validated (via mutual TLS Certificates).• We will ensure that the data transmission tunnel is encrypted.• We will provide you with our Public-Keys.• We will validate that all data is signed and encrypted.• We will ensure that the data file names are time stamped to ensure uniqueness.• We will guide you through the initial set-up process with our dedicated “onboarding” team and ensure that you are ready in good time before submission. • A Browser Interface running Internet Explorer v6.0 or higher connected to the internet. • An email facility to receive notifications. • A signing/encryption tool compliant with ▇▇▇ ▇▇▇▇, such as PGP Desktop v9.5. • Tools to generate certificate signing requests (CSR’s) such as OpenSSL. • A nominated digital Certificate Authority (CA) where you would source your digital certificates. • A Public/Private Key Certificate for data signing • A Public/Private Key Certificate for data encryption. • Be able to install the client certificate for TLS authentication on their client machine(s). • Perimeter firewall(s) should be configured (if needed) to exchange encrypted traffic (HTTPS) with the GGW live environment. • Supply root and interim root certificates to enable Public Key verification.

Related to Encryption Tools

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.