Encryption Uses Clause Samples

The 'Encryption Uses' clause defines the requirements and standards for encrypting data within the scope of an agreement. It typically specifies which types of data must be encrypted, such as personal information or confidential business records, and may outline acceptable encryption methods or technologies. By establishing clear expectations for data protection, this clause helps ensure the security of sensitive information and reduces the risk of unauthorized access or data breaches.
Encryption Uses. Customer Personal Data must be protected, and should be encrypted, while in transit and at rest. Customer Content must be protected, and should be encrypted when stored and while in transit over any network; authentication credentials must be encrypted at all times, in transit or in storage.
Encryption Uses. Company Data transmission over the public internet always utilizes encrypted channel. Encryption details are documented if transmission is automated. Approved and dedicated staff is responsible for encrypting/decrypting the data, if manual. Company Data must also be encrypted while in transit over any network. VPN transmissions are performed over an encrypted channel. Controller provides support case data in an encrypted manner to processor. Case resolution is done in a secured environment. 60 days after case is closed, support case data is deleted. All access to the data centers where Company data is stored, is restricted to ASCI’s IT Operations Team according to ASCI Information Access Control Policies (ASCI follows the principle of least privilege and only grants access based on role and business use case). Access rights are reviewed regularly or upon change of role/termination of an employee. Access to the environment where Company data is stored is strictly controlled and monitored. Company is responsible for managing access to their subscription data and are responsible for the lifecycle of those accounts. Company Subscription Administrators are responsible for user administration and related password policies within the application. The Company is responsible for the lifecycle of this account. Work is done in secure environment; data transfer is secured. Deletion of data after closing of sup- port case.

Related to Encryption Uses

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Data Encryption 2.1. For all COUNTY data, The CONTRACTOR shall encrypt all non-public data in transit regardless of the transit mechanism. 2.2. For all COUNTY data, if the CONTRACTOR stores sensitive personally identifiable or otherwise confidential information, this data shall be encrypted at rest. Examples are social security number, date of birth, driver’s license number, financial data, federal/state tax information, and hashed passwords. 2.3. For all COUNTY data, the CONTRACTOR’S encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements as outlined at ▇▇▇▇://▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.