Key Management Clause Samples
The Key Management clause outlines the procedures and responsibilities for handling cryptographic keys used to secure data. It typically specifies how keys are generated, stored, distributed, rotated, and destroyed, and may require the use of secure hardware or software solutions to prevent unauthorized access. By establishing clear protocols for key management, this clause helps ensure the confidentiality and integrity of sensitive information, reducing the risk of data breaches or unauthorized disclosures.
POPULAR SAMPLE Copied 6 times
Key Management. Servicer shall document, implement, and maintain enterprise-class Industry Standard encryption key and seed management procedures to ensure the integrity, security, and retrieval of any applicable Cellco encryption keys or Cellco encrypted data. These procedures should include generating, distributing, storing, changing, recovering, archiving, and destroying encryption keys and the implementation of periodic key rotation, revocation (at least annually or in the event of compromise), and dual knowledge (such that one person does not have the full key for any data encrypted at rest).
Key Management. Where encryption is utilized, Convercent will maintain a key management process that meets the following minimum requirements:
a. At least one key custodian must be officially designated.
b. Key custodians must ensure that all keys used in a storage encryption solution are secured and managed properly to support the security of the solution.
c. Key management must be planned to include secure key generation, use, storage and revocation.
d. Key management practices must support the recovery of encrypted data if a key is inadvertently disclosed, destroyed or becomes unavailable.
e. Key custodians must ensure that access to encryption keys is properly restricted to approved administrators. Private keys must not be stored on the same media and/or virtual instance as the data they protect.
f. Authentication must be required in order to gain access to keys.
g. Keys should be rotated annually and must be replaced before they expire.
Key Management. Encryption keys are used all around the hosted software application that are used to provide the Service. They are used for secure storage, secure transport, for token generation, and for authentication. The hosted software application used to provide the Service does not utilize a single centralized key-store, for both architecture and security reasons. Different keys are stored by different means in accordance with their availability and security requirements.
Key Management. The Content Protection System must protect all CSPs. CSPs shall include, without limitation, all keys, passwords, and other information which are required to maintain the security and integrity of the Content Protection System. CSPs shall never be transmitted in the clear or transmitted to unauthenticated recipients (whether users or devices.
Key Management. The Contractor must have measures for managing keys and detecting any compromise/unauthorised access in its key system.
Key Management. Tenants shall not place any additional locks upon doors of the Premises, nor shall any existing lock be altered, without the prior written consent of the Landlord. Tenant shall not make duplicate keys. If more keys are desired for any lock, Landlord shall secure such additional keys at the expense of Tenants. If Tenants do not return all keys to Landlord upon the expiration or earlier termination of this Agreement, Tenants will be charged for the expense of changing the applicable locks. If a Tenant locks himself or herself out of the Premises, Tenant shall contact Landlord for emergency access and any such Tenant will be assessed a Twenty-Five Dollar ($25) fee per occurrence.
Key Management. Key management of the Guarantor and its subsidiaries (including the Initial Acquired Business) will have entered into customary agreements containing terms and conditions acceptable to Lender including among other things, non-competition, non-solicitation and confidentiality provisions.
Key Management. The death, disability, or failure of either ▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇ or ▇▇▇▇▇ ▇▇▇▇▇▇▇▇ at any time to exercise that authority and discharge those management responsibilities with respect to the Borrower as are exercised and discharged by such Persons at the execution of this Agreement, and the failure of the Borrower to appoint a successor reasonably acceptable to the Agent within one hundred twenty (120) days following such cessation.
Key Management. Supplier shall support the use of cryptographic techniques with the practice of key management. All cryptographic keys shall be protected against modification, loss, and destruction. Secret and private keys shall require protection against unauthorized disclosure, and all cryptographic keys shall be limited to the fewest number of custodians necessary. Equipment used to generate, store, and archive keys shall be physically protected, and encryption keys shall be stored separately from encrypted data.
Key Management. The Borrower shall employ individuals in the key management positions of Chairman, President and Chief Financial Officer and shall use its best efforts to cause such key managers to continue to serve in their respective capacities. In the event of the voluntary or involuntary termination of any key manager for any reason, the Borrower shall, as soon as practicable, replace such individual with another qualified manager with comparable management skills and experience in the Borrower's industries and reasonably satisfactory to the Agents.