Storage and Transmission Security Clause Samples
The Storage and Transmission Security clause establishes requirements for protecting data both when it is stored and when it is transmitted between systems or parties. Typically, this clause mandates the use of encryption, secure protocols, and access controls to safeguard sensitive information from unauthorized access or breaches. By setting these standards, the clause helps ensure that confidential or personal data remains secure throughout its lifecycle, thereby reducing the risk of data leaks and maintaining compliance with privacy regulations.
Storage and Transmission Security. Security measures to guard against unauthorized access to Customer Data or Professional Services Data that is being transmitted over a public electronic communications network or stored electronically. Such measures include requiring encryption of any Customer Data or Professional Services Data stored on desktops, laptops or other removable storage devices.
Storage and Transmission Security technical security measures (e.g. state-of-the-art firewalls) designed to guard against unauthorized access to Confidential Information or Personal Data that is being transmitted over an electronic communications network, including a mechanism to encrypt electronic information whenever appropriate, such as while in transit or in storage on networks or systems to which unauthorized individuals may have access.
Storage and Transmission Security. Technical security measures to guard against unauthorized access to Raytheon Data that is being transmitted over an electronic communications network, including a mechanism to encrypt electronic information whenever appropriate, such as while in transit or in storage on networks or systems to which unauthorized individuals may have access.
Storage and Transmission Security. Abnormal will logically segregate Customer Data from all other Abnormal or third- party data. Abnormal will: (a) securely store Customer Data; (b) encrypt Customer Data during transmission using, at a minimum, Transport Layer Security (TLS) protocol version 1.2 or above; and (c) encrypt Customer Data at rest using, at a minimum, the Advanced Encryption Standard (AES) 256-bit encryption protocol. Abnormal will establish encryption key management processes that are designed to ensure the secure generation, storage, distribution, and destruction of encryption keys. Abnormal will not store Customer Data on any removable storage devices or other similar portable electronic media.
Storage and Transmission Security. (a) Customer data is stored in multi-tenant datastores.
(b) All data sent to or from Intercom is encrypted in transit using TLS 1.2.
(c) Customer Personal Data is encrypted at rest using 256-bit encryption, leveraging AWS' encryption framework’s model C as described in ▇▇▇▇▇://▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/whitepapers/aws-securing-data-at-rest-with- encryption.pdf
(d) All Intercom datastores used to process Customer data are configured and patched using commercially reasonable methods according to industry-recognized system-hardening standards.
Storage and Transmission Security. You will have security measures to guard against unauthorized access to RingCentral Personal Information that is being transmitted over a public electronic communications network or stored electronically. Such measures include requiring encryption of any RingCentral Personal Information stored on desktops, laptops, smartphones, tablets and other mobile devices and removable storage media.
Storage and Transmission Security a. Industry-standard encryption technologies are used for data contained within, accessed by, or transmitted through the SMA system. Customer data is encrypted in transit and at rest.
b. Encryption keys are stored and transferred securely during the sign-in process using industry-standard encryption technology.
c. Customer file data transmitted to SMA is verified at multiple points after encryption at the source to provide destinations the ability to detect tampering or corruption.
Storage and Transmission Security. Processor has technical security measures to guard against unauthorized access to Personal Data that is being transmitted over an electronic communications network, including a mechanism to encrypt Personal Data in electronic form while in transit and in storage on networks or systems to which unauthorized individuals may have access.
Storage and Transmission Security. A10 maintains technical security measures to guard against unauthorized access to User Data that is being transmitted over an electronic communications network. A10 will:
8.1. maintain a working and up-to-date network firewall to protect data accessible via the Internet;
8.2. use anti-malware software at all times and will keep the anti-malware software up-to-date;
8.3. maintain technical and security measures to encrypt User Data in transit and at rest;
8.4. regularly review access logs for signs of malicious behavior or unauthorized access;
8.5. keep A10’s systems and software up-to-date with the latest applicable upgrades, updates, new versions and other modifications necessary to ensure security of User Data.
Storage and Transmission Security. All User Data that are collected, stored or otherwise maintained by the Supplier pursuant to this Agreement shall be maintained in a secure environment that meets the requirements set out in Article 32 of the GDPR. The Supplier shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including: (a) where appropriate, the pseudonymisation and/or encryption of personal data; (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; and (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.