Transmission encryption. i. All data transmissions of PII outside of a secure internal network must be encrypted using a Federal Information Processing Standard (FIPS) 140-2 certified algorithm that is 128 bit or higher, such as Advanced Encryption Standard (AES) or Transport Layer Security (TLS). It is encouraged, when available and when feasible, that 256 bit encryption be used. ii. Encryption can be end to end at the network level, or the data files containing PII can be encrypted. iii. This requirement pertains to any type of PII in motion such as website access, file transfer, and email.
Appears in 20 contracts
Sources: Contract for Family Resource Center Services, Contract for the Provision of Bringing Families Home Services, Contract for the Provision of Bridge Program Child Care Navigator, Trauma Informed Training and Coaching, and Emergency Child Care Voucher Services
Transmission encryption. i. 1. All data transmissions of PII outside of a secure internal network must be encrypted using a Federal Information Processing Standard (FIPS) 140-2 certified algorithm that is 128 bit or higher, such as Advanced Encryption Standard (AES) or Transport Layer Security (TLS). It is encouraged, when available and when feasible, that 256 bit encryption be used.
ii2. Encryption can be end to end at the network level, or the data files containing PII can be encrypted.
iii3. This requirement pertains to any type of PII in motion such as website access, file transfer, and email.
Appears in 7 contracts
Sources: Subrecipient Agreement, Subrecipient Agreement, Service Agreement
Transmission encryption. i. 1. All data transmissions of PII outside of a secure internal network must shall be encrypted using a Federal Information Processing Standard (FIPS) 140-2 certified algorithm that is 128 bit or higher, such as Advanced Encryption Standard (AES) or Transport Layer Security (TLS). It is encouraged, when available and when feasible, that 256 256-bit encryption be used.
ii2. Encryption can be end to end at the network level, or the data files containing PII can be encrypted.
iii3. This requirement pertains to any type of PII in motion such as website access, file transfer, and email.
Appears in 4 contracts
Sources: Privacy and Security Agreement, Data Privacy & Security, Data Sharing Agreement
Transmission encryption. i. All 1. Al l data transmissions of PII outside of a secure internal network must shall be encrypted using a Federal Information Info rmation Processing Standard (FIPS) 140-2 certified algorithm that is 128 bit or higher, such as Advanced Encryption Standard (AES) or Transport Layer Security (TLS)) . It is encouraged, when available and when feasible, that 256 256-bit encryption be usedu sed.
ii2. Encryption can be end to end at the network level, or the data files containing PII can be encrypted.
iii3. This requirement pertains to any type of PII in motion such as website access, file transfer, and email.
Appears in 2 contracts
Sources: Privacy and Security Agreement, Privacy and Security Agreement
Transmission encryption. i. All data transmissions of PII outside of a secure internal network must be encrypted using a Federal Information Processing Standard (FIPS) 140-2 certified algorithm that is 128 bit or higher, such as Advanced Encryption Standard (AES) or Transport Layer Security (TLS). It is encouraged, when available and when feasible, that 256 256-bit encryption be used.
ii. Encryption can be end to end-to-end at the network level, or the data files containing PII can be encrypted.
iii. This requirement pertains to any type of PII in motion such as website access, file transfer, and email.
Appears in 1 contract