Data Encryption definition

Data Encryption refers to enciphering data with a NIST-approved algorithm or cryptographic module using a NIST-approved key length. Encryption must be applied in such a way that it renders data unusable to anyone but the authorized users.
Data Encryption refers to ciphers, algorithms or other encoding mechanisms that will encode data to protect its confidentiality. Data encryption can be required during data transmission or data storage depending on the level of protection required for this data.
Data Encryption means the ability to protect the integrity and authenticity of stored and/or transmitted data through the use of technologies which makes the data unreadable except for those possessing a key, right etc. to unlock/read the data;

Examples of Data Encryption in a sentence

  • Connections between all components of the Tribal Lottery System shall only be through the use of secure communication protocols which are designed to prevent unauthorized access or tampering, employing Data Encryption Standards (DES) or equivalent encryption with changeable seeds or algorithms.

  • Encryption must be through an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard or Triple Data Encryption Standard, in accordance with Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, as required by GSA policy.

  • Sessions (or files) must be encrypted with an approved NIST algorithm, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules.

  • DU7 √ Data Encryption The PROVIDER shall encrypt all non-public data in transit, regardless of transit mechanism.

  • At rest, we utilize Amazon RDS's at-rest encryption solution, Transparent Data Encryption.

  • With regard to electronic PHI not covered by the Guidance published at 74 FR 19006, the Associate will protect electronic PHI at rest and in transit through encryption that complies with State of Ohio IT Standard, ITS-SEC-01 Data Encryption and Cryptography.

  • Failure on the part of the Contractor to comply with any of the provisions of this Sub-paragraph 43.0 (Data Encryption) shall constitute a material breach of this Contract upon which the County may terminate or suspend this Contract.

  • State Data Encryption: Contractor shall store all data provided to Contractor, including State, as well as any backups made of that data, in encrypted form using no less than 128 bit key and include all data as part of a designated backup and recovery process.

  • State Data Encryption: Contractor agrees to store all data provided to Contractor, including State, as well as any backups made of that data, in encrypted form using no less than 128 bit key and include all data as part of a designated backup and recovery process.

  • With regard to electronic PHI not covered by the Guidance published at 74 FR 19006, the Associate will protect electronic PHI at rest and in transit through encryption that complies with State of Ohio IT Standard, ITS- SEC-01 Data Encryption and Cryptography.


More Definitions of Data Encryption

Data Encryption. CE shall store all TDA data in encrypted form, using a commercially supported encryption solution. CE further shall ensure that any and all TDA data defined as personally identifiable information under current regulations is likewise encrypted. Encryption solutions will be deployed with no less than a 128-bit key. Data Re-Use: CE shall ensure that any and all data exchanged shall be used expressly and solely for the purposes enumerated in the Agreement. Data shall not be distributed, repurposed, or shared across other applications, environments, or business units of CE. CE further shall ensure that no TDA data of any kind shall be transmitted, exchanged, or otherwise passed to other vendors or interested parties except as specifically required to operate the TEFAP. If data is shared with a vendor to operate the TEFAP, the same security requirements apply to the CE’s third party vendor. Any other release of information requires specific agreement in writing by TDA. End of Agreement Data Handling: Notwithstanding the recordkeeping and retention requirements in this Agreement, CE agrees that, upon termination of the Agreement, it shall erase, destroy, and render unrecoverable all TDA data; and certify in writing that these actions have been completed within 30 days of termination of this Agreement or within 7 days of the request of an authorized TDA official, whichever comes first. CE also warrants that if hardware is replaced during the Agreement period, the same destruction rules apply. The conditions in paragraph apply only to TDA-provided data. Security Breach Notification: CE shall comply with all applicable laws that require the notification of individuals in the event of unauthorized release of personal identification information or other event requiring notification. In the event of a breach of any of CE’s security obligations or other event requiring notification under applicable law, CE shall notify the following individuals within 48 hours: Information Security Officer Financial Services Division Texas Department of Agriculture ▇▇▇-▇▇▇-▇▇▇▇ Assistant Commissioner Food and Nutrition Division Texas Department of Agriculture ▇▇▇-▇▇▇-▇▇▇▇
Data Encryption. CE agrees to store all TDA data in encrypted form, using a commercially supported encryption solution. CE further agrees that any and all TDA data defined as personally identifiable information under the regulations is likewise encrypted. Encryption solutions will be deployed with no less than a 128-bit key.
Data Encryption means the translation of data into another f orm, or code, so that only people with access to a secret key or password can read the translated data.

Related to Data Encryption

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Encrypted means the transformation of data into a form which results in a low probability of assigning meaning without the use of a protective process or key.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 Security Rule at 45 CFR § 164.304, encrypt means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key. - Release: Shall have the same meaning as Disclose - LEA: As used in this DPA and all Exhibits, the term LEA shall mean the educational agency, as defined in Education Law Section 2-d, that has executed the DPA; if the LEA is a board of cooperative educational services, then the term LEA shall also include Participating School Districts for purposes of the following provisions of the DPA: Article I, Section 2; Article II, Sections 1 and 3; and Sections 1, 2, and 3 of Article III.

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.