Data Encryption definition
Examples of Data Encryption in a sentence
Connections between all components of the Tribal Lottery System shall only be through the use of secure communication protocols which are designed to prevent unauthorized access or tampering, employing Data Encryption Standards (DES) or equivalent encryption with changeable seeds or algorithms.
Encryption must be through an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard or Triple Data Encryption Standard, in accordance with Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, as required by GSA policy.
Sessions (or files) must be encrypted with an approved NIST algorithm, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules.
DU7 √ Data Encryption The PROVIDER shall encrypt all non-public data in transit, regardless of transit mechanism.
At rest, we utilize Amazon RDS's at-rest encryption solution, Transparent Data Encryption.
With regard to electronic PHI not covered by the Guidance published at 74 FR 19006, the Associate will protect electronic PHI at rest and in transit through encryption that complies with State of Ohio IT Standard, ITS-SEC-01 Data Encryption and Cryptography.
Failure on the part of the Contractor to comply with any of the provisions of this Sub-paragraph 43.0 (Data Encryption) shall constitute a material breach of this Contract upon which the County may terminate or suspend this Contract.
State Data Encryption: Contractor shall store all data provided to Contractor, including State, as well as any backups made of that data, in encrypted form using no less than 128 bit key and include all data as part of a designated backup and recovery process.
State Data Encryption: Contractor agrees to store all data provided to Contractor, including State, as well as any backups made of that data, in encrypted form using no less than 128 bit key and include all data as part of a designated backup and recovery process.
With regard to electronic PHI not covered by the Guidance published at 74 FR 19006, the Associate will protect electronic PHI at rest and in transit through encryption that complies with State of Ohio IT Standard, ITS- SEC-01 Data Encryption and Cryptography.