Hardware Security Module definition
Examples of Hardware Security Module in a sentence
Contract for the Purchase & Sale of Solar Energy and Conveyance of Renewable Attributes and Related Capacity, dated as of February 5, 2010, between Developer and the Authority.
The Connecting Transmission Owner and Interconnection Customer have executed a Contract for the Purchase & Sale of Renewable Energy, Related Capacity and Renewable Attributes, fully executed on April 16, 2018 (“Purchase and Sale Agreement”).
This prohibition applies to both internal and external sources who do not have a “need-to-know.” SSA recommends that EIEPs use either Trusted Platform Module (TPM) or Hardware Security Module (HSM) technology solutions to encrypt data at rest on hard drives and other data storage media.
Contractor shall also ensure that the encryption key(s) are not stored with the encrypted data and are secured by a Hardware Security Module (“HSM”).
OBLIGATIONS AND DELIVERIES Delivery and Sale of Products Seller shall, in accordance with Sections 3.1.1 and 3.1.2, as applicable, sell and deliver to Buyer at the Delivery Point all Energy produced by the Project during the Term, and convey to Buyer all Related Capacity and Renewable Attributes associated with and attributable to such Energy, and Buyer shall purchase all such Energy.
Buyer shall be free to use or resell Products and Related Capacity without restriction and to retain all proceeds from any such sales.
The Hardware Security Module (HSM) used for the creation of keys used by ESCB-PKI Online CA is pursuant to FIPS 140-2 Level 3.
Seller shall ensure that the Project and its provision of Energy and Related Capacity under this Agreement conforms to all applicable NYISO Rules, all applicable rules for the Connecting Transmission Owner’s Electrical System, and the Operating Instructions.
Hardware Security Module (HSM) The Electronic Signature Product used by Qualified Trust Service Providers that is protected against modification and ensures technical and cryptographic security (A hardware unit that stores cryptographic keys to keep them private while ensuring they are available to those authorized to use them).
The University may purchase and maintain insurance on behalf of any person who is or was a Trustee, director, officer, partner, member, manager, employee, fiduciary or agent of the University or who is or was serving at the request of the University in Another Related Capacity.