Application Encryption Sample Clauses

Application Encryption. If End User is transmitting DHHS data containing Confidential Data between applications, the Contractor attests the applications have been evaluated by an expert knowledgeable in cyber security and that said application’s encryption capabilities ensure secure transmission via the internet.
AutoNDA by SimpleDocs
Application Encryption. The Contractor will provide: i. Encryption of database columns and indexes for data at rest. ii. Encryption of flat files at rest and in motion. iii. Network encryption at the session layer (or lower) to secure communication streams that traverse un-trusted networks; and to provide encryption for sensitive data in motion across any network. iv. Field-level encryption so custom applications can secure pertinent information within a communication stream. v. Key management for secure creation, storage, and retrieval of encryption keys. The Contractor will utilize transparent data encryption (TDE) a full-database-level bulk encryption technique for all data at rest. The Contractor will ensure any data that is written into the database file is encrypted including all database columns and indexes and that data that is in use is not encrypted. Data in motion will be protected by the SSL/TLS protocol standard between the server and any browser clients consuming or writing data over untrusted networks. The Contractor’s database schema will include several instances where cell or field-level encryption will be implemented for those scenarios where the database is accessed by a non- browser based custom application that may or may not be protected over a secure protocol or has the potential of storing data locally for later use. The Contractor will support strong asymmetric keys for encryption approach.
Application Encryption. If ENTITY is transmitting DHHS data containing Confidential Data between applications ENTITY shall ensure the applications are evaluated by a vendor knowledgeable in cyber security and that said application’s encryption capabilities ensure secure transmission via the internet prior to transmission.

Related to Application Encryption

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Mobile Application If Red Hat offers products and services through applications available on your wireless or other mobile Device (such as a mobile phone) (the "Mobile Application Services"), these Mobile Application Services are governed by the applicable additional terms governing such Mobile Application Service. Red Hat does not charge for these Mobile Application Services unless otherwise provided in the applicable additional terms. However, your wireless carrier's standard messaging rates and other messaging, data and other rates and charges will apply to certain Mobile Application Services. You should check with your carrier to find out what plans your carrier offers and how much the plans cost. In addition, the use or availability of certain Mobile Application Services may be prohibited or restricted by your wireless carrier, and not all Mobile Application Services may work with all wireless carriers or Devices. Therefore, you should check with your wireless carrier to find out if the Mobile Application Services are available for your wireless Device, and what restrictions, if any, may be applicable to your use of such Mobile Application Services.

  • Application Procedures i) An employee applies for a listing on the system-wide registry through the employee’s Human Resources Department by completing the form in Appendix A. ii) The institution will immediately forward the completed form to the PSEA who will list eligible employees on the system-wide registry. iii) A registrant is responsible to ensure the information is current and to immediately notify the Employer and the local Union if the registrant is no longer available for employment through the Registry.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Application Process The employees wishing to enter into a job share arrangement will apply in writing to the Employer and forward a copy to the Union outlining the proposed commencement date of the job share, how the hours and days of work will be shared and how communication and continuity of work will be maintained. The Employer shall communicate a decision on a job share request in writing to the applicants. Applications to Job Sharing shall not be unreasonably denied.

  • Application Submission Submissions of a rental application does not guarantee approval or acceptance. It does not bind us to accept the application or to sign a Lease contact.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!