Cryptographic controls. The Contractor should put in place an appropriate policy on the use of encryption, plus cryptographic authentication and integrity controls such as digital signatures and message authentication codes, and cryptographic key management.
Appears in 5 contracts
Samples: Terms and Conditions of Purchase of Goods, Terms and Conditions of Purchase of Services, Terms and Conditions of Purchase of Services