Cryptography. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard key management policies and practices designed to protect encryption keys for their entire lifetime.
Appears in 2 contracts
Samples: Data Processing Agreement, Data Processing Agreement
Cryptography. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard industry standard key management policies and practices designed to protect encryption keys for their entire lifetime.
Appears in 2 contracts
Samples: Data Processing Agreement, Data Processing Agreement
Cryptography. a) a. Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard key management policies and practices designed to protect encryption keys for their entire lifetime.
Appears in 2 contracts
Samples: Data Sharing and Confidentiality Agreement, Data Sharing/Use Agreement
Cryptography. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard industry standard key management policies and practices designed to protect encryption keys for their entire lifetime.
Appears in 1 contract
Samples: Data Processing Agreement