Common use of Cryptography Clause in Contracts

Cryptography. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard key management policies and practices designed to protect encryption keys for their entire lifetime.

Appears in 2 contracts

Samples: Data Processing Agreement for Jamf Customers, Data Processing Agreement for Jamf Customers

AutoNDA by SimpleDocs

Cryptography. a) a. Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard key management policies and practices designed to protect encryption keys for their entire lifetime.

Appears in 2 contracts

Samples: Use Agreement, sdpc.a4l.org

Cryptography. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard industry standard key management policies and practices designed to protect encryption keys for their entire lifetime.

Appears in 2 contracts

Samples: Data Processing Agreement for Jamf Customers, Data Processing Agreement for Jamf Customers

AutoNDA by SimpleDocs

Cryptography. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard industry standard key management policies and practices designed to protect encryption keys for their entire lifetime.

Appears in 1 contract

Samples: Data Processing Agreement for Jamf Customers

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!