Cryptography. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard key management policies and practices designed to protect encryption keys for their entire lifetime.
Appears in 2 contracts
Samples: Data Processing Agreement for Jamf Customers, Data Processing Agreement for Jamf Customers
Cryptography. a) a. Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard key management policies and practices designed to protect encryption keys for their entire lifetime.
Appears in 2 contracts
Samples: Use Agreement, sdpc.a4l.org
Cryptography. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard industry standard key management policies and practices designed to protect encryption keys for their entire lifetime.
Appears in 2 contracts
Samples: Data Processing Agreement for Jamf Customers, Data Processing Agreement for Jamf Customers
Cryptography. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard industry standard key management policies and practices designed to protect encryption keys for their entire lifetime.
Appears in 1 contract