Common use of Cryptography Clause in Contracts

Cryptography. Empower uses Cryptography techniques that assist Empower with preventing the unauthorized modification of information on the recordkeeping system. Such Cryptography techniques may include but are not limited to: a. encryption of sensitive data sent across external communication lines; and b. requirement of minimum 128-bit encryption SSL encryption for web browsers.

Appears in 1 contract

Samples: Wisconsin Deferred Compensation Program Contract

AutoNDA by SimpleDocs

Cryptography. Empower uses Cryptography cryptography techniques that assist Empower with preventing the unauthorized capture, modification of information on the recordkeeping systemor access to data or information. Empower uses standard encryption algorithms that follow up-to-date encryption standards and industry practices. Such Cryptography cryptography techniques may include but are not limited to: a. : encryption of sensitive data sent across external communication lines; and b. requirement of minimum 128-bit encryption SSL TLS encryption for web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.

Appears in 1 contract

Samples: Master Services Agreement

Cryptography. Empower uses Cryptography cryptography techniques that assist Empower with preventing the unauthorized capture, modification of information on the recordkeeping systemor access to data or inf ormation. Empower uses standard encryption algorithms that f ollow up-to-date encryption standards and industry practices. Such Cryptography cryptography techniques may include but are not limited to: a. : encryption of sensitive data sent across external communication lines; and b. requirement of minimum 128-bit encryption SSL TLS encryption for f or web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.

Appears in 1 contract

Samples: Master Services Agreement

AutoNDA by SimpleDocs

Cryptography. Empower uses Cryptography cryptography techniques that assist Empower with preventing the unauthorized capture, modification of information on the recordkeeping systemor access to data or information. Empower uses standard encryption algorithms that follow up-to-date encryption standards and industry practices. Such Cryptography cryptography techniques may include but are not limited to: a. : encryption of sensitive data sent across external communication lines; and b. requirement of minimum 128-bit encryption SSL encryption for web browsers.requirement

Appears in 1 contract

Samples: Comprehensive Defined Benefit and Defined Contribution Administrative and Investment Services Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!