Common use of Cryptography Clause in Contracts

Cryptography. 6.1. As defined by Xxxx & Xxxxxx’x Cryptography Policy, cryptographic controls are employed to protect sensitive data both whilst in transit and at rest. 6.2. Encryption on Mobile Devices is enforced via Microsoft Intune Endpoint Manager policies 6.3. PII Database encryption is in place via Thales CipherTrust (AES 256-Bit Encryption, data tokenisation and encryption services). 6.4. Database Encryption is in place using Transparent Data Encryption (TDE) AES-256 Encryption. 6.5. All traffic from/to our Public facing applications (Websites + Mobile App) utilize HTTPS certificates issued by GlobalSign Certificate Authority and are encrypted with TLS 1.2 or higher. 6.6. All backups are encrypted.

Appears in 3 contracts

Samples: Data Protection Schedule, Data Protection Schedule, Data Protection Schedule

AutoNDA by SimpleDocs

Cryptography. 6.1. As defined by Xxxx & Xxxxxx’x Cryptography Policy, cryptographic controls are employed to protect sensitive data both whilst in transit and at rest. 6.2. Encryption on Mobile Devices is enforced via Microsoft Intune Endpoint Manager policies. 6.3. PII Database encryption is in place via Thales CipherTrust (AES 256-Bit Encryption, data tokenisation and encryption services). 6.4. Database Encryption is in place using Transparent Data Encryption (TDE) AES-256 Encryption. 6.5. All traffic from/to our Public public facing applications (Websites + Mobile App) utilize HTTPS certificates issued by GlobalSign Certificate Authority and are encrypted with TLS 1.2 or higher. 6.6. All backups are encrypted.

Appears in 1 contract

Samples: Data Protection Schedule

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!