Cryptography. Empower uses Cryptography techniques that assist Empower with preventing the unauthorized modification of information on the recordkeeping system. Such Cryptography techniques may include but are not limited to: a. encryption of sensitive data sent across external communication lines; and b. requirement of minimum 128-bit encryption SSL encryption for web browsers.
Appears in 1 contract
Cryptography. Empower uses Cryptography cryptography techniques that assist Empower with preventing the unauthorized capture, modification of information on the recordkeeping systemor access to data or information. Empower uses standard encryption algorithms that follow up-to-date encryption standards and industry practices. Such Cryptography cryptography techniques may include but are not limited to:
a. : encryption of sensitive data sent across external communication lines; and
b. requirement of minimum 128-bit encryption SSL TLS encryption for web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.
Appears in 1 contract
Samples: Master Services Agreement
Cryptography. Empower uses Cryptography cryptography techniques that assist Empower with preventing the unauthorized capture, modification of information on the recordkeeping systemor access to data or inf ormation. Empower uses standard encryption algorithms that f ollow up-to-date encryption standards and industry practices. Such Cryptography cryptography techniques may include but are not limited to:
a. : encryption of sensitive data sent across external communication lines; and
b. requirement of minimum 128-bit encryption SSL TLS encryption for f or web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.
Appears in 1 contract
Samples: Master Services Agreement
Cryptography. Empower uses Cryptography cryptography techniques that assist Empower with preventing the unauthorized capture, modification of information on the recordkeeping systemor access to data or information. Empower uses standard encryption algorithms that follow up-to-date encryption standards and industry practices. Such Cryptography cryptography techniques may include but are not limited to:
a. : encryption of sensitive data sent across external communication lines; and
b. requirement of minimum 128-bit encryption SSL encryption for web browsers.requirement
Appears in 1 contract