Common use of Cryptography Clause in Contracts

Cryptography. The application uses PBKDF2-HMAC-SHA512 hashing algorithm for storing the hashes of users’ pass- words and authentication tokens. The cloud service does not encrypt any data with public-key or symmetric-key algorithms. SSL versions lower than 3.0 are prevented from accessing the service. At the moment the service supports encryption protocols TLS 1.2, TLS 1.1 and TLS 1.0. SSLv3 and SSLv2 are all supported. TLS 1.0 support will be removed by the end of 2020. From Iris AI’s security documentation: Continuous Protection keeps data safe on SQL Server 2019. Every change to your data is written to write-ahead logs, which are shipped to multi-datacen- ter, high-durability storage. In the unlikely event of unrecoverable hardware fail- ure, these logs can be automatically ‘replayed’ to recover the database to with- in seconds of its last known state. We also provide you with the ability to backup your database to meet your own backup and data retention requirements.

Appears in 1 contract

Samples: Data Processing Agreement

AutoNDA by SimpleDocs

Cryptography. The application uses PBKDF2-HMAC-SHA512 hashing algorithm for storing the hashes of users’ pass- words passwords and authentication authen- tication tokens. The cloud service does not encrypt any data with public-key or symmetric-key algorithms. SSL versions lower than 3.0 are prevented from accessing the service. At the moment the service supports encryption protocols TLS 1.2, TLS 1.1 and TLS 1.0. SSLv3 and SSLv2 are all supported. TLS 1.0 support will be removed by the end of 2020. From Iris AI’s security documentation: Continuous Protection keeps data safe on SQL Server 2019. Every change to your data is written to write-ahead logs, which are shipped to multi-datacen- terdatacenter, high-durability storage. In the unlikely event of unrecoverable hardware fail- urefailure, these logs can be automatically ‘replayed’ to recover the database to with- in within seconds of its last known state. We also provide you with the ability to backup your database to meet your own backup and data retention requirements.

Appears in 1 contract

Samples: Data Processing Agreement

Cryptography. The application uses PBKDF2-HMAC-SHA512 hashing algorithm for storing the hashes of users’ pass- words passwords and authentication tokens. The cloud service does not encrypt any data with public-key or symmetric-key algorithms. SSL versions lower than 3.0 are prevented from accessing the service. At the moment the service supports encryption protocols TLS 1.2, TLS 1.1 and TLS 1.0. SSLv3 and SSLv2 are all supported. TLS 1.0 support will be removed by the end of 2020. From Iris AI’s security documentation: Continuous Protection keeps data safe on SQL Server 2019. Every change to your data is written to write-ahead logs, which are shipped to multi-datacen- terdatacenter, high-durability storage. In the unlikely event of unrecoverable hardware fail- urefailure, these logs can be automatically ‘replayed’ to recover the database to with- in within seconds of its last known state. We also provide you with the ability to backup your database to meet your own backup and data retention requirements.

Appears in 1 contract

Samples: Privacy Policy

AutoNDA by SimpleDocs

Cryptography. The application uses PBKDF2-HMAC-SHA512 hashing algorithm for storing the hashes of users’ pass- words passwords and authentication authen- tication tokens. The cloud service does not encrypt any data with public-key or symmetric-key algorithms. SSL versions lower than 3.0 are prevented from accessing the service. At the moment the service supports encryption protocols TLS 1.2, TLS 1.1 and TLS 1.0. SSLv3 and SSLv2 are all supported. TLS 1.0 support will be removed by the end of 2020. From Iris AI’s security documentation: Continuous Protection keeps data safe on SQL Server 2019. Every change to your data is written to write-ahead logs, which are shipped to multi-datacen- terdatacenter, high-durability storage. In the unlikely event of unrecoverable hardware fail- urehard- ware failure, these logs can be automatically ‘replayed’ to recover the database to with- in within seconds of its last known state. We also provide you with the ability to backup your database to meet your own backup and data retention requirements.

Appears in 1 contract

Samples: Data Processing Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!