Data Protection During Transmission Sample Clauses

Data Protection During Transmission. DST shall encrypt, using an industry standard encryption algorithm, personally identifiable Fund Data when such data is transmitted.
AutoNDA by SimpleDocs
Data Protection During Transmission. Transfer Agent shall encrypt, using an industry standard encryption algorithm, personally identifiable Fund Data when such data is transmitted.
Data Protection During Transmission. State Street shall encrypt, using an industry recognized encryption algorithm, personally identifiable Client Data when in transit across public networks.
Data Protection During Transmission. State Street shall encrypt, using an industry recognized encryption algorithm, personally identifiable MFS Data when in transit across public networks, and where technically feasible, confidential MFS Data. In cases where personally identifiable MFS Data and/or confidential MFS Data is being sent via email between Client and State Street, it is agreed that Transport Layer Security (TLS) will be is implemented and will be used between the parties in lieu of requiring data encryption. And, in cases where personally identifiable MFS Data and/or confidential MFS Data is being transmitted from a State Street application or system, it is agreed that Secure File Transfer Protocol (SFTP) will be used in lieu of requiring data encryption.

Related to Data Protection During Transmission

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!