Data Storage. Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.
Data Storage. Provider shall store all Student Data shared under the DPA within the United States.
Data Storage. Except as permitted in writing by Citizens’ Contract Manager or designee, Vendor and Vendor Staff shall not store Citizens Confidential Information on portable external storage devices or media (such as “thumb drives,” compact disks, or portable disk drives).
Data Storage. Contractor warrants that any and all State data will be stored, processed, and maintained solely on designated servers and that no such data at any time will be processed on or transferred to any portable computing device or any portable storage medium, unless that storage medium is in use as part of the Contractor's designated backup and recovery processes.
Data Storage. Operator acknowledges and agrees that all electronic data and records will not be shipped, stored, transferred, or exported outside the United States, including any backups or copies, without prior written consent from an authorized representative of the LEA.
Data Storage. The Platform and SFDC Service includes a certain cumulative amount of storage per User subscription for no additional charge. Contact Your Reseller for additional information. Additional storage may be available for purchase from the Reseller.
Data Storage. Should be capable of storing all critical data, including calibration, configuration and time of use etc. in battery backed up RAM and in non-volatile Flash RAM, which should retain the data indefinitely even when no auxiliary supply is available.
Data Storage. 10.1 The Customer may request for the Service Provider to store the Customer’s data for a period longer than six (6) months from termination or expiry of the Agreement at the Customer’s cost. The Service Provider is under no obligation to provide such assistance. Where the Service Provider agrees to such a request the parties shall agree in writing: ● the time period for the retention and storage of the Customer’s data by the Service Provider beyond expiry or termination of the Agreement; ● the time period for the destruction of the Customer’s data by the Service Provider; and ● the charges payable by the Customer to the Service Provider for such extended retention and storage of the Customer’s data.
Data Storage. 6.1. The data is stored in externalized databases that are currently being provided by MongoDB Atlas (security compliance information), and simultaneously hosted on Amazon Web Services (security and compliance information) in North Virginia (United States).
6.2. User-generated content (which may or not contain personal information) may be temporarily stored in other countries in order for Edpuzzle to provide a better service. Concretely, uploaded videos, audios or images may have a copy temporarily stored in other regions to reduce the time of load. This would happen if, for example, a user accessed Edpuzzle from Europe and displayed a video created by an American teacher. In such a case, a temporary copy of such media would be hosted on the European server Amazon Web Services has in that region.
Data Storage. Device Data and Device Specific Data is always protected using cryptographic means whenever the interfaces to it cannot be properly enumerated and protected, such as when being transmitted over a network. When the data resides in a secure location, such as on servers that are adequately controlled, it is protected using logical means as are known in the art, such as: database access lists, and file system permissions. When using cryptography, only established and/or NIST- approved algorithms and modes of operation are being used; for example, symmetric encryption is done using AES-128 or AES-256, and transport encryption is carried out using TLS and DTLS. Device Data and Device Specific Data that is stored on Internet-facing hosts is protected by network layer access control lists, which enforce a strict rule-set on incoming traffic. Anomalous activities, such as activities which can be indicative of an emerging attack, are logged and signaled for analysis and remediation.