Data Storage. Device Data and Device Specific Data is always protected using cryptographic means whenever the interfaces to it cannot be properly enumerated and protected, such as when being transmitted over a network. When the data resides in a secure location, such as on servers that are adequately controlled, it is protected using logical means as are known in the art, such as: database access lists, and file system permissions. When using cryptography, only established and/or NIST- approved algorithms and modes of operation are being used; for example, symmetric encryption is done using AES-128 or AES-256, and transport encryption is carried out using TLS and DTLS. Device Data and Device Specific Data that is stored on Internet-facing hosts is protected by network layer access control lists, which enforce a strict rule-set on incoming traffic. Anomalous activities, such as activities which can be indicative of an emerging attack, are logged and signaled for analysis and remediation.
Appears in 8 contracts
Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement