Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.
Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.
Email You acknowledge that we are able to send electronic mail to you and receive electronic mail from you. You release us from any claim you may have as a result of any unauthorised copying, recording, reading or interference with that document or information after transmission, for any delay or non-delivery of any document or information and for any damage caused to your system or any files by a transfer.
Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.
Facsimile and Email Signatures The use of facsimile signatures and signatures delivered by email in portable document format (.pdf) affixed in the name and on behalf of the transfer agent and registrar of the Partnership on certificates representing Common Units is expressly permitted by this Agreement.
pdf The vendor must download the Vendor Agreement from the attachment tab, fill in the requested information and upload the completed agreement. DO NOT UPLOAD encrypted or password protected files. The vendor must download the PRICING SPREADSHEET SHEET from the attachment tab, fill in the requested information and upload the completed spreadsheet. DO NOT UPLOAD encrypted or password protected files. Supplementary information may be scanned and uploaded. (Company information, brochures, catalogs, etc.) (PDF Format ONLY) DO NOT UPLOAD encrypted or password protected files.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Electronic Mail (E-mail If you send the Bank an e-mail message, the Bank will be deemed to have received it on the following business day. You should not rely on e-mail if you need to report an unauthorized transaction from one of your accounts or if you need to stop a payment that is scheduled to occur. • NOTE: E-mail transmissions outside of the Online Banking site are not secure. We advise you not to send us or ask for sensitive information such as account numbers, Password, account information, etc. via any general or public e-mail system. If you wish to contact us electronically, please use the e- mail link provided on our Online Banking site. Use this secure form to e-mail the Bank regarding inquiries about an electronic funds transfer error resolution, reporting unauthorized transactions, or contacting the Bank regarding other concerns of a confidential nature.
Format The data will be provided in the format specified in Specification 2 for Data Escrow (including encryption, signing, etc.) but including only the fields mentioned in the previous section, i.e., the file will only contain Domain and Registrar objects with the fields mentioned above. Registry Operator has the option to provide a full deposit file instead as specified in Specification 2.
Copies and Facsimiles This Agreement and all documents which relate thereto, which have been or may be hereinafter furnished the Lender may be reproduced by the Lender by any photographic, microfilm, xerographic, digital imaging, or other process, and the Lender may destroy any document so reproduced. Any such reproduction shall be admissible in evidence as the original itself in any judicial or administrative proceeding (whether or not the original is in existence and whether or not such reproduction was made in the regular course of business). Any facsimile which bears proof of transmission shall be binding on the party which or on whose behalf such transmission was initiated and likewise shall be so admissible in evidence as if the original of such facsimile had been delivered to the party which or on whose behalf such transmission was received.