Encrypted Email Sample Clauses

Encrypted Email. End User may only employ email to transmit Confidential Data if email is encrypted and being sent to and being received by email addresses of persons authorized to receive such information.
AutoNDA by SimpleDocs
Encrypted Email. Advanced email encryption from Strattmont Group can satisfy all security and reporting requirements from your business, and is compatible with Microsoft Exchange. Cloud ServersOur team specializes in implementing custom cloud servers. Whether you’re implementing a new SQL database, looking to run a new piece of enterprise-grade ERP software, or installing any other cloud application, our team can help you deploy a low-cost, powerful cloud server that’s perfect for your needs! Cloud-Based Outlook Backups & Archiving – Using Microsoft Exchange, Strattmont Group can provide your company with powerful Outlook remote backups, ensuring that your most valuable data is secure and easily accessible from any device. Need a cloud computing service that’s not listed above? No problem! Get in touch with the Strattmont Group! Our team of experts has the knowledge required to manage all of your business cloud services needs – no matter how big, or how small. Hosted Exchange Cloud-based Microsoft Exchange business email accounts with assured availability, calendar, and more. ShareSync Cloud backup and file sharing that gives your staff mobility and simplicity, while offering your business controlled protection. Email Archiving xxxx://xxx.xxxxxxxxxxxxxxx.xxx/ Encrypted Email Our encrypted email service can satisfy security requirements for managing business emails and can work alone or with MS Exchange. Cloud Server Cloud applications infrastructure designed specifically for small businesses. Easily manage and access your cloud applications. Conference Calling Fast track decisions and avoid travel with simple, low-cost phone conferences. Perfect for team collaboration meetings. Outlook Backup
Encrypted Email. ENTITY shall only employ email to transmit Confidential Data if email is encrypted, being sent to, and being received by email addresses of persons authorized to receive such information.

Related to Encrypted Email

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.

  • Queries 1. If the Cardmember has any queries about any of the Charges or Transactions which appear in any Statement of Account, the Cardmember must contact AEME immediately and in any event, no later than 90 days from the date on which the Transaction or Charge was processed and debited to the Card Account. If the Cardmember fails to notify AEME of any queries or disputes within the 90 day period, then the Cardmember agrees and acknowledges that all Charges and Transactions which appear on the Statement of Account are true, accurate and correct and hereby waives any right to object, dispute or challenge, in any manner whatsoever, any such Transactions, Charges or amounts. AEME will assume all Charges and Transactions to be true, accurate and approved by the Cardmember upon the lapse of the said 90 day period.

  • Transmission and Routing of Exchange Access Traffic PURSUANT TO 251(c)(2) 13 5.1 Scope of Traffic 13 5.2 Trunk Group Architecture and Traffic Routing 13 5.3 Logical Trunk Groups 13 5.4 End Office Access 13 ARTICLE VI MEET-POINT BILLING ARRANGEMENTS 14 6.1 Meet-Point Billing Services 14 6.2 Data Format and Data Transfer 14 6.3 Errors or Loss of Access Usage Data 15 6.4 Payment 15 6.5 Additional Limitation of Liability Applicable to Meet-Point Billing Arrangements 16 ARTICLE VII BLV/BLVI TRAFFIC 16

  • Hyperlinks 12.1 You must not link to any material using or by means of the Services that would, if it were made available through the Services, breach the provisions of this Policy.

Time is Money Join Law Insider Premium to draft better contracts faster.