Encryption Sample Clauses

Encryption. The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.
AutoNDA by SimpleDocs
Encryption. Contractor shall use industry standard security measures including encryption protocols that comply with New York law and regulations to preserve and protect PII. Contractor must encrypt PII at rest and in transit in accordance with applicable New York laws and regulations.
Encryption. The DST Web server runs Secure Sockets Layer (“SSL”). The purpose of using SSL is to encrypt data transmissions through the VISION Web Site and the Distribution Support Services Web Site and block communications through the VISION Web Site or the Distribution Support Services Web Site from Internet browsers which do not support SSL data encryption. The standard level of encryption supported by the VISION Web Site and the Distribution Support Services Web Site is 128-bit encryption.
Encryption. Notwithstanding anything to the contrary herein, any and all communications (both text and attachments) by or from the Indenture Trustee that the Indenture Trustee in its sole discretion deems to contain confidential, proprietary, and/or sensitive information may be encrypted or made available at the Indenture Trustee’s website at xxx.xxxxxx.xxx/xxx on a password protected basis.
Encryption. All Data must be encrypted at all times unless specifically outlined otherwise in the Authorized User Agreement. At a minimum, encryption must be carried out at the most current NYS Encryption Standard (NYS-S14-007), (or successor policy(ies) with key access restricted to the Authorized User only, unless with the express written permission of the Authorized User. The Authorized User Agreement shall specify the respective responsibilities of the Authorized User and the Contractor for the encryption of Data.
Encryption. All helpdesk, online and support services which may access Data shall be performed only from locations within CONUS.
Encryption. Customer acknowledges and agrees that encryption may not be available for any or all data or communications between Customer and a BNPP Entity. Customer agrees that a BNPP Entity may, at any time, deactivate any encryption features such BNPP Entity may in its sole discretion provide, without notice or liability to Customer.
AutoNDA by SimpleDocs
Encryption. You certify that all items (including hardware, software, technology and other materials) You provide to Dell for any reason that contain or enable encryption functions either: (a) satisfy the criteria in the Cryptography Note (Note 3) of Category 5, Part 2 of the Wassenaar Arrangement on Export Controls for Conventional Arms (Wassenaar Arrangement) and Dual-Use Goods and Technologies and Category 5, Part 2 of the U.S. Commerce Control List (CCL); or
Encryption. The web servers run SSL. The purpose of using SSL is to encrypt data transmissions through the ALPS’s Web Site and block communications through the ALPS’s Web Site from Internet browsers that do not support SSL data encryption. The standard level of encryption supported by the ALPS’s Web Site is 128-bit. ALPS also uses a certificate from a major provider of server authentication services.
Encryption. The web servers run secure sockets layer (“SSL”). The purpose of using SSL is to encrypt data transmissions through the ALPS’ Web Site and block communications through the ALPS’ Web Site from Internet browsers that do not support SSL data encryption. The standard level of encryption supported by the ALPS’ Web Site is 128-bit. ALPS also uses a certificate from a major provider of server authentication services. Sensitive Fund data that is exchanged within TA Web user sessions is stored with a minimum of 128-bit encryption. This includes any data passed via URL within the application. Character validation methods are also employed to ensure that only appropriate data is passed to related databases.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!