Encryption and Key Management Sample Clauses

Encryption and Key Management. All communications must be encrypted in-transit between environments.
AutoNDA by SimpleDocs
Encryption and Key Management. 9.1. Graylog uses industry-standard encryption techniques to encrypt Customer Content in transit. The Graylog System is configured by default to encrypt user data files using transport layer security (TLS) encryption for web communication sessions.
Encryption and Key Management. ● Datadog maintains policies and procedures for the management of encryption mechanisms and cryptographic keys in Datadog’s cryptosystem. ● Datadog enlists encryption at rest and in transit between public networks, as applicable, according to industry- standard practice.
Encryption and Key Management. CDW recognizes that some information requires heightened security. Accordingly, we encrypt certain sensitive information, including information classified as Confidential or Highly Confidential, at rest and/or in transit, based on the information classification and encryption policies. CDW uses industry-standard methods of cryptography and maintains detailed key management processes to ensure that keys are securely managed and appropriately protected.
Encryption and Key Management. UnitedLayer maintains policies and procedures for the management of encryption mechanisms and cryptographic keys in UnitedLayer’s cryptosystem. • UnitedLayer enlists encryption at rest and in transit between public networks, as applicable, according to industry-standard practice.
Encryption and Key Management. CSS encrypts work documents when they are stored in the personal cloud, allowing the enterprise to set policies that prevent unauthorized use.
Encryption and Key Management. Third Party shall have a policy and process for managing encryption keys which shall include security requirements for key creation, use, storage, and protection. Third Party shall use industry standard encryption technologies for data contained within, accessed by, or transmitted through the Third Party Systems.
AutoNDA by SimpleDocs

Related to Encryption and Key Management

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Staffing There shall be a clinician employed by the outside contractor for EAP Services who will be on-site a minimum of 20 hours a week. The clinician shall report directly to the outside contractor, Peer Assistance Oversight Committee and the MIF liaison. There shall be three full-time Peer Assistants reporting to the outside contractor.

  • Contract Management To ensure full performance of the Contract and compliance with applicable law, the System Agency may take actions including:

Time is Money Join Law Insider Premium to draft better contracts faster.