Encryption and Key Management Sample Clauses

Encryption and Key Management. All communications must be encrypted in-transit between environments.
AutoNDA by SimpleDocs
Encryption and Key Management. 9.1. Graylog uses industry-standard encryption techniques to encrypt Customer Content in transit. The Graylog System is configured by default to encrypt user data files using transport layer security (TLS) encryption for web communication sessions.
Encryption and Key Management. CDW recognizes that some information requires heightened security. Accordingly, we encrypt certain sensitive information, including information classified as Confidential or Highly Confidential, at rest and/or in transit, based on the information classification and encryption policies. CDW uses industry-standard methods of cryptography and maintains detailed key management processes to ensure that keys are securely managed and appropriately protected.
Encryption and Key Management. Datadog maintains policies and procedures for the management of encryption mechanisms and cryptographic keys in Datadog’s cryptosystem. • Datadog enlists encryption at rest and in transit between public networks, as applicable, according to industry- standard practice.
Encryption and Key Management. CSS encrypts work documents when they are stored in the personal cloud, allowing the enterprise to set policies that prevent unauthorized use.
Encryption and Key Management. Third Party shall have a policy and process for managing encryption keys which shall include security requirements for key creation, use, storage, and protection. Third Party shall use industry standard encryption technologies for data contained within, accessed by, or transmitted through the Third Party Systems.
Encryption and Key Management. UnitedLayer maintains policies and procedures for the management of encryption mechanisms and cryptographic keys in UnitedLayer’s cryptosystem. • UnitedLayer enlists encryption at rest and in transit between public networks, as applicable, according to industry-standard practice.
AutoNDA by SimpleDocs
Encryption and Key Management. ▪ Apollo maintains policies and procedures for managing encryption mechanisms and cryptographic keys within Apollo's cryptosystem. ▪ Apollo employs industry-standard encryption practices for data at rest and in transit across public networks, as applicable.

Related to Encryption and Key Management

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • Administration and Risk Management Employees of Federated Advisory Services Company provide support to portfolio managers and other employees of affiliated advisers. Such services may include development of risk management programs, production of portfolio and compliance reports for clients and/or fund Boards, coordination of client portfolios and related fixed income trade execution implementation and administration, completion of required broker and custody documentation, development and documentation of operational procedures, coordination of proxy voting activities, on-site support of hardware and software, etc.”

  • Communications and Operations Management a. Network Penetration Testing - DST shall, on approximately an annual basis, contract with an independent third party to conduct a network penetration test on its network having access to or holding or containing Fund Data. DST shall have a process to review and evaluate high risk findings resulting from this testing.

  • Staffing There shall be a clinician employed by the outside contractor for EAP Services who will be on-site a minimum of 20 hours a week. The clinician shall report directly to the outside contractor, Peer Assistance Oversight Committee and the MIF liaison. There shall be three full-time Peer Assistants reporting to the outside contractor.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Contract Management To ensure full performance of the Contract and compliance with applicable law, the System Agency may take actions including:

  • Incident Event and Communications Management a. Incident Management/Notification of Breach - DST shall develop, implement and maintain an incident response plan that specifies actions to be taken when DST or one of its subcontractors suspects or detects that a party has gained material unauthorized access to Fund Data or systems or applications containing any Fund Data (the “Response Plan”). Such Response Plan shall include the following:

  • Relationship Management LAUSD expects Contractors and their Representatives to ensure that their business dealings with and/or on behalf of LAUSD are conducted in a manner that is above reproach.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!