Encryption and Key Management. 9.1. Graylog uses industry-standard encryption techniques to encrypt Customer Content in transit. The Graylog System is configured by default to encrypt user data files using transport layer security (TLS) encryption for web communication sessions. 9.2. Graylog relies on policy controls to help ensure sensitive information is not transmitted over the Internet or other public communications unless it is encrypted in transit. 9.3. Graylog uses encryption key management processes to help ensure the secure generation, storage, distribution, and destruction of encryption keys.
Appears in 6 contracts
Samples: Hosted Service Terms, License and Support Agreement, Hosted Service Terms