Common use of Encryption and Key Management Clause in Contracts

Encryption and Key Management. 9.1. Graylog uses industry-standard encryption techniques to encrypt Customer Content in transit. The Graylog System is configured by default to encrypt user data files using transport layer security (TLS) encryption for web communication sessions. 9.2. Graylog relies on policy controls to help ensure sensitive information is not transmitted over the Internet or other public communications unless it is encrypted in transit. 9.3. Graylog uses encryption key management processes to help ensure the secure generation, storage, distribution, and destruction of encryption keys.

Appears in 6 contracts

Samples: Hosted Service Terms, License and Support Agreement, Hosted Service Terms

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!