Encryption at Rest Sample Clauses

Encryption at Rest. All Ministerio de Hacienda Data and Personal Data at rest in persistent storage (such as spinning disk, SSD, and flash drive or other removable media) must be encrypted. The granularity of encryption will be commensurate with the use case and risks of this data (for example, on a single-user system, whole-disk encryption will meet the requirement, but on a multi-tenant system with registered data, field-level encryption is required).
AutoNDA by SimpleDocs
Encryption at Rest. 7.2.1. Where a device that forms part of any solution or product is not permanently held within a physically secure boundary within a site listed in the respond to the ITT, or subsequently notified to Census Security and received approval for adequate physical security, it must have storage device level encryption applied. 7.2.2. Where any element of backup/recovery provision uses tape storage, the Service Provider will consult with Census Security to determine appropriate security measures which may include tape encryption.
Encryption at Rest. State Street shall encrypt any laptops, mobile devices (e.g. Blackberries, PDAs), containing Client Data used by State Street’s personnel using an industry recognized encryption algorithm with at least 256 bit encryption AES (or equivalent).
Encryption at Rest. Supplier will use AES 256 or above to encrypt Personal Information Processed on its network.
Encryption at Rest. ‌ 10.7.1 All user-writable partitions on portable devices (laptops, phones, etc.) and portable storage media MUST be encrypted at the media-level (i.e. Full Disk Encryption (FDE)).
Encryption at Rest. The hard disks of all servers are encrypted thanks to an encrypted file system that encrypts all of your data and metadata at rest using an industry standard AES-256 encryption algorithm. Cryptographic keys protected by certificates, relying on the SHA256 signature algorithm.

Related to Encryption at Rest

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!