Encryption at Rest Sample Clauses
The 'Encryption at Rest' clause requires that data stored on physical or virtual storage devices is encrypted to protect it from unauthorized access. This typically applies to sensitive information such as customer data, financial records, or proprietary business information, and may specify the use of certain encryption standards or technologies. By mandating encryption of stored data, the clause helps ensure data confidentiality and mitigates the risk of data breaches in the event of device theft or unauthorized system access.
Encryption at Rest. All Ministerio de Hacienda Data and Personal Data at rest in persistent storage (such as spinning disk, SSD, and flash drive or other removable media) must be encrypted. The granularity of encryption will be commensurate with the use case and risks of this data (for example, on a single-user system, whole-disk encryption will meet the requirement, but on a multi-tenant system with registered data, field-level encryption is required).
Encryption at Rest. The hard disks of all servers are encrypted thanks to an encrypted file system that encrypts all of your data and metadata at rest using an industry standard AES-256 encryption algorithm. Cryptographic keys protected by certificates, relying on the SHA256 signature algorithm.
Encryption at Rest. All Republic Data and Personal Data at rest in persistent storage (such as spinning disk, SSD, and flash drive or other removable media) must be encrypted. The granularity of encryption will be commensurate with the use case and risks of this data (for example, on a single-user system, whole-disk encryption will meet the requirement, but on a multi-tenant system with registered data, field-level encryption is required).
Encryption at Rest.
10.7.1 All user-writable partitions on portable devices (laptops, phones, etc.) and portable storage media MUST be encrypted at the media-level (i.e. Full Disk Encryption (FDE)).
Encryption at Rest. Supplier will use AES 256 or above to encrypt Personal Information Processed on its network.
Encryption at Rest. All PII and education records, whether stored in databases (e.g., Azure SQL) or other storage mechanisms, are encrypted at rest. This includes leveraging Azure SQL's built-in encryption capabilities, ensuring data is encrypted within the database and on the underlying storage.
Encryption at Rest. State Street shall encrypt any laptops, mobile devices (e.g. Blackberries, PDAs), containing Client Data used by State Street’s personnel using an industry recognized encryption algorithm with at least 256 bit encryption AES (or equivalent).
Encryption at Rest. 7.2.1. Where a device that forms part of any solution or product is not permanently held within a physically secure boundary within a site listed in the respond to the ITT, or subsequently notified to Census Security and received approval for adequate physical security, it must have storage device level encryption applied.
7.2.2. Where any element of backup/recovery provision uses tape storage, the Service Provider will consult with Census Security to determine appropriate security measures which may include tape encryption.
Encryption at Rest. All Brightmile data is stored using standard encryption mechanisms for both data in transit between services and at rest. We use the Advanced Encryption Standard (“AES”) algorithm to encrypt data at rest. All data at the storage level is encrypted with AES256 by default. Data stored is encrypted at the storage level using AES, in Galois/Counter Mode (GCM) in almost all cases. In select cases, AES is used in Cipher Block Chaining (CBC) mode with a hashed message authentication code (HMAC) for authentication; and for some replicated files, AES is used in Counter (CTR) mode with HMAC. In addition to the storage system level encryption described above, in most cases data is also encrypted at the storage device level with AES256 for hard disks (HDD) and solid state drives (SSD), using a separate device-level key (which is different than the key used to encrypt the data at the storage level). A small number of legacy HDDs use AES128.
