Encryption Key Management Sample Clauses

Encryption Key Management. State Street must document procedures for managing encryption keys as well as any salts used to protect one way hashing functions. These procedures must include specifications for key provisioning, distribution, revocation, and expiration.
AutoNDA by SimpleDocs
Encryption Key Management. Snowflake's encryption key management conforms to NIST 800-53 and involves regular rotation of encryption keys. Hardware security modules are used to safeguard top-level encryption keys. Snowflake logically separates encryption keys from Customer Data.
Encryption Key Management. Our IaaS offer uses a strictly role based/accessed key management system for our management environments and offers this as an optional service for client environments. • Encryption keys are maintained in a hardware security module (HSM) (both hardware based HSM and Virtual based HSMs). Access to the HSM requires multiple employees to eliminate single administration risk issues. • Encryption keys can be provided to clients using an encryption key wrapper and using a hand-delivered physical security protocol. • Our IaaS offer supports a very wide variety of key management processes: from our team managing the entire process to clients managing the entire process, as well as co- management of the key management process as per client specifications. Customer and Zone Segregation Our Enterprise Zone is the standard cloud service for most customer applications, security tools, and other supporting applications. The PCI Cloud and the Federal Cloud (IAAS) are physically and logically separated Zones for specific customer workloads and use cases. Our Management zone is used exclusively by our staff to manage the health, backups, security tools capacity planning, and SLA monitoring tools. It is operated and maintained to the requirements of FISMA moderate and FedRAMP requirements.
Encryption Key Management. Supplier will provide encryption key management. Supplier will protect private keys in storage, transit, and backup. Supplier will segregate the encryption key and encryption key management process from any hosts that store and Process the data. Supplier will provide Seagate with documentation of its security controls for the secure key management. Supplier will provide an effective key destruction technique, such as crypto shredding, to ensure that the encryption keys are destroyed and unrecoverable after the Agreement is terminated.
Encryption Key Management a. Supplier shall implement key and seed management procedures that enable Verizon Confidential or Sensitive Information to be retrieved if the person who encrypted such data is unable or unwilling to decrypt the data.
Encryption Key Management. Third Party shall have a defined key management policy that defines encryption key requirements, rotation, and lifecycle, including creation, distribution, revocation, archival, and destruction.
Encryption Key Management. All cryptographic keys are protected from unauthorized disclosure or use.
AutoNDA by SimpleDocs
Encryption Key Management eGain's encryption key management conforms to NIST 800-57 Part 2 and includes governance, regular rotation of encryption keys, and separation between key custodians and operations. Hardware security modules are used to safeguard top-level encryption keys. eGain logically separates encryption keys from Customer Data and generates unique keys for each Customer.
Encryption Key Management. Slope's encryption key management includes regular rotation of encryption keys. Slope logically separates encryption keys from Customer Data.

Related to Encryption Key Management

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Contract Management To ensure full performance of the Contract and compliance with applicable law, the System Agency may take actions including:

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • Staffing There shall be a clinician employed by the outside contractor for EAP Services who will be on-site a minimum of 20 hours a week. The clinician shall report directly to the outside contractor, Peer Assistance Oversight Committee and the MIF liaison. There shall be three full-time Peer Assistants reporting to the outside contractor.

  • Investment Management Services (a) The Manager shall manage the Fund’s assets subject to and in accordance with the investment objectives and policies of the Fund and any directions which the Trust’s Board of Trustees may issue from time to time. In pursuance of the foregoing, the Manager shall make all determinations with respect to the investment of the Fund’s assets and the purchase and sale of its investment securities, and shall take such steps as may be necessary to implement the same. Such determinations and services shall include determining the manner in which any voting rights, rights to consent to corporate action and any other rights pertaining to the Fund’s investment securities shall be exercised. The Manager shall render or cause to be rendered regular reports to the Trust, at regular meetings of its Board of Trustees and at such other times as may be reasonably requested by the Trust’s Board of Trustees, of (i) the decisions made with respect to the investment of the Fund’s assets and the purchase and sale of its investment securities, (ii) the reasons for such decisions and (iii) the extent to which those decisions have been implemented.

Time is Money Join Law Insider Premium to draft better contracts faster.