Encryption of Data at Rest. The service provider shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all personal data, unless the City approves the storage of personal data on a service provider portable device in order to accomplish work as defined in the statement of work.
Appears in 2 contracts
Samples: Invoice Management Solution Contract, Mobile Application Contract
Encryption of Data at Rest. The service provider Service Provider shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all personal data, unless the City public jurisdiction approves the storage of personal data on a service provider Service Provider portable device in order to accomplish work as defined in the statement of work.
Appears in 1 contract
Samples: Technology Contracts
Encryption of Data at Rest. The service provider Software Provider shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all personal data, unless the City approves the storage of personal data on a service provider Software Provider’s portable device in order to accomplish work as defined in the statement of work.
Appears in 1 contract
Samples: Software as a Service Agreement
Encryption of Data at Rest. The service provider Service Provider shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all personal data, unless the City approves the storage of personal data on a service provider Service Provider portable device in order to accomplish work as defined in the statement of work.
Appears in 1 contract
Encryption of Data at Rest. The service provider Provider shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all personal dataConfidential Data, unless the City State approves the storage of personal data Confidential Data on a service provider Provider portable device in order to accomplish work as defined in the statement of Contract work.
Appears in 1 contract
Samples: Confidentiality Agreement