Encryption on Workstations and Portable Computing Devices Sample Clauses

Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.17.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. 9.17.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).
AutoNDA by SimpleDocs
Encryption on Workstations and Portable Computing Devices. Contractor shall encrypt Information Assets including data stored on workstations, portable computing devices (including, but not limited to, mobile devices, wearables, tablets, laptops, personal digital assistants, notebook computers, and backup media) and/or portable electronic storage media (including, but not limited to, discs, thumb/flash drives, external/portable hard drives, and backup media).
Encryption on Workstations and Portable Computing Devices. 9.22.3.2.1 Contractor shall encrypt Information Assets including data stored on workstations, portable computing devices (including, but not limited to, mobile devices, wearables, tablets, laptops, personal digital assistants, notebook computers, and backup media) and/or portable electronic storage media (including, but not limited to, discs, thumb/flash drives, external/portable hard drives, and backup media). 9.22.3.2.2 Contractor shall use software and/or hardware encryption methods for stored data in accordance with the following standards: 9.22.3.2.2.1 Federal Information Processing Standard Publication (FIPS) 140-2 9.22.3.2.2.2 National Institute of Standards and Technology (NIST) Special Publication 800-57 Recommendation for Key Management - Part 1: General (Revision 3) 9.22.3.2.2.3 NIST Special Publication 800-57 Recommendation for Key Management - Part 2: Best Practices for Key Management Organization 9.22.3.2.2.4 NIST Special Publication 800-111 Guide to Storage Encryption Technologies for End User Devices
Encryption on Workstations and Portable Computing Devices. 9.16.8.1 Contractor shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.16.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. 9.16.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.16.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization).

Related to Encryption on Workstations and Portable Computing Devices

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Transmission and Routing of Exchange Access Traffic PURSUANT TO 251(c)(2) 13 ARTICLE VI MEET-POINT BILLING ARRANGEMENTS 14 ARTICLE VII BLV/BLVI TRAFFIC 16 7.1 Busy Line Verification 16 7.2 Busy Line Verification Interrupt 16 7.3 BLV/BLVI Traffic 16 7.4 BLV/BLVI Compensation 16

  • Records Maintenance; Access Contractor shall maintain all financial records relating to this Contract in accordance with generally accepted accounting principles. In addition, Contractor shall maintain any other records, books, documents, papers, plans, records of shipments and payments and writings of Contractor, whether in paper, electronic or other form, that are pertinent to this Contract (“Records”) in such a manner as to clearly document Contractor's performance. Contractor acknowledges and agrees that Agency and the Oregon Secretary of State's Office and the federal government and their duly authorized representatives will have access to such financial records and other Records that are pertinent to this Contract, whether in paper, electronic or other form, to perform examinations and audits and make excerpts and transcripts. Contractor shall retain and keep accessible all such financial records and other Records for a minimum of 6 years, or such longer period as may be required by applicable law, following final payment and termination of this Contract, or until the conclusion of any audit, controversy or litigation arising out of or related to this Contract, whichever date is later.

  • Transmission and Routing of Telephone Exchange Service Traffic 50.4.1 The Appendix Reciprocal Compensation, which is/are attached hereto and incorporated herein by reference, prescribe traffic routing parameters for Local Interconnection Trunk Group(s) the Parties shall establish over the Interconnections specified in the Appendix ITR, which is/are attached hereto and incorporated herein by reference.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Availability of Verizon Telecommunications Services 3.1 Verizon will provide a Verizon Telecommunications Service to Z-Tel for resale pursuant to this Attachment where and to the same extent, but only where and to the same extent, that such Verizon Telecommunications Service is provided to Verizon’s Customers. 3.2 Except as otherwise required by Applicable Law, subject to Section 3.1, Verizon shall have the right to add, modify, grandfather, discontinue or withdraw, Verizon Telecommunications Services at any time, without the consent of Z-Tel. 3.3 To the extent required by Applicable Law, the Verizon Telecommunications Services to be provided to Z-Tel for resale pursuant to this Attachment will include a Verizon Telecommunications Service customer-specific contract service arrangement (“CSA”) (such as a customer specific pricing arrangement or individual case based pricing arrangement) that Verizon is providing to a Verizon Customer at the time the CSA is requested by Z-Tel.

  • Access to Records; Contractor Financial Records Contractor agrees that District and its authorized representatives are entitled to review all Contractor books, documents, papers, plans, and records, electronic or otherwise (“Records”), directly pertinent to this Contract for the purpose of making audit, examination, excerpts, and transcripts.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!