Common use of Encryption on Workstations and Portable Computing Devices Clause in Contracts

Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.17.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. 9.17.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).

Appears in 10 contracts

Samples: Subaward Agreement, Subaward Agreement, Subaward Agreement

AutoNDA by SimpleDocs

Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier 9.18.8.1 Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.17.8.1.1 9.18.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. 9.17.8.1.2 . 9.18.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 9.18.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 9.18.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).

Appears in 2 contracts

Samples: Subaward Agreement, Subaward Agreement

Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.17.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. . 9.17.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).

Appears in 1 contract

Samples: Subaward Agreement

Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier 9.18.8.1 Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.17.8.1.1 9.18.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. 9.17.8.1.2 9.18.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 9.18.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 9.18.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).

Appears in 1 contract

Samples: Subaward Agreement

Encryption on Workstations and Portable Computing Devices. 9.17.8.1 9.17.7.1 Subrecipient and its any approved Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.17.8.1.1 9.17.7.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. 9.17.8.1.2 . 9.17.7.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 9.17.7.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 9.17.7.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).

Appears in 1 contract

Samples: Elderly Nutrition Program Subaward Agreement

AutoNDA by SimpleDocs

Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.17.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. . 9.17.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).

Appears in 1 contract

Samples: Subaward Agreement

Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier 9.17.7.1 Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.17.8.1.1 9.17.7.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. 9.17.8.1.2 9.17.7.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 9.17.7.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 9.17.7.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).

Appears in 1 contract

Samples: Subaward Agreement

Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its any approved Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.17.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. 9.17.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).

Appears in 1 contract

Samples: Subaward Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!