Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards: 9.17.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2. 9.17.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).
Appears in 10 contracts
Samples: Subaward Agreement, Subaward Agreement, Subaward Agreement
Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier 9.18.8.1 Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards:
9.17.8.1.1 9.18.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2.
9.17.8.1.2 . 9.18.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 9.18.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 9.18.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).
Appears in 2 contracts
Samples: Subaward Agreement, Subaward Agreement
Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards:
9.17.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2.
. 9.17.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).
Appears in 1 contract
Samples: Subaward Agreement
Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier 9.18.8.1 Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards:
9.17.8.1.1 9.18.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2.
9.17.8.1.2 9.18.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 9.18.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 9.18.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).
Appears in 1 contract
Samples: Subaward Agreement
Encryption on Workstations and Portable Computing Devices. 9.17.8.1 9.17.7.1 Subrecipient and its any approved Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards:
9.17.8.1.1 9.17.7.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2.
9.17.8.1.2 . 9.17.7.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 9.17.7.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 9.17.7.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).
Appears in 1 contract
Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards:
9.17.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2.
. 9.17.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).
Appears in 1 contract
Samples: Subaward Agreement
Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its Lower Tier 9.17.7.1 Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards:
9.17.8.1.1 9.17.7.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2.
9.17.8.1.2 9.17.7.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 9.17.7.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 9.17.7.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).
Appears in 1 contract
Samples: Subaward Agreement
Encryption on Workstations and Portable Computing Devices. 9.17.8.1 Subrecipient and its any approved Lower Tier Subrecipient shall use software and/or hardware encryption methods for confidential County Information Assets stored on all electronic media in accordance with the following standards:
9.17.8.1.1 Federal Information Processing Standard Publication ("FIPS") 140-2.
9.17.8.1.2 NIST SP 800-57 (Recommendation for Key Management - Part 1: General (Revision 3). 9.17.8.1.3 NIST SP 800-57 (Recommendation for Key Management - Part 2: Best Practices for Key Management Organization). 9.17.8.1.4 NIST SP 800-111 (Guide to Storage Encryption Technologies for End User Devices).
Appears in 1 contract
Samples: Subaward Agreement