ENCRYPTION PRACTICES. ✔ a. Data encryption is applied in accordance with Education Law 2-d 5(f)(5) Yes:
Appears in 4 contracts
Samples: Supplemental Agreement, Supplemental Agreement, Supplemental Agreement
ENCRYPTION PRACTICES. ✔
a. Data encryption is applied in accordance with Education Law 2-d 5(f)(5) Yes:Yes X No Initial
Appears in 2 contracts
Samples: Confidentiality and Data Security Agreement, Confidentiality and Data Security Agreement
ENCRYPTION PRACTICES. ✔
a. Data encryption is applied in accordance with Education Law 2-d 5(f)(5) Yes:).
Appears in 2 contracts
Samples: Data Sharing and Confidentiality Agreement, Data Sharing and Confidentiality Agreement
ENCRYPTION PRACTICES. ✔
a. Data encryption is applied in accordance with Education Law 2-d 5(f)(5) Yes: No:
Appears in 1 contract
Samples: Supplemental Agreement
ENCRYPTION PRACTICES. ✔
a. Data encryption is applied in accordance with Education Law 2-d 5(f)(5) Yes:Initial Yes X No
Appears in 1 contract
Samples: Data Security and Privacy Plan
ENCRYPTION PRACTICES. ✔
a. Data encryption is applied in accordance with Education Law 2-d 5(f)(5) Yes:Yes X No
Appears in 1 contract