Key Management. The Content Protection System must protect all CSPs. CSPs shall include, without limitation, all keys, passwords, and other information which are required to maintain the security and integrity of the Content Protection System. CSPs shall never be transmitted in the clear or transmitted to unauthenticated recipients (whether users or devices.
Key Management. Encryption keys are used all around the hosted software application that are used to provide the Service. They are used for secure storage, secure transport, for token generation, and for authentication. The hosted software application used to provide the Service does not utilize a single centralized key-store, for both architecture and security reasons. Different keys are stored by different means in accordance with their availability and security requirements.
Key Management. The Contractor must have measures for managing keys and detecting any compromise/unauthorised access in its key system.
Key Management. Where encryption is utilized, Convercent will maintain a key management process that meets the following minimum requirements:
Key Management. Servicer shall document, implement, and maintain enterprise-class Industry Standard encryption key and seed management procedures to ensure the integrity, security, and retrieval of any applicable Cellco encryption keys or Cellco encrypted data. These procedures should include generating, distributing, storing, changing, recovering, archiving, and destroying encryption keys and the implementation of periodic key rotation, revocation (at least annually or in the event of compromise), and dual knowledge (such that one person does not have the full key for any data encrypted at rest).
Key Management. The death, disability, or failure of either Xxxxxx Xxxxxxxx or Xxxxx Xxxxxxxx at any time to exercise that authority and discharge those management responsibilities with respect to the Borrower as are exercised and discharged by such Persons at the execution of this Agreement, and the failure of the Borrower to appoint a successor reasonably acceptable to the Agent within one hundred twenty (120) days following such cessation.
Key Management. Supplier shall support the use of cryptographic techniques with the practice of key management. All cryptographic keys shall be protected against modification, loss, and destruction. Secret and private keys shall require protection against unauthorized disclosure, and all cryptographic keys shall be limited to the fewest number of custodians necessary. Equipment used to generate, store, and archive keys shall be physically protected, and encryption keys shall be stored separately from encrypted data.
Key Management. In the event the security of one or more CSS Keys is compromised, whether or not through the fault or negligence of Licensor, a CSS Licensee's sole remedy as against Licensor in this regard shall be to have Licensor issue new CSS Keys as appropriate.
Key Management. Tenants shall not place any additional locks upon doors of the Premises, nor shall any existing lock be altered, without the prior written consent of the Landlord. Tenant shall not make duplicate keys. If more keys are desired for any lock, Landlord shall secure such additional keys at the expense of Tenants. If Tenants do not return all keys to Landlord upon the expiration or earlier termination of this Agreement, Tenants will be charged for the expense of changing the applicable locks. If a Tenant locks himself or herself out of the Premises, Tenant shall contact Landlord for emergency access and any such Tenant will be assessed a Twenty-Five Dollar ($25) fee per occurrence.
Key Management. The Vendor will be responsible for controlling any master keys or individual keys provided. If a master key is lost, the Vendor is responsible for the cost of any re-keying required by Citizens to maintain the security of the leased office space.