Key Management. The Content Protection System must protect all CSPs. CSPs shall include, without limitation, all keys, passwords, and other information which are required to maintain the security and integrity of the Content Protection System. CSPs shall never be transmitted in the clear or transmitted to unauthenticated recipients (whether users or devices.
Key Management. Encryption keys are used all around the hosted software application that are used to provide the Service. They are used for secure storage, secure transport, for token generation, and for authentication. The hosted software application used to provide the Service does not utilize a single centralized key-store, for both architecture and security reasons. Different keys are stored by different means in accordance with their availability and security requirements.
Key Management. The Contractor must have measures for managing keys and detecting any compromise/unauthorised access in its key system.
Key Management. Where encryption is utilized, Convercent will maintain a key management process that meets the following minimum requirements:
a. At least one key custodian must be officially designated.
b. Key custodians must ensure that all keys used in a storage encryption solution are secured and managed properly to support the security of the solution.
c. Key management must be planned to include secure key generation, use, storage and revocation.
d. Key management practices must support the recovery of encrypted data if a key is inadvertently disclosed, destroyed or becomes unavailable.
e. Key custodians must ensure that access to encryption keys is properly restricted to approved administrators. Private keys must not be stored on the same media and/or virtual instance as the data they protect.
f. Authentication must be required in order to gain access to keys.
g. Keys should be rotated annually and must be replaced before they expire.
Key Management. Servicer shall document, implement, and maintain enterprise-class Industry Standard encryption key and seed management procedures to ensure the integrity, security, and retrieval of any applicable Cellco encryption keys or Cellco encrypted data. These procedures should include generating, distributing, storing, changing, recovering, archiving, and destroying encryption keys and the implementation of periodic key rotation, revocation (at least annually or in the event of compromise), and dual knowledge (such that one person does not have the full key for any data encrypted at rest).
Key Management. Supplier shall support the use of cryptographic techniques with the practice of key management. All cryptographic keys shall be protected against modification, loss, and destruction. Secret and private keys shall require protection against unauthorized disclosure, and all cryptographic keys shall be limited to the fewest number of custodians necessary. Equipment used to generate, store, and archive keys shall be physically protected, and encryption keys shall be stored separately from encrypted data.
Key Management. The death, disability, or failure of either Xxxxxx Xxxxxxxx or Xxxxx Xxxxxxxx at any time to exercise that authority and discharge those management responsibilities with respect to the Borrower as are exercised and discharged by such Persons at the execution of this Agreement, and the failure of the Borrower to appoint a successor reasonably acceptable to the Agent within one hundred twenty (120) days following such cessation.
Key Management. The Borrower shall employ individuals in the key management positions of Chairman, President and Chief Financial Officer and shall use its best efforts to cause such key managers to continue to serve in their respective capacities. In the event of the voluntary or involuntary termination of any key manager for any reason, the Borrower shall, as soon as practicable, replace such individual with another qualified manager with comparable management skills and experience in the Borrower's industries and reasonably satisfactory to the Agents.
Key Management. In the event the security of one or more CSS Keys is compromised, whether or not through the fault or negligence of Licensor, a CSS Licensee's sole remedy as against Licensor in this regard shall be to have Licensor issue new CSS Keys as appropriate.
Key Management. Tenants shall not place any additional locks upon doors of the Premises, nor shall any existing lock be altered, without the prior written consent of the Landlord. Tenant shall not make duplicate keys. If more keys are desired for any lock, Landlord shall secure such additional keys at the expense of Tenants. If Tenants do not return all keys to Landlord upon the expiration or earlier termination of this Agreement, Tenants will be charged for the expense of changing the applicable locks. If a Tenant locks himself or herself out of the Premises, Tenant shall contact Landlord for emergency access and any such Tenant will be assessed a Twenty-Five Dollar ($25) fee per occurrence.