Key Management. Encryption keys are used all around the hosted software application that are used to provide the Service. They are used for secure storage, secure transport, for token generation, and for authentication. The hosted software application used to provide the Service does not utilize a single centralized key-store, for both architecture and security reasons. Different keys are stored by different means in accordance with their availability and security requirements.
Appears in 12 contracts
Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement
Key Management. Encryption keys are used all around the hosted software application that are used to provide the Service. They are used for secure storage, secure transport, for token generation, and for authentication. The hosted software application used to provide the Service does not utilize a single centralized key-store, store for both architecture and security reasons. Different keys are stored by different means in accordance with their availability and security requirements.
Appears in 2 contracts