Message Level Encryption Sample Clauses

Message Level Encryption. Customer administrators and/or senders are responsible for selecting the encryption method from sender to system of which default varies depending on the sending app, sender configuration or customer administrator preferences. The default password options default varies depending on the sender app, sender preferences and customer administrator preferences. Customer administrators are responsible for setting any short term encrypted message attachment download alternate options (current default is a 7-day attachment download option enabled, with options to disable any attachment download option or extend the storage for up to 90-days).
AutoNDA by SimpleDocs
Message Level Encryption. The RMail Platform provides an option to send Message Level Encryption (RSA-256Bit) from the sender device to the RMail Cloud if the sender is using the RMail for Outlook app to send, with the Local Encryption setting enabled. The customer or their administrator may disable Local Encryption and rely on their Network Encryption -- in doing so, the Registered Encryption™ service will report, if detected, the level of transmission encryption from the sender’s last Internet hop to the RMail Cloud.
Message Level Encryption. Customer administrators and/or senders are responsible for selecting the default and/or minimum encryption method from the RMail Cloud to the recipient; which default method varies depending on the sending app, sender configuration or sending customer administrator preferences. If Message Level Encryption is triggered, that minimum level is AES256-bit PDF encryption. Password option defaults if applicable vary depending on the sender app, sender preferences, sender customer administrator, and/or recipient preferences. Customer administrators are responsible for setting any short term encrypted message attachment download alternate options (e.g., default download option enabled or disabled, default 7-day attachment download option enabled with options to extend the storage for up to 90- days).

Related to Message Level Encryption

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Query a search query initiated from the Search Box or a Hyperlink, or a request for Matched Ads initiated by the Ad Code on an Ad Page. Results: Paid Search Results, Hyperlink Results, Domain Match Results, Web Search Results and/or Matched Ads, to the extent included in this Agreement and as appropriate to the context. Search Box: a graphical area in which a user can enter a Query. SO: the Service Order.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Functionality Customer is entitled to additional functionality previously purchased or bundled with the software if available in the version or update released on or after the start date of the Agreement. Customer acknowledges that certain functionality in current and previous software versions may not be available in future upgrades. Added functionality may require additional paid services (clinical and technical) to configure and support.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!