Common use of Security measures for Personal Data Clause in Contracts

Security measures for Personal Data. All the data is transmitted over Secure Sockets Layer (SSL) and stored in secure data centers which are SSAE compliant and ISO certified. All personal information is securely stored using either AES 256-bit or SHA-256 cryptographic hash algorithm for maximum protection; TLS encryption for data encryption while the same is in transition.

Appears in 6 contracts

Samples: Terms and Conditions, Terms and Conditions, Terms and Conditions

AutoNDA by SimpleDocs

Security measures for Personal Data. All the data is transmitted over Secure Sockets Layer (SSL) and stored in secure data centers which are SSAE compliant and ISO certifiedcenters. All personal information is securely stored secured using either AES 256-bit or SHA-256 cryptographic hash algorithm Cryptographic Hash Algorithm for maximum protection; TLS encryption for data encryption while the same is in transition.

Appears in 2 contracts

Samples: Terms and Conditions, Terms and Conditions

Security measures for Personal Data. All the data is transmitted over Secure Sockets Layer (SSL) and stored in secure data centers which are SSAE compliant and ISO certified. All personal information is securely stored using either AES 256-bit or SHA-256 cryptographic hash algorithm Cryptographic Hash Algorithm for maximum protection; TLS encryption Encryption for data encryption while the same is in transition.

Appears in 1 contract

Samples: Terms and Conditions

AutoNDA by SimpleDocs

Security measures for Personal Data. All the pertinent data is transmitted over conveyed utilizing Secure Sockets Layer (SSL) and stored in is conserved within secure data centers which are repositories compliant with SSAE compliant standards and ISO certifiedaccredited by ISO. All personal information data is securely stored using safeguarded with utmost precision utilizing either AES 256-bit encryption or SHA-256 cryptographic hash algorithm for maximum to ensure paramount protection; moreover, TLS encryption is employed for the encryption of data encryption while the same is in transitionduring its transit phase.

Appears in 1 contract

Samples: Terms of Service

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!