Common use of Security Technology Clause in Contracts

Security Technology. When the Service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect Student Data from unauthorized access. The security measures employed shall include server authentication and data encryption at rest and in transit. Provider shall host Student Data pursuant to the Agreement in an environment using a firewall that is maintained according to industry standards.

Appears in 48 contracts

Samples: sdpc.a4l.org, sdpc.a4l.org, resources.finalsite.net

AutoNDA by SimpleDocs

Security Technology. When the Service is accessed using a supported web browser, the Provider will ensure that Secure Socket Layer (“SSL”), or equivalent technology that protects information, using both server authentication and data encryption, shall be employed to protect Student Data from unauthorized access. The security measures employed shall include server authentication and data encryption at rest and in transit. Provider shall host Student Data pursuant to the Agreement in an environment using a firewall that is maintained periodically updated according to industry standards.

Appears in 27 contracts

Samples: Student Data Privacy Agreement, Privacy Agreement, Student Data Privacy Agreement

Security Technology. When the Service is accessed using a supported web browser, the Provider will ensure that Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect Student Data from unauthorized access. The security measures employed shall include server authentication and data encryption at rest and in transit. .. Provider shall host Student Data pursuant to the Agreement in an environment using a firewall that is maintained periodically updated according to industry standards...

Appears in 18 contracts

Samples: sdpc.a4l.org, swboces-dpitfilestore.s3.amazonaws.com, dpitfilestore.s3.amazonaws.com

Security Technology. When the Service is accessed using a supported web browser, the Provider will ensure that Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect Student Data from unauthorized access. The security measures employed shall include server authentication and data encryption at rest and in transit. Provider shall host Student Data pursuant to the Agreement in an environment using a firewall that is maintained periodically updated according to industry standards. ● Periodic Risk Assessment. Contractor further acknowledges and agrees to conduct periodic risk assessments and remediate any identified security and privacy vulnerabilities in a timely manner.

Appears in 6 contracts

Samples: resources.finalsite.net, www.crcs.wnyric.org, code.org

Security Technology. When the Service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect Student Data from unauthorized access. The security measures employed shall include server authentication and data encryption at rest and in transit. Provider Finalsite shall host Student Data pursuant to the Agreement in an environment using a firewall that is maintained according to industry standards.

Appears in 3 contracts

Samples: Privacy Agreement, Privacy Agreement, Privacy Agreement

Security Technology. When the Service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data Student Data from unauthorized access. The service security measures employed shall include server authentication and data encryption at rest and in transitencryption. Provider shall host Student Data pursuant to the Agreement in an environment using a firewall that is maintained periodically updated according to industry standards.

Appears in 2 contracts

Samples: sdpc.a4l.org, sdpc.a4l.org

Security Technology. When the Service is Services are accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect Student Data from unauthorized access. The service security measures employed shall include server authentication and data encryption at rest and in transitencryption. Provider shall host Student Data pursuant to the Agreement DPA in an environment using a firewall that is maintained periodically updated according to industry standards.

Appears in 2 contracts

Samples: Massachusetts Student Data Privacy Agreement, Privacy Agreement

Security Technology. When the Service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed that is designed to protect Student Data from unauthorized access. The Service security measures employed shall include server authentication and data encryption at rest and in transitencryption. The Provider shall host Student Data pursuant to the Agreement this DPA in an environment using a firewall that is maintained periodically updated according to industry standards.

Appears in 1 contract

Samples: Student Data Privacy Agreement

AutoNDA by SimpleDocs

Security Technology. When the Service is accessed using a supported web browser, the Provider will ensure that Secure Socket Layer (“SSL”), or equivalent technology that protects information using both server authentication and data encryption, shall be employed to protect Student Data from unauthorized access. The security measures employed shall include server authentication and data encryption at rest and in transit. Provider shall host Student Data pursuant to the Agreement in an environment using a firewall that is maintained periodically updated according to industry standards.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Technology. When the Service Student Data is accessed by Provider using a supported web browser, Secure Socket Layer (“SSL”), ) or equivalent technology shall be employed to protect Student Data data from unauthorized access. The service security measures employed shall include server authentication and data encryption at rest and in transitencryption. If Provider hosts Student Data, Provider shall host Student Data data pursuant to the Service Agreement in an environment using a firewall that is maintained periodically updated according to industry standards.

Appears in 1 contract

Samples: sdpc.a4l.org

Security Technology. When the Service is System are accessed using a supported web browser, Provider will ensure that Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect Student Data from unauthorized access. The security measures employed shall include that protects information, using both server authentication and data encryption at rest is used to help ensure that Student Data is transmitted in a safe and in transitsecure manner. Provider shall host Student Data data pursuant to the Agreement in an environment using a firewall that is maintained periodically updated according to industry standards.

Appears in 1 contract

Samples: Student Data Privacy Agreement

Security Technology. When the Service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect Student Data from unauthorized access. The security measures employed shall include server authentication and data encryption at rest and in transitencryption. Provider shall host Student Data pursuant to the Service Agreement in an environment using a firewall the employs boundary protection mechanisms (e.g. firewalls) that is maintained are periodically updated according to commercially reasonable industry standards.

Appears in 1 contract

Samples: California Student Data

Security Technology. When the Service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect Student Data from unauthorized access. The Services security measures employed shall include server authentication and data encryption at rest and in transitencryption. Provider shall host Student Data pursuant to the Agreement DPA in an environment using a firewall that is maintained periodically updated according to industry standards.

Appears in 1 contract

Samples: sdpc.a4l.org

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!