Common use of Security Technology Clause in Contracts

Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.

Appears in 54 contracts

Samples: Data Privacy & Security, Data Privacy Agreement, Data Privacy Agreement

AutoNDA by SimpleDocs

Security Technology. When the service is accessed using a supported web browser, ,FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.

Appears in 16 contracts

Samples: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement

Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 800-171, or equivalent industry best practices.

Appears in 11 contracts

Samples: Data Privacy Agreement, Data Privacy & Security, Data Privacy Agreement

Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171800171, or equivalent industry best practicesstandards.

Appears in 1 contract

Samples: Data Privacy Agreement

AutoNDA by SimpleDocs

Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practicesstandards.

Appears in 1 contract

Samples: Data Privacy Agreement

Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated compliant transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.

Appears in 1 contract

Samples: Data Privacy Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!