Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.
Appears in 54 contracts
Samples: Data Privacy & Security, Data Privacy Agreement, Data Privacy Agreement
Security Technology. When the service is accessed using a supported web browser, ,FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.
Appears in 16 contracts
Samples: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 800-171, or equivalent industry best practices.
Appears in 11 contracts
Samples: Data Privacy Agreement, Data Privacy & Security, Data Privacy Agreement
Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171800171, or equivalent industry best practicesstandards.
Appears in 1 contract
Samples: Data Privacy Agreement
Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practicesstandards.
Appears in 1 contract
Samples: Data Privacy Agreement
Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated compliant transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.
Appears in 1 contract
Samples: Data Privacy Agreement