Storage and Transmission Security. Security measures to guard against unauthorized access to Customer Data or Professional Services Data that is being transmitted over a public electronic communications network or stored electronically. Such measures include requiring encryption of any Customer Data or Professional Services Data stored on desktops, laptops or other removable storage devices.
Storage and Transmission Security. Technical security measures to guard against unauthorized access to Raytheon Data that is being transmitted over an electronic communications network, including a mechanism to encrypt electronic information whenever appropriate, such as while in transit or in storage on networks or systems to which unauthorized individuals may have access. Secure Disposal – Policies and procedures regarding the disposal of Raytheon Data, and tangible property containing Raytheon Data, taking into account available technology so that Raytheon Data cannot be practicably read or reconstructed.
Storage and Transmission Security technical security measures (e.g. state-of-the-art firewalls)to guard against unauthorized access to Confidential Information or Personal Data that is being transmitted over an electronic communications network, including a mechanism to encrypt electronic information whenever appropriate, such as while in transit or in storage on networks or systems to which unauthorized individuals may have access.
Storage and Transmission Security. (a) Customer data is stored in multi-tenant datastores.
(b) All data sent to or from Intercom is encrypted in transit using TLS 1.2.
(c) Customer Personal Data is encrypted at rest using 256-bit encryption, leveraging AWS' encryption framework’s model C as described in xxxxx://x0.xxxxxxxxx.xxx/whitepapers/aws-securing-data-at-rest-with- encryption.pdf
(d) All Intercom datastores used to process Customer data are configured and patched using commercially reasonable methods according to industry-recognized system-hardening standards.
Storage and Transmission Security. A10 maintains technical security measures to guard against unauthorized access to User Data that is being transmitted over an electronic communications network. A10 will:
8.1. maintain a working and up-to-date network firewall to protect data accessible via the Internet;
8.2. use anti-malware software at all times and will keep the anti-malware software up-to-date;
8.3. maintain technical and security measures to encrypt User Data in transit and at rest;
8.4. regularly review access logs for signs of malicious behavior or unauthorized access;
8.5. keep A10’s systems and software up-to-date with the latest applicable upgrades, updates, new versions and other modifications necessary to ensure security of User Data.
Storage and Transmission Security. Abnormal will logically segregate Customer Data from all other Abnormal or third- party data. Abnormal will: (a) securely store Customer Data; (b) encrypt Customer Data during transmission using, at a minimum, Transport Layer Security (TLS) protocol version 1.2 or above; and (c) encrypt Customer Data at rest using, at a minimum, the Advanced Encryption Standard (AES) 256-bit encryption protocol. Abnormal will establish encryption key management processes that are designed to ensure the secure generation, storage, distribution, and destruction of encryption keys. Abnormal will not store Customer Data on any removable storage devices or other similar portable electronic media.
Storage and Transmission Security. All Member Data that is collected, stored or otherwise maintained by Company pursuant to this Agreement shall be maintained in a secure environment that meets industry standards for website security. Any Member Data that is collected or obtained by Company must be stored and transmitted in encrypted, or otherwise secure, form.
Storage and Transmission Security. All Member Data that is collected, stored or otherwise maintained by the Company pursuant to this Agreement shall be maintained in a secure environment that meets the requirements set out in applicable Privacy Laws. The Company shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including: (a) where appropriate, the pseudonymization and/or encryption of personal data; (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; and (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organizational measures for ensuring the security of the processing.
Storage and Transmission Security. All User Data that are collected, stored or otherwise maintained by the Supplier pursuant to this Agreement shall be maintained in a secure environment that meets the requirements set out in Article 32 of the GDPR. The Supplier shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including: (a) where appropriate, the pseudonymisation and/or encryption of personal data; (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; (c) the ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident; and (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.
Storage and Transmission Security. Lusha secures the transmission of all Personal Data Processed by Lusha in accordance with this DPA and encrypt such data while in motion consistent with industry standards and at a minimum of 256-bit encryption.