Stored Data. Contractors' and Subcontractors' workstations and portable devices (e.g., mobile, wearables, tablets, thumb drives, external hard drives) shall require encryption (i.e. software and/or hardware) in accordance with: (a) Federal Information Processing Standard Publication (FIPS) 140-2; (b) National Institute of Standards and Technology (NIST) Special Publication 800-57 Recommendation for Key Management- Part 1: General (Revision 3); (c) NIST Special Publication 800-57 Recommendation for Key Management - Part 2: Best Practices for Key Management Organization; and (d) NIST Special Publication 800- 111 Guide to Storage Encryption Technologies for End User Devices. Advanced Encryption Standard (AES) with cipher strength of 256-bit is minimally required.
Stored Data. The Licensed Software collects from Your environment and stores in Your environment data, which may include, without limitation, IP address, host name, user name, and passwords (“Stored Information”). The Stored Information is used to enable the functionality of the Licensed Software and will not be transmitted to Symantec, unless You manually submit it. If submitted to Symantec, the Stored Information will be used for the purpose of: troubleshooting and support. Submission of the Stored Information is not required and You will be able to use the Licensed Software even if You do not submit the Stored Information to Symantec.
Stored Data. In the event that the Evaluation Product is returned pursuant to Section 1.3 above, Customer shall ensure that all information stored on the Evaluation Product is removed in its entirety. If any such data is not removed by Customer from the Evaluation Product, Pure shall destroy the stored data.
Stored Data. The Customer agrees to ensure that the Equipment is returned to IMAGEZONE clear of all content or other data of any kind acquired during the Hire Period, such that the Equipment is returned in a state that is suitable for subsequent immediate hire following the Hire Period. The Customer is solely responsible for protection and back up of the Customer's data and IMAGEZONE has no obligation or liability for taking, or failing to take, any action with respect to such content or data, including maintaining or safe guarding any content or data that may remain on or within the Equipment following the Hire Period, including in relation to confidentiality.
Stored Data. 10.1 You acknowledge and agree that the App may:
Stored Data. Netrx xxxl be responsible for saving or backing up data contained in any Product returned to Cisco for in-warranty or out-of-warranty repairs or service. CISCO WILL HAVE NO RESPONSIBILITY FOR SUCH DATA AND WILL HAVE NO LIABILITY ARISING OUT OF ANY DAMAGE TO OR LOSS OF SUCH DATA WHILE THE PRODUCT IS IN CISCO'S POSSESSION.
Stored Data. The Licensed Software collects from Your environment and stores in Your environment data, which may include, without limitation, management credentials, LDAP user and password, IP address, hostname, log files and configuration files (“Stored Information”). The Stored nformation is used to enable the functionality of the Licensed Software and will not be transmitted to Symantec, unless You manually submit it. If submitted to Symantec, the Stored Information will be used for the purpose of providing requested technical support, including performing error analysis. Submission of the Stored Information is not required and You will be able to use the Licensed Software even if You do not submit the Stored Information to Symantec.
Stored Data. Pure will use reasonable commercial efforts to erase all of the data contained in or stored on any Product that is returned to Pure for repair, whether or not under warranty, or at the end of the Evaluation Term, but GSA Customer acknowledges and agrees that Pure shall have no responsibility for any loss or disclosure of any data that is stored on a Product that is returned to Pure or Pure’s supplier as designated by the RMA process or pursuant to Section 2.4.
Stored Data. Contractor will perform Services utilizing both Contractor workstations and devices, and County-provided workstations and devices. Notwithstanding anything in this Agreement, County shall have sole and exclusive responsibility for the configuration of its own systems and devices, including, but not limited to, security and encryption methods and settings. Contractors’ and Subcontractors' workstations and portable devices (e.g., mobile, wearables, tablets, thumb drives, external hard drives) require encryption (i.e. software and/or hardware) generally consistent with: (a) Federal Information Processing Standard Publication (FIPS) 140-2; (b) NIST Special Publication 800-57 Recommendation for Key Management – Part 1: General (Revision 4); (c) NIST Special Publication 800-57 Recommendation for Key Management – Part 2: Best Practices for Key Management Organization; and (d) NIST Special Publication 800-111 Guide to Storage Encryption Technologies for End User Devices. Advanced Encryption Standard (AES) with cipher strength of 256-bit is minimally required.
Stored Data. Contractors’ and Subcontractors’ workstations and portable devices (e.g., mobile, wearables, tablets, thumb drives, external hard drives) require encryption (i.e. software and/or hardware) in accordance with: (a) Federal Information Processing Standard Publication (FIPS) 140-2; (b) National Institute of Standards and Technology (NIST) Special Publication 800-57. Recommendation for Key Management – Part 2: Best Practices for Key Management Organization; and (d) NIST Special Publication 800-111 Guide to Storage Encryption Technologies for End User Devices. Advanced Encryption Standard (AES) with cipher strength of 256-bit is minimally required.