Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY
Technical Security Controls. With respect to KnowBe4 infrastructure that processes, stores, or transmits Customer Confidential Information, KnowBe4 will use the following technical security controls where applicable (and keep them current by incorporating and using all updates commercially available):
Technical Security Controls. With respect to information technology infrastructure, servers, databases, or networks that Process, store, or transmit Data, Supplier shall use the following technical security controls where applicable (and keep them current by incorporating and using all updates commercially available):
Technical Security Controls a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 4 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 5 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 6 is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full 7 disk unless approved by the COUNTY.
Technical Security Controls. By executing this Agreement, CONTRACTOR, for itself, and its assignees and successors in interest, agrees as follows:
Technical Security Controls. A. Workstation/Laptop Encryption. All workstations and laptops, which use, store and/or process PII, must be encrypted using a FIPS 140-2 certified algorithm 128 bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk. It is encouraged, when available and when feasible, that the encryption be 256 bit.
Technical Security Controls. Access Policy
Technical Security Controls. 32 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 33 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 34 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 35 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 36 COUNTY.
1 b. Server Security. Servers containing unencrypted PHI COUNTY discloses to 2 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 3 must have sufficient administrative, physical, and technical controls in place to protect that data, based 4 upon a risk assessment/system security review.
5 c. Minimum Necessary. Only the minimum necessary amount of PHI COUNTY discloses 6 to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 7 required to perform necessary business functions may be copied, downloaded, or exported.
8 d. Removable media devices. All electronic files that contain PHI COUNTY discloses to 9 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY
Technical Security Controls. A. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.