Transfer Format. Transfers may include, but are not limited to, conversion of all Data into or from an industry standard format or providing application programmable interface. Data must be encrypted at all times unless specifically outlined otherwise in the Authorized User Agreement. The RFQ must specify whether encryption is to be done by the Contractor or by the Authorized User. At a minimum, encryption must be carried out in accordance with the most current NIST FIPS-140 standard, with key access restricted to the Authorized User only, unless with the express written permission of the Authorized User. For Authorized Users subject to NYS security policies/standards (see Section 1.2), encryption must be handled in accordance with NYS-S14-007 (or successor) Encryption Standard. The Authorized User Agreement shall specify the respective responsibilities of the Authorized User and the Contractor for the encryption of Data.
Appears in 52 contracts
Samples: Contract for the Acquisition of Information Technology Commodities and/or Services, Contract for the Acquisition of Information Technology Commodities and/or Services, Contract for the Acquisition of Information Technology Commodities and/or Services
Transfer Format. Transfers may include, but are not limited to, conversion of all Data into or from an industry standard format or providing application programmable interface. Data must be encrypted at all times unless specifically outlined otherwise in the Authorized User Agreement. The RFQ must specify whether encryption is to be done by the Contractor or by the Authorized User. At a minimum, encryption must be carried out in accordance with the most current NIST FIPS-140 standard, with key access restricted to the Authorized User only, unless with the express written permission of the Authorized User. For Authorized Users subject to NYS security policies/standards (see Section 1.2), encryption must be handled in accordance with NYS-S14-007 (or successor) Encryption Standard. The Authorized User Agreement shall specify the respective responsibilities of the Authorized User and the Contractor for the encryption of Data.. RESERVED RESERVED
Appears in 1 contract