Transmission Control. In-transit: We make HTTPS encryption (also referred to as SSL or TLS) available on every one of its login interfaces and for free on every customer site hosted on the HubSpot products. Our HTTPS implementation uses industry standard algorithms and certificates. At-rest: We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.
Transmission Control. Procedures to prevent Customer Data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media and to ensure that it is possible to check and establish to which bodies the transfer of Customer Data by means of data transmission facilities is envisaged, to include:
a. use of firewall and encryption technologies to protect the gateways and pipelines through which the data travels;
b. implementation of encrypted connections to safeguard the connection to Humanity systems;
c. constant monitoring of infrastructure (e.g. ICMP-Ping at network level, disk space examination at system level, successful delivery of specified test pages at application level); and
d. monitoring of the completeness and correctness of the transfer of data (end-to-end check).
Transmission Control. Except as otherwise specified for the Cloud Services (including within the ordering document or the applicable service specifications), transfers of data outside the Cloud Service environment are encrypted. Some Cloud Services, such as social media services, may be configurable to permit access to sites that require unencrypted communications. The content of communications (including sender and recipient addresses) sent through some email or messaging services may not be encrypted. Customer is solely responsible for the results of its decision to use unencrypted communications or transmissions.
Transmission Control. This includes all variants of the transfer of personal data by means of data storage devices or communication networks. The transmission control should prevent data from being used without authorisation while being transmitted (read, copied, changed, or removed/deleted). The term transfer includes both the transfer to third parties and the transfer within the framework of order processing between the client and contractor and to the data subject.
Transmission Control. DocuSign Envelope ID: CCF1FB4B-34E5-43F8-9502-A0796D702BCD In-transit: We require HTTPS encryption (also referred to as SSL or TLS) on all login interfaces and for free on every customer site hosted on the HubSpot products. Our HTTPS implementation uses industry standard algorithms and certificates. At-rest: We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.
Transmission Control. XXXXxx.xxx has implemented suitable measures to prevent Personal Data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media. This is accomplished by: ● Use of adequate firewall and encryption technologies to protect the gateways and pipelines through which the data travels; ● Sensitive Personal Data is encrypted during transmission using up to date versions of TLS or other security protocols using strong encryption algorithms and keys; ● Protecting web-based access to account management interfaces by employees through encrypted TLS ● End-to-end encryption of screen sharing for remote access, support, or real time communication.
Transmission Control. Bugcrowd implements suitable measures to prevent the personal data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media. This is accomplished by: • use of state-of-the-art firewall and encryption technologies to protect the gateways and pipelines through which the data travels; • as far as possible, all data transmissions are logged, monitored and tracked; and • monitoring of the completeness and correctness of the transfer of data (end-to-end check).
Transmission Control. In-transit: All data in transit is encrypted using 128-bit+ TLS 1.2 over TCP/IP using a 2048-bit certificate and strong cipher suites. At-rest: Passwords are encrypted with the “PBKDF2WithHmacSHA1” algorithm which includes salted password hashing with key stretching. This method ensures best of class protection against dictionary, rainbow table and brute force attacks. Data at rest is encrypted using the Advanced Encryption Standard (AES 256).
Transmission Control. In-transit: Strikedeck makes HTTPS encryption (also referred to as SSL or TLS) available on every one of its login interfaces. Strikedeck’s HTTPS implementation uses industry standard algorithms and certificates. At-rest: Strikedeck stores user passwords as one-way hashes.
Transmission Control. Where personal data is transmitted through a public network (e.g., the internet) to and from an external third party, the information must be encrypted first or sent via a secure channel.