Transmission Control Clause Samples
The Transmission Control clause establishes the rules and procedures for managing the transfer of data or information between parties. Typically, it outlines the technical standards, security protocols, and responsibilities for ensuring that transmissions are accurate, secure, and timely. For example, it may specify encryption requirements or designate which party is responsible for monitoring data integrity during transmission. The core function of this clause is to minimize the risk of data loss, unauthorized access, or miscommunication by clearly defining how transmissions are to be controlled and safeguarded.
POPULAR SAMPLE Copied 2 times
Transmission Control. In-transit: We make HTTPS encryption (also referred to as SSL or TLS) available on every one of its login interfaces and for free on every customer site hosted on the HubSpot products. Our HTTPS implementation uses industry standard algorithms and certificates. At-rest: We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.
Transmission Control. Except as otherwise specified for the Cloud Services (including within the ordering document or the applicable service specifications), transfers of data outside the Cloud Service environment are encrypted. Some Cloud Services, such as social media services, may be configurable to permit access to sites that require unencrypted communications. The content of communications (including sender and recipient addresses) sent through some email or messaging services may not be encrypted. Customer is solely responsible for the results of its decision to use unencrypted communications or transmissions.
Transmission Control. This includes all variants of the transfer of personal data by means of data storage devices or communication networks. The transmission control should prevent data from being used without authorisation while being transmitted (read, copied, changed, or removed/deleted). The term transfer includes both the transfer to third parties and the transfer within the framework of order processing between the client and contractor and to the data subject.
Transmission Control. Procedures to prevent Customer Data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media and to ensure that it is possible to check and establish to which bodies the transfer of Customer Data by means of data transmission facilities is envisaged, to include:
a. use of firewall and encryption technologies to protect the gateways and pipelines through which the data travels;
b. implementation of encrypted connections to safeguard the connection to Humanity systems;
c. constant monitoring of infrastructure (e.g. ICMP-Ping at network level, disk space examination at system level, successful delivery of specified test pages at application level); and
d. monitoring of the completeness and correctness of the transfer of data (end-to-end check).
Transmission Control. DocuSign Envelope ID: CCF1FB4B-34E5-43F8-9502-A0796D702BCD In-transit: We require HTTPS encryption (also referred to as SSL or TLS) on all login interfaces and for free on every customer site hosted on the HubSpot products. Our HTTPS implementation uses industry standard algorithms and certificates. At-rest: We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.
Transmission Control. ▇▇▇▇▇▇.▇▇▇ has implemented suitable measures to prevent Personal Data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media. This is accomplished by: ● Use of adequate firewall and encryption technologies to protect the gateways and pipelines through which the data travels; ● Sensitive Personal Data is encrypted during transmission using up to date versions of TLS or other security protocols using strong encryption algorithms and keys; ● Protecting web-based access to account management interfaces by employees through encrypted TLS ● End-to-end encryption of screen sharing for remote access, support, or real time communication.
Transmission Control. Bugcrowd implements suitable measures to prevent the personal data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media. This is accomplished by: • use of state-of-the-art firewall and encryption technologies to protect the gateways and pipelines through which the data travels; • as far as possible, all data transmissions are logged, monitored and tracked; and • monitoring of the completeness and correctness of the transfer of data (end-to-end check).
Transmission Control. In-transit: All data in transit is encrypted using 128-bit+ TLS 1.2 over TCP/IP using a 2048-bit certificate and strong cipher suites. At-rest: Passwords are encrypted with the “PBKDF2WithHmacSHA1” algorithm which includes salted password hashing with key stretching. This method ensures best of class protection against dictionary, rainbow table and brute force attacks. Data at rest is encrypted using the Advanced Encryption Standard (AES 256).
Transmission Control. Procedures to prevent Client Data from being read, copied, altered or deleted by unauthorized parties during the transmission thereof or during the transport of the data media and to ensure that it is possible to check and establish to which bodies the transfer of Client Data by means of data transmission facilities is envisaged, to include:
a. use of firewall and encryption technologies to protect the gateways and pipelines through which the data travels;
b. implementation of encrypted connections to safeguard the connection to TCP systems;
c. constant monitoring of infrastructure (e.g. ICMP-Ping at network level, disk space examination at system level, successful delivery of specified test pages at application level); and
d. monitoring of the completeness and correctness of the transfer of data (end-to-end check).
e. In-transit: We require HTTPS encryption (TLS1.2 or higher) (also referred to as SSL or TLS) on all login interfaces and on every client subdomain hosted on the TCP product. Our HTTPS implementation uses industry standard algorithms and certificates.
f. At-rest: All data at rest are encrypted with AES-256 encryption. We have implemented all security best practies to ensure that stored data is encrypted at the proper way.
Transmission Control. Measures to ensure that personal data cannot be read, copied, modified or removed without authorization during electronic transmission or transport. Measures to ensure and that it is possible to check and establish to which bodies the transfer of personal data by means of data transmission facilities is envisaged. Measures to ensure, that an automated procedure for the retrieval of personal data is running a log procedure in order to have retrospect information which data has been retrieved by whom. • Determination of authorized person for transmission and transport • Documentation of the retrieval and transmission programs • Determination and documentation of the transmission procedure and the data receivers • Protocol of data transmission and receivers • Regulations and instructions for data media transport and transmission control • Secured data lines • Use of cryptographic procedures as far as useful or mandatory
