Wireless Networking. 68. When using radio frequency (RF) based wireless networking technologies to perform or support Services for AT&T, ensure that all of AT&T’s Information transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of AT&T’s Information; provided, however, that in any event such encryption shall use no less than key lengths of 256-bits for symmetric encryption and 256-bits for asymmetric encryption. Exception: The use of RF-based wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement.
Appears in 3 contracts
Samples: To Agreement (Amdocs LTD), Telemarketing Agreement (StarTek, Inc.), Amdocs LTD
Wireless Networking. 68. When using radio frequency (RF) based wireless networking technologies to perform or support Services for AT&T, ensure that all of AT&T’s Information transmitted is protected by the use of appropriate encryption technologies sufficient to protect the confidentiality of AT&T’s Information; provided, however, that in any event such encryption shall use no less than key lengths of 256-bits for symmetric encryption and 256-bits for asymmetric encryption. Exception: The use of RF-based wireless headsets, keyboards, microphones, and pointing devices, such as mice, touch pads, and digital drawing tablets, is excluded from this requirement.. Connectivity Requirements Connectivity requirements are not applicable to services being provided under this agreement. Supplier is prohibited from any form of connectivity into AT&T’s non-public network to provide services under this agreement
Appears in 1 contract
Samples: Resale Agreement (Mobileiron, Inc.)