Workstation Encryption Sample Clauses

Workstation Encryption. Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.
AutoNDA by SimpleDocs
Workstation Encryption. Jamf will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by personnel, contractors, and agents where such personnel are accessing or processing Customer Content.
Workstation Encryption. Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data. SCHEDULE A COMPLIANCE ACKNOWLEDGEMENT AND CERTIFICATION 1. Has not (other than to the extent disclosed to Accenture in writing in connection with this Certification) and will not violate the U.S. Foreign Corrupt Practices Act, the U.K. Bribery Act, or other applicable anti-corruption and anti-money laundering laws (collectively “the Anticorruption Laws”), or otherwise offer or give money or anything of value to any person, in order to obtain or retain business for the benefit of Accenture or Business Intermediary, or to secure any other improper advantage for Accenture or Business Intermediary; 2. Has kept and continues to keep accurate financial records that timely, completely, precisely, fairly, and accurately reflect all financial transactions of Business Intermediary, will not submit any false or inaccurate invoices to Accenture or otherwise falsify any documents related to services performed for Accenture, and will submit true and adequate documentation with all invoices, including: a) an explanation of the services provided during the period covered by the invoice; and b) itemized expenses incurred, accompanied by receipts (or other documentation if a receipt is unavailable) identifying the payment date, amount and purpose of the expense; 3. Will not provide any gifts, meals, or entertainment to, or pay for the travel expenses of, any third party in connection with the Services, without the advance written approval of Accenture, and any such expenses shall comply with all applicable laws as well as the internal policies of the recipient’s employer; 4. Will promptly notify Accenture in writing in the event that [Business Intermediary] fails to comply with the provisions of this Certification, or becomes aware of any violation or potential violation of The Anticorruption Laws, by Business Intermediary or otherwise related to the services performed for Accenture; 5. [FOR INDIVIDUALS ONLY: Is not a Public Official and has no immediate family members who are Public Officials (other than those disclosed to Accenture in writing in connection with this Certification) and will notify Accenture if he/she, or any member of his/her immediate family, becomes a Public Official or if a Public Official takes an ownership interest in Business Intermediary...
Workstation Encryption. Provider will require Industry Standard full disk encryption on all workstations and/or laptops used by personnel, contractors and agents where such personnel are accessing or processing Accenture Data.
Workstation Encryption. Supplier will require hard disk encryption of at least 256- bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data. DOING BUSINESS WITH ACCENTURE OPERATIONS SERVICES PVT. LTD. GUIDELINES To help us to ensure timely payment of your invoices, a supplier's guide to invoicing Accenture Operations services Pvt. Ltd. is available at: xxxxx://xxx.xxxxxxxxx.xxx/us- en/about/company-suppliers-guide (Please scroll down to select the relevant location – India) This supplier's guide includes information about: • Establishing and Maintaining Your Accenture Operations services Pvt. Ltd. Supplier Profile • Preparing Invoices for Accenture Operations services Pvt. Ltd. • Submitting Invoices to Accenture Operations services Pvt. Ltd.

Related to Workstation Encryption

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!