File Encryption Sample Clauses

File Encryption. Protecting sensitive contact information is important in the business environment. The WorldCard software recognizes the importance of sensitive data and allows you to protect that data from unauthorized access. To protect your WorldCard database from unauthorized access, WorldCard offers you an automatic file encryption with password protection. You can encrypt your WorldCard data- base by the following procedure. On the File menu, click File encryption. The File encryption dialog box appears. If you wish to use File encryption, select Use file encryption. With Use file encryption selected, you may use the File Encryption option with password protection. When the Set Password/ Change Password option is selected, the password option is available for you to enter your appropriate password options.
AutoNDA by SimpleDocs
File Encryption. Protecting sensitive contact information is important in the business environment. The WorldCard software recognizes the importance of sensitive data and allows you to protect that data from unauthorized access. To protect your WorldCard database from unauthorized access, WorldCard offers you an automatic file encryption with password protection. You can encrypt your WorldCard data- base by the following procedure. On the File menu, click File encryption. The File encryption dialog box appears. If you wish to use File encryption, select Use file encryption.
File Encryption. Each Union representative will be provided with an unencrypted thumb drive upon request to the HITS national help desk.
File Encryption. The devices utilized to copy and/or extract the source data files at the partner facilities, host those files in transit, and load the file contents into the CAAL-Skills pilot project central repository will be encrypted with full-disk AES 256-bit hardware-based encryption. More details on the devices will be offered in a following section. Due to the use of hardware-based encryption the data files will not require additional encryption.

Related to File Encryption

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Internet Connectivity School must provide sufficient hardline internet connectivity and the required network configurations (provided in Exhibit A) for each Pixellot System to allow live broadcasts. PlayOn will provide the point-to-point wireless internet base station (“Point to Point”) when needed to deliver hardline internet connectivity to Pixellot Systems installed in outdoor venues; provided that PlayOn is able to select the make and model of the Point to Point system. In the event that School requests, or requires, a specific Point to Point system that is different from what is provided by PlayOn, then School must provide and install the Point to Point system at its own expense.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Encrypt or Encryption As defined in the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule at 45 CFR 164.304, means the use of an algorithmic process to transform Personally Identifiable Information into an unusable, unreadable, or indecipherable form in which there is a low probability of assigning meaning without use of a confidential process or key.

  • Mobile Phones The Company’s expectations in relation to the use of Company provided mobile phones are outlined in Company policy HR-P13. If an Employee is provided with a mobile phone by the Company, the Employee shall be liable for the cost of excessive private telephone calls. Employees agree to make themselves contactable via their personal mobile phone to receive instructions from their supervisors, with the Company reimbursing Employees the cost of any such telephone calls. It is not a condition of employment to own a mobile phone. No Employee shall be engaged in private telephone conversations whilst at work with the exception of designated breaks and in emergency situations. The Company will not be liable for the repair or replacement of personal mobile phones.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Time is Money Join Law Insider Premium to draft better contracts faster.