Data Encryption definition

Data Encryption refers to enciphering data with a NIST-approved algorithm or cryptographic module using a NIST-approved key length. Encryption must be applied in such a way that it renders data unusable to anyone but the authorized users.
Data Encryption refers to ciphers, algorithms or other mechanisms that will encode data to protect its confidentiality. Data encryption can be required during data transmission or data storage depending on the level of protection required.
Data Encryption means securing data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it.

Examples of Data Encryption in a sentence

  • The Passive Authentication Mechanism and the Data Encryption are performed completely and independently of the TOE by the TOE environment.

  • Encryption must be through an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard or Triple Data Encryption Standard, in accordance with Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, as required by GSA policy.

  • Connections between all components of the Tribal Lottery System shall only be through the use of secure communication protocols which are designed to prevent unauthorized access or tampering, employing Data Encryption Standards (DES) or equivalent encryption with changeable seeds or algorithms.

  • Sessions (or files) must be encrypted with an approved NIST algorithm, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules.

  • The ICAO defines the baseline security methods Passive Authentication and the optional advanced security methods Basic Access Control to the logical MRTD, Active Authentication of the MRTD’s chip, Extended Access Control to and the Data Encryption of sensitive biometrics as optional security measure in the ICAO Doc 9303 [ICAO-9303].

  • Encryption must be via an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules per GSA policy.

  • The Passive Authentication Mechanism and the Data Encryption are performed completely and independently on the TOE by the TOE environment.

  • The ICAO defines the baseline security methods Passive Authentication and the optional advanced security methods Basic Access Control to the logical MRTD, Active Authentication of the MRTD’s chip, Extended Access Control to and the Data Encryption of additional sensitive biometrics as optional security measure in the ICAO Doc 9303 [ICAO-9303].

  • Any sensitive State Data transmitted over a network, or taken off site via removable media must be encrypted pursuant to the State’s Data encryption standard ITS-SEC-01 Data Encryption and Cryptography.

  • Communications network secu- rity that utilizes the Data Encryption Standard algorithm to encrypt the PIN, at a minimum, from the point of entry.


More Definitions of Data Encryption

Data Encryption. CE shall store all TDA data in encrypted form, using a commercially supported encryption solution. CE further shall ensure that any and all TDA data defined as personally identifiable information under current regulations is likewise encrypted. Encryption solutions will be deployed with no less than a 128-bit key. Data Re-Use: CE shall ensure that any and all data exchanged shall be used expressly and solely for the purposes enumerated in the Agreement. Data shall not be distributed, repurposed, or shared across other applications, environments, or business units of CE. CE further shall ensure that no TDA data of any kind shall be transmitted, exchanged, or otherwise passed to other vendors or interested parties except as specifically required to operate the TEFAP. If data is shared with a vendor to operate the TEFAP, the same security requirements apply to the CE’s third party vendor. Any other release of information requires specific agreement in writing by TDA. End of Agreement Data Handling: Notwithstanding the recordkeeping and retention requirements in this Agreement, CE agrees that, upon termination of the Agreement, it shall erase, destroy, and render unrecoverable all TDA data; and certify in writing that these actions have been completed within 30 days of termination of this Agreement or within 7 days of the request of an authorized TDA official, whichever comes first. CE also warrants that if hardware is replaced during the Agreement period, the same destruction rules apply. The conditions in paragraph apply only to TDA-provided data. Security Breach Notification: CE shall comply with all applicable laws that require the notification of individuals in the event of unauthorized release of personal identification information or other event requiring notification. In the event of a breach of any of CE’s security obligations or other event requiring notification under applicable law, CE shall notify the following individuals within 48 hours: Information Security Officer Financial Services Division Texas Department of Agriculture 000-000-0000 Assistant Commissioner Food and Nutrition Division Texas Department of Agriculture 000-000-0000
Data Encryption means securing data into another form, or code, so that only people with access to a secret key (formally called a decryption key) or password can read it.Encrypted data is commonly referred to as ciphertext, while unencrypted data is called plaintext.
Data Encryption means the ability to protect the integrity and authenticity of stored and/or transmitted data through the use of technologies which makes the data unreadable except for those possessing a key, right etc. to unlock/read the data;

Related to Data Encryption

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.

  • Interface means the mixture occurring in pipeline operations between adjoining batches having similar or dissimilar physical characteristics.

  • Interfaces means, collectively, the CAD Interface and the Channel Access Interface.

  • Server Software means software that provides services or functionality on a computer acting as a server.

  • Customer Data means any content, materials, data and information that Authorized Users enter into the production system of a Cloud Service or that Customer derives from its use of and stores in the Cloud Service (e.g. Customer-specific reports). Customer Data and its derivatives will not include SAP’s Confidential Information.

  • Database means the Commercial Driver Alcohol and Drug Testing Database of the Office of Driver Services of the Arkansas Department of Finance and Administration.

  • SMS means short message service provided by your mobile service provider which:

  • End User Data means any information or data of any kind that personally identifies (or that can be used, together with other information or data, to personally identify) an End User.