Common use of Cryptography Clause in Contracts

Cryptography. a. Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Jamf will implement Industry Standard key management policies and practices designed to protect encryption keys for their entire lifetime.

Appears in 2 contracts

Sources: Data Sharing and Confidentiality Agreement, Data Sharing/Use Agreement

Cryptography. a. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard industry standard key management policies and practices designed to protect encryption keys for their entire lifetime.

Appears in 2 contracts

Sources: Data Processing Agreement, Data Processing Agreement

Cryptography. a. a) Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard key management policies and practices designed to protect encryption keys for their entire lifetime.

Appears in 2 contracts

Sources: Data Processing Agreement, Data Processing Agreement

Cryptography. a. Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Such protections will include the pseudonymization and encryption of Personal Data, as further detailed below in Section 9. Jamf will implement Industry Standard industry standard key management policies and practices designed to protect encryption keys for their entire lifetime.

Appears in 1 contract

Sources: Data Processing Agreement