Cryptography. Empower uses cryptography techniques that assist Empower with preventing the unauthorized capture, modification of or access to data or inf ormation. Empower uses standard encryption algorithms that f ollow up-to-date encryption standards and industry practices. Such cryptography techniques may include but are not limited to: encryption of sensitive data sent across external communication lines; requirement of minimum 128-bit encryption TLS encryption f or web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.
Appears in 1 contract
Sources: Master Services Agreement
Cryptography. Empower uses cryptography techniques that assist Empower with preventing the unauthorized capture, modification of or access to data or inf ormationinformation. Empower uses standard encryption algorithms that f ollow follow up-to-date encryption standards and industry practices. Such cryptography techniques may include but are not limited to: encryption of sensitive data sent across external communication lines; requirement of minimum 128-bit encryption TLS encryption f or for web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.
Appears in 1 contract
Sources: Master Services Agreement
Cryptography. Empower uses cryptography techniques that assist Empower with preventing the unauthorized capture, modification of or access to data or inf ormationinformation. Empower uses standard encryption algorithms that f ollow follow up-to-date encryption standards and industry practices. Such cryptography techniques may include but are not limited to: encryption of sensitive data sent across external communication lines; requirement of minimum 128-bit encryption TLS encryption f or web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.requirement
Appears in 1 contract
Cryptography. Empower uses cryptography Cryptography techniques that assist Empower with preventing the unauthorized capture, modification of or access to data or inf ormation. Empower uses standard encryption algorithms that f ollow up-to-date encryption standards and industry practicesinformation on the recordkeeping system. Such cryptography Cryptography techniques may include but are not limited to: :
a. encryption of sensitive data sent across external communication lines; and
b. requirement of minimum 128-bit encryption TLS SSL encryption f or for web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.
Appears in 1 contract