Common use of Cryptography Clause in Contracts

Cryptography. Empower uses cryptography techniques that assist Empower with preventing the unauthorized capture, modification of or access to data or inf ormation. Empower uses standard encryption algorithms that f ollow up-to-date encryption standards and industry practices. Such cryptography techniques may include but are not limited to: encryption of sensitive data sent across external communication lines; requirement of minimum 128-bit encryption TLS encryption f or web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.

Appears in 1 contract

Sources: Master Services Agreement

Cryptography. Empower uses cryptography techniques that assist Empower with preventing the unauthorized capture, modification of or access to data or inf ormationinformation. Empower uses standard encryption algorithms that f ollow follow up-to-date encryption standards and industry practices. Such cryptography techniques may include but are not limited to: encryption of sensitive data sent across external communication lines; requirement of minimum 128-bit encryption TLS encryption f or for web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.

Appears in 1 contract

Sources: Master Services Agreement

Cryptography. Empower uses cryptography techniques that assist Empower with preventing the unauthorized capture, modification of or access to data or inf ormationinformation. Empower uses standard encryption algorithms that f ollow follow up-to-date encryption standards and industry practices. Such cryptography techniques may include but are not limited to: encryption of sensitive data sent across external communication lines; requirement of minimum 128-bit encryption TLS encryption f or web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.requirement

Appears in 1 contract

Sources: Comprehensive Defined Benefit and Defined Contribution Administrative and Investment Services Agreement

Cryptography. Empower uses cryptography Cryptography techniques that assist Empower with preventing the unauthorized capture, modification of or access to data or inf ormation. Empower uses standard encryption algorithms that f ollow up-to-date encryption standards and industry practicesinformation on the recordkeeping system. Such cryptography Cryptography techniques may include but are not limited to: : a. encryption of sensitive data sent across external communication lines; and b. requirement of minimum 128-bit encryption TLS SSL encryption f or for web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.

Appears in 1 contract

Sources: Wisconsin Deferred Compensation Program Contract