Data Encryption. 3.1 The Consultant shall encrypt all non-public County data in transit regardless of the transit mechanism. 3.2 The Consultant shall encrypt all non-public County data at rest. 3.3 The Consultant’s encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements.
Appears in 5 contracts
Sources: Consulting Agreement, Consulting Agreement, Consultant Services Agreement
Data Encryption. 3.1 The Consultant Contractor shall encrypt all non-public County data in transit regardless of the transit mechanism.
3.2 The Consultant Contractor shall encrypt all non-public County data at rest.
3.3 The ConsultantContractor’s encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements.
Appears in 5 contracts
Sources: Professional Services Agreement, Agreement for Mentoring and Support Services, Contract
Data Encryption. 3.1 The Consultant Contractor shall encrypt all non-public County data in transit regardless of the transit mechanism.
3.2 The Consultant Contractor shall encrypt all non-public County data at rest.
3.3 The Consultant’s encryption Encryption algorithms shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security RequirementsAES-128 or better.
Appears in 3 contracts
Sources: Professional Services Contract, Professional Services Contract, Professional Services Contract
Data Encryption. 3.1 2.1 The Consultant Contractor shall encrypt all non-public County data in transit regardless of the transit mechanism.
3.2 2.2 The Consultant Contractor shall encrypt all non-public County data at rest.
3.3 2.3 The ConsultantContractor’s encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements.
Appears in 1 contract
Sources: Service Agreement
Data Encryption. 3.1 The Consultant Contractor shall encrypt all non-public County data Data in transit regardless of the transit mechanism.
3.2 The Consultant shall encrypt all . All non-public County data Data stored by the Contractor on Contractor- administered devices/systems, will also be encrypted when at rest. Encryption method must comply with the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy.
3.3 The Consultant’s encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements.
Appears in 1 contract
Sources: Information Systems Agreement