Common use of Data Encryption Clause in Contracts

Data Encryption. 3.1 The Consultant shall encrypt all non-public County data in transit regardless of the transit mechanism. 3.2 The Consultant shall encrypt all non-public County data at rest. 3.3 The Consultant’s encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements.

Appears in 5 contracts

Sources: Consulting Agreement, Consulting Agreement, Consultant Services Agreement

Data Encryption. 3.1 The Consultant Contractor shall encrypt all non-public County data in transit regardless of the transit mechanism. 3.2 The Consultant Contractor shall encrypt all non-public County data at rest. 3.3 The ConsultantContractor’s encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements.

Appears in 5 contracts

Sources: Professional Services Agreement, Agreement for Mentoring and Support Services, Contract

Data Encryption. 3.1 The Consultant Contractor shall encrypt all non-public County data in transit regardless of the transit mechanism. 3.2 The Consultant Contractor shall encrypt all non-public County data at rest. 3.3 The Consultant’s encryption Encryption algorithms shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security RequirementsAES-128 or better.

Appears in 3 contracts

Sources: Professional Services Contract, Professional Services Contract, Professional Services Contract

Data Encryption. 3.1 2.1 The Consultant Contractor shall encrypt all non-public County data in transit regardless of the transit mechanism. 3.2 2.2 The Consultant Contractor shall encrypt all non-public County data at rest. 3.3 2.3 The ConsultantContractor’s encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements.

Appears in 1 contract

Sources: Service Agreement

Data Encryption. 3.1 The Consultant Contractor shall encrypt all non-public County data Data in transit regardless of the transit mechanism. 3.2 The Consultant shall encrypt all . All non-public County data Data stored by the Contractor on Contractor- administered devices/systems, will also be encrypted when at rest. Encryption method must comply with the Federal Bureau of Investigation Criminal Justice Information Services (CJIS) Security Policy. 3.3 The Consultant’s encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements.

Appears in 1 contract

Sources: Information Systems Agreement