Encryption and Decryption Clause Samples
The 'Encryption and Decryption' clause establishes requirements for securing data by mandating that information be encrypted during storage and transmission. In practice, this means that sensitive data, such as personal information or confidential business records, must be protected using industry-standard encryption methods, both when it is saved on devices and when it is sent over networks. This clause serves to safeguard data from unauthorized access or breaches, ensuring compliance with privacy regulations and reducing the risk of data theft or loss.
Encryption and Decryption. The Approved UHD Content Protection System shall use AES (as specified in NIST FIPS-197) with a key length of 128 bits or greater, DVB-CSA3 or other encryption algorithm approved in writing by Licensor. DVB-CSA (version 1) is NOT approved. New keys must be generated each time content is encrypted (though different instances of the same title on the same service may be encrypted with the same key). A single key shall not be used to encrypt more than one piece of content or more data than is considered cryptographically secure. The random number generator (RNG) used for key generation shall be cryptographically secure and shall be on the list of RNGs approved in FIPS 140-2 Annex C. The content protection system shall only decrypt content into memory temporarily for the purpose of decoding and rendering the content and shall never write decrypted content (including, without limitation, portions of the decrypted content) or streamed encrypted content into permanent storage. Memory locations used to temporarily hold decrypted content shall be secured from access by any code running outside of the Trusted Execution Environment and any trusted application other than the content protection system trusted application(s). (A "Trusted Execution Environment" or "TEE" is a computing environment which is isolated from the application execution environment using a security mechanism such as a verified implementation of ARM TrustZone, hardware enforced virtualization, a separate security processor or processor core or other similar security technology.). Decrypted content shall be securely deleted and overwritten as soon as possible after the content has been decoded and passed to rendering functions. Keys, passwords, and any other information that are critical to the cryptographic strength of the Approved UHD Content Protection System (“critical security parameters”, CSPs) may never be transmitted or permanently or semi-permanently stored in unencrypted form. Memory locations used to temporarily hold CSPs must be secured from access by any code running outside of the Trusted Execution Environment and any trusted application other than the content protection system trusted application(s). Where decrypted content is carried on buses or data paths that are accessible with Widely Available Tools or Specialized Tools it must be encrypted, for example during transmission to the graphics or video subsystem for rendering. The Approved UHD Content Protection System shall encrypt ...
Encryption and Decryption. Contractor shall furnish encryption and decryption software compatible with DOL's software to ensure security and confidentiality.
Encryption and Decryption. As appropriate and consistent with guidelines established by the Security Officer, ePHI will be encrypted when stored and decrypted for use.
Encryption and Decryption. This subsection considers the braid cryptosystem proposed in chapter 3. The encryption and decryption scheme is as follows.
Encryption and Decryption. All content in Your Submissions (including data, material, communications or information, in any format whatsoever, including, without limitation, any data files, text, computer software, images, graphics, photos, videos, sound, audio files, recordings directories, documents, that is made available on or transmitted through eProQ by you, your employees, directors, representatives or agents) (“Your Content”) shall be encrypted for security reasons when uploaded or submitted by you and transmitted through eProQ. You agree that any of Your Content that is so encrypted shall be complete and accurate after decryption and in any event, you accept any error, misstatement or omission that may occur upon decryption or encryption.
Encryption and Decryption. GCHD has determined that it is appropriate to implement encryption software on systems that contain ePHI.
a. All employees who transmit ePHI via email must encrypt the email before sending the information to a party outside of the GCHD network.
b. Employees are prohibited from sending ePHI over non-secured networks. AS 3.3.3, Termination Procedure AS 3.5.5, Password Management AS 3.7, Contingency Plan PS 4.1.1, Contingency Operations PS 4.2, Workstation Use PS4.3, Workstation Security TS 5.2, Audit Controls TS 5.3, Integrity Controls TS 5.4, Authentication of Entity or Person TS5.5.2, Encryption 45 C.F.R. § 164.312(a) Effective Date: 9/26/2013 GCHD will implement hardware, software, and/or procedural mechanisms that record and examine activity occurring on organizational information systems that contain or use ePHI.
Encryption and Decryption. The three entities A, B and C may use their common key for encrypting and decrypting the messages.
