Encryption of Data at Rest Clause Samples

The 'Encryption of Data at Rest' clause requires that all data stored on physical or virtual storage devices is protected using encryption methods. In practice, this means that any sensitive or confidential information saved on servers, databases, or backup media must be encrypted to prevent unauthorized access in the event of a security breach or physical theft. The core function of this clause is to safeguard stored data from exposure, thereby reducing the risk of data breaches and ensuring compliance with data protection standards.
POPULAR SAMPLE Copied 1 times
Encryption of Data at Rest. The Contractor shall ensure hard drive encryption of mobile devices storing Purchasing Entity Data is consistent with commercially available validated cryptography standards.
Encryption of Data at Rest. The Contractor shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all Personal Data, unless the Purchasing Entity approves in writing for the storage of Personal Data on a Contractor portable device in order to accomplish work as defined in the statement of work.
Encryption of Data at Rest. The service provider shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all personal data, unless the City approves the storage of personal data on a service provider portable device in order to accomplish work as defined in the statement of work.
Encryption of Data at Rest. Covered Defense Information (CDI) and Covered Contractor Information Systems (CCIS) are defined within clause 252.204-7012. Information at rest is defined as the state of information when it is not in process or in transit and is located on storage devices as specific components of systems. On all CCISs, the Contractor shall encrypt CDI at rest in accordance with NIST 800-171.
Encryption of Data at Rest. The Service Provider shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all personal data, unless the public jurisdiction approves the storage of personal data on a Service Provider portable device in order to accomplish work as defined in the statement of work. City OF FAIRFIELD TECHNOLOGY SOFTWARE-AS-A-SERVICE (SaaS) AGREEMENT City OF FAIRFIELD TECHNOLOGY SOFTWARE-AS-A-SERVICE (SaaS) AGREEMENT 1. The price for Services rendered by Service Provider of the following: a. Insight Enterprise Subscription b. Perform Subscription c. Onboard Subscription d. Learn Subscription e. Single Sign On (SSO) f. Candidate Text Messaging g. Course Management Import h. Custom Employee Integration ▇. ▇▇▇▇▇▇ Software Year 1 – July 1, 2024 to June 30, 2025 $100,511.92 Year 2 – July 1, 2025 to June 30, 2026 $107,045.20 Year 3 – July 1, 2026 to June 30, 2027 $114,003.15 2. City shall pay Service Provider within 30 days after receipt of Service Provider’s invoice. 3. The obligation to pay for Services commences on the Effective Date.
Encryption of Data at Rest. The User shall ensure hard drive encryption consistent with validated cryptography standards as referenced in FIPS 140-2, Security Requirements for Cryptographic Modules for all Confidential Data, unless the State approves the storage of Confidential Data on a User portable device in order to accomplish Contract work.

Related to Encryption of Data at Rest

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Contract Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any business continuity plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any) If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Customer may: require the Supplier (at the Suppliers expense) to restore or procure the restoration of Customer Data as required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so as required by the Customer.

  • Data Encryption 2.1. For all COUNTY data, The CONTRACTOR shall encrypt all non-public data in transit regardless of the transit mechanism. 2.2. For all COUNTY data, if the CONTRACTOR stores sensitive personally identifiable or otherwise confidential information, this data shall be encrypted at rest. Examples are social security number, date of birth, driver’s license number, financial data, federal/state tax information, and hashed passwords. 2.3. For all COUNTY data, the CONTRACTOR’S encryption shall be consistent with validated cryptography standards as specified in National Institute of Standards and Technology Security Requirements as outlined at ▇▇▇▇://▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.