{"component": "clause", "props": {"groups": [{"samples": [{"hash": "gz11Vfomwpo", "uri": "/contracts/gz11Vfomwpo#encryption-technologies", "label": "Data Processing Addendum", "score": 33.0717926025, "published": true}, {"hash": "2nB9vPvskv", "uri": "/contracts/2nB9vPvskv#encryption-technologies", "label": "Data Processing Addendum", "score": 32.6392860413, "published": true}, {"hash": "jwEU6y04g9j", "uri": "/contracts/jwEU6y04g9j#encryption-technologies", "label": "Data Processing Addendum", "score": 32.3737640381, "published": true}], "snippet": "In-transit: We make HTTPS encryption (also referred to as SSL or TLS) available on all of our login interfaces and for free on every customer site hosted on the Zapier products. Our HTTPS implementation uses industry standard algorithms and certificates. At-rest: We store user passwords following policies that follow industry standard practices for security. We have implemented technologies to ensure that stored data is encrypted at rest.", "size": 6, "snippet_links": [{"key": "customer-site", "type": "clause", "offset": [133, 146]}, {"key": "user-passwords", "type": "clause", "offset": [273, 287]}, {"key": "industry-standard-practices", "type": "definition", "offset": [319, 346]}, {"key": "to-ensure", "type": "clause", "offset": [394, 403]}, {"key": "stored-data", "type": "definition", "offset": [409, 420]}], "hash": "0bc714e4436d83c45163ecdca3b742b3", "id": 1}, {"samples": [{"hash": "kKVLtw63WuM", "uri": "/contracts/kKVLtw63WuM#encryption-technologies", "label": "Google Cloud Master Agreement", "score": 35.3465510632, "published": true}, {"hash": "kAGcw50p3Mg", "uri": "/contracts/kAGcw50p3Mg#encryption-technologies", "label": "Google Cloud Master Agreement", "score": 34.1366339539, "published": true}], "snippet": "Google makes HTTPS encryption (also referred to as SSL or TLS connection) available. Google servers support ephemeral elliptic curve \u2587\u2587\u2587\u2587\u2587\u2587-\u2587\u2587\u2587\u2587\u2587\u2587\u2587 cryptographic key exchange", "size": 4, "snippet_links": [{"key": "cryptographic-key", "type": "definition", "offset": [148, 165]}], "hash": "3ecca4f2ac0099b90583ad38c39c8c3d", "id": 2}, {"samples": [{"hash": "4dNSaSk10lA", "uri": "/contracts/4dNSaSk10lA#encryption-technologies", "label": "Data Processing Addendum", "score": 27.3600273132, "published": true}, {"hash": "dWFH5yG72nS", "uri": "/contracts/dWFH5yG72nS#encryption-technologies", "label": "Data Processing Addendum", "score": 26.8685836792, "published": true}, {"hash": "fG4fMhrzEVr", "uri": "/contracts/fG4fMhrzEVr#encryption-technologies", "label": "Data Processing Addendum", "score": 25.1546878815, "published": true}], "snippet": "Algolia\u2019s servers support HTTPS encryption, ephemeral elliptic curve \u2587\u2587\u2587\u2587\u2587\u2587-\u2587\u2587\u2587\u2587\u2587\u2587\u2587 cryptographic key exchange signed with RSA and ECDSA and for supported clients also perfect forward secrecy (PFS) methods to help protect traffic against compromised key or cryptographic breakthrough. Algolia uses only industry standard encryption technologies.", "size": 3, "snippet_links": [{"key": "cryptographic-key", "type": "definition", "offset": [84, 101]}, {"key": "perfect-forward-secrecy", "type": "clause", "offset": [168, 191]}, {"key": "industry-standard", "type": "definition", "offset": [303, 320]}], "hash": "ca0ede6dd5130eb8352dff48f9550d71", "id": 3}, {"samples": [{"hash": "iPiuki8IZ6N", "uri": "/contracts/iPiuki8IZ6N#encryption-technologies", "label": "Data Processing Agreement", "score": 24.7056808472, "published": true}, {"hash": "a3yXPfLI9uc", "uri": "/contracts/a3yXPfLI9uc#encryption-technologies", "label": "Data Processing Amendment", "score": 23.893907547, "published": true}], "snippet": "Google makes HTTPS encryption (also referred to as SSL or TLS) available.", "size": 3, "snippet_links": [], "hash": "2bfebc3e13c693e193dde9d9d8a6604e", "id": 4}, {"samples": [{"hash": "doiXqYyg7Vl", "uri": "/contracts/doiXqYyg7Vl#encryption-technologies", "label": "Data Processing Agreement", "score": 33.5207176208, "published": true}], "snippet": "Google\u2019s security policies mandate encryption at rest for all user data, including personal data. Data is oken encrypted at multiple levels in Google\u2019s production storage stack in data centres, including at the hardware level, without requiring any action by customers. Using multiple layers of encryption adds redundant data protection and allows Google to select the optimal approach based on application requirements. All personal data is encrypted at the storage level, generally using AES256. Google uses common cryptographic libraries which incorporate Google\u2019s FIPS 140-2 validated module, to implement encryption consistently across the Processor Services.", "size": 3, "snippet_links": [{"key": "security-policies", "type": "definition", "offset": [9, 26]}, {"key": "encryption-at-rest", "type": "clause", "offset": [35, 53]}, {"key": "user-data", "type": "clause", "offset": [62, 71]}, {"key": "data-centres", "type": "definition", "offset": [180, 192]}, {"key": "by-customers", "type": "clause", "offset": [256, 268]}, {"key": "data-protection", "type": "definition", "offset": [321, 336]}, {"key": "based-on", "type": "definition", "offset": [386, 394]}, {"key": "application-requirements", "type": "clause", "offset": [395, 419]}, {"key": "all-personal-data", "type": "definition", "offset": [421, 438]}, {"key": "storage-level", "type": "definition", "offset": [459, 472]}, {"key": "processor-services", "type": "clause", "offset": [645, 663]}], "hash": "193e41b069dbb0e20169d14161b11197", "id": 5}, {"samples": [{"hash": "3ZMs8ju2LYj", "uri": "/contracts/3ZMs8ju2LYj#encryption-technologies", "label": "Data Processing Addendum", "score": 34.7662200928, "published": true}, {"hash": "1lrcniV0LxH", "uri": "/contracts/1lrcniV0LxH#encryption-technologies", "label": "Data Processing Addendum", "score": 30.9612808228, "published": true}], "snippet": "Sightengine\u2019s servers support HTTPS encryption, ephemeral elliptic curve \u2587\u2587\u2587\u2587\u2587\u2587-\u2587\u2587\u2587\u2587\u2587\u2587\u2587 cryptographic key exchange signed with RSA and ECDSA and for supported clients also perfect forward secrecy (PFS) methods to help protect traffic against compromised key or cryptographic breakthrough. Sightengine's servers use OCSP stapling to \u2587\u2587\u2587\u2587\u2587\u2587 the presented Certificates. Sightengine uses only industry standard encryption technologies.", "size": 2, "snippet_links": [{"key": "cryptographic-key", "type": "definition", "offset": [88, 105]}, {"key": "perfect-forward-secrecy", "type": "clause", "offset": [172, 195]}, {"key": "ocsp-stapling", "type": "clause", "offset": [315, 328]}, {"key": "industry-standard", "type": "definition", "offset": [389, 406]}], "hash": "fff590bce658475bfc1e3191e73952f7", "id": 6}, {"samples": [{"hash": "DhFdBbRW4E", "uri": "/contracts/DhFdBbRW4E#encryption-technologies", "label": "Data Processing Agreement", "score": 35.2966880798, "published": true}, {"hash": "foxYMPDuxwS", "uri": "/contracts/foxYMPDuxwS#encryption-technologies", "label": "Data Processing Agreement", "score": 34.943561554, "published": true}], "snippet": "Maximl Labs Pvt Ltd makes HTTPS encryption (also referred to as SSL or TLS) available for data in transit.", "size": 2, "snippet_links": [], "hash": "dc091fbd66f0390fa8013f6fb427e723", "id": 7}, {"samples": [{"hash": "gaMAOgOJ8Pr", "uri": "/contracts/gaMAOgOJ8Pr#encryption-technologies", "label": "Data Processing Agreement", "score": 26.7111568451, "published": true}], "snippet": "Provider makes HTTPS encryption (also referred to as SSL or TLS) available for data in transit (excluding email) across untrusted and public networks, where legally required; Customer is required to utilize the same.", "size": 1, "snippet_links": [{"key": "public-networks", "type": "definition", "offset": [134, 149]}, {"key": "legally-required", "type": "definition", "offset": [157, 173]}], "hash": "aa4d24a202a4d08398fd30dc4dbeb5c5", "id": 8}, {"samples": [{"hash": "ejCyhhsTzae", "uri": "/contracts/ejCyhhsTzae#encryption-technologies", "label": "Data Processing Agreement", "score": 25.0657081604, "published": true}], "snippet": "TeleSign makes HTTPS encryption (also referred to as SSL or TLS) available.", "size": 1, "snippet_links": [], "hash": "a5fbd8c5c7d98df150b0993b9e8c4180", "id": 9}, {"samples": [{"hash": "ctXsuUIQNiv", "uri": "/contracts/ctXsuUIQNiv#encryption-technologies", "label": "Google Cloud Platform Terms of Service for G Cloud 14", "score": 33.0336990356, "published": true}], "snippet": "Google makes HTTPS encryption (also referred to as SSL or TLS connection) available and allows for encryption of data in transit. Google servers support ephemeral elliptic curve \u2587\u2587\u2587\u2587\u2587\u2587-\u2587\u2587\u2587\u2587\u2587\u2587\u2587 cryptographic key exchange signed with RSA and ECDSA. These perfect forward secrecy (PFS) methods help protect traffic and minimize the impact of a compromised key, or a cryptographic breakthrough. Google also makes encryption of data at rest available, using at least AES128 or similar. GDCE has a CMEK integration; more information can be found at \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/kms/docs/cmek (\u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/kms/docs/cmek).", "size": 1, "snippet_links": [{"key": "encryption-of-data-in-transit", "type": "clause", "offset": [99, 128]}, {"key": "cryptographic-key", "type": "definition", "offset": [193, 210]}, {"key": "perfect-forward-secrecy", "type": "clause", "offset": [253, 276]}, {"key": "encryption-of-data-at-rest", "type": "clause", "offset": [409, 435]}, {"key": "more-information", "type": "definition", "offset": [510, 526]}], "hash": "f374c47559dca34a7974f89a96f97455", "id": 10}], "next_curs": "CmASWmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjwLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IiBlbmNyeXB0aW9uLXRlY2hub2xvZ2llcyMwMDAwMDAwYQyiAQJlbhgAIAA=", "clause": {"title": "Encryption Technologies", "parents": [["effect-of-this-dpa", "Effect of this DPA"], ["network-and-transmission", "Network and Transmission"], ["data-center-and-network-security", "Data Center and Network Security"], ["miscellaneous", "Miscellaneous"], ["technical-and-organisational-security-measures", "Technical and Organisational Security Measures"]], "children": [], "size": 31, "id": "encryption-technologies", "related": [["information-technology", "Information Technology", "Information Technology"], ["technology", "Technology", "Technology"], ["information-technology-enterprise-architecture-requirements", "Information Technology Enterprise Architecture Requirements", "Information Technology Enterprise Architecture Requirements"], ["information-technology-accessibility-standards", "Information Technology Accessibility Standards", "Information Technology Accessibility Standards"], ["encryption", "Encryption", "Encryption"]], "related_snippets": [], "updated": "2025-07-24T04:27:51+00:00", "also_ask": [], "drafting_tip": null, "explanation": "The Encryption Technologies clause requires that sensitive data transmitted or stored as part of the agreement is protected using encryption methods. Typically, this means that any confidential information exchanged between parties, whether over the internet or on physical devices, must be encrypted using industry-standard protocols such as AES or TLS. The core function of this clause is to safeguard data against unauthorized access or breaches, thereby reducing the risk of data theft and ensuring compliance with privacy and security regulations."}, "json": true, "cursor": ""}}