Proprietary Encryption Clause Samples
POPULAR SAMPLE Copied 3 times
Proprietary Encryption. When using encryption, pursuant to this Exhibit, you will use only industry recognized cryptography algorithms. Encryption algorithms will be of sufficient strength to equate to 128-bit TripleDES. Hashing functions will be either SHA-1 or MD-5.
Proprietary Encryption. An algorithm that has not been made public and/or has not withstood public scrutiny. The developer of the algorithm could be a vendor, an individual, or the government.
Proprietary Encryption. ▇▇▇▇▇ does not employ any proprietary encryption techniques to secure the in-flight or stored data.
