Security Technology Sample Clauses

Security Technology. When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.
AutoNDA by SimpleDocs
Security Technology. When the service is accessed using a supported web browser, Provider shall employ industry standard measures to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the Service Agreement in an environment using a firewall that is updated according to industry standards.
Security Technology. Contractor shall employ internet industry standard measures to protect data from unauthorized access while the data is in transit or at rest. The service security measures shall include server authentication and data encryption. Contractor shall host data pursuant to the Service Agreement in an environment using a firewall that is updated according to industry standards.
Security Technology. When the Service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect Student Data from unauthorized access. The security measures employed shall include server authentication and data encryption at rest and in transit. Provider shall host Student Data pursuant to the Agreement in an environment using a firewall that is maintained according to industry standards.
Security Technology. When the Student Data is accessed using a supported web browser, Provider shall employ industry standard measures to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the Service Agreement in an environment using a firewall that is updated according to industry standards.
Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.
Security Technology. When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption, at rest and in transit. The service shall prevent and detect computer viruses and malware from spreading through the use of the service, e.g. via e-mail, files, documents, messages, other data or the required use of insecure LEA- side applications. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.
AutoNDA by SimpleDocs
Security Technology. When Provider is hosting Student Data or Teacher Data, Provider will provide secure data transmission paths between each of LEA’s workstations and Provider’s servers. Any Student Data or Teacher Data hosted by Provider pursuant to the Underlying Agreement shall be hosted in an environment using a firewall that is periodically updated according to industry standards.
Security Technology. Provider shall employ internet industry standard measures to protect data from unauthorized access while the data is in transit or at rest. The service security measures shall include server authentication and data encryption. Contractor shall host data pursuant to the Service Agreement in an environment using a firewall that is updated according to industry standards.
Security Technology. When data is accessed using a supported web browser, Secure Socket Layer (“SSL”) technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication for account access and data encryption for all Student Data. SLP Toolkit shall host data pursuant to the DSPA in an environment using a firewall that is periodically updated according to industry standards. Furthermore, reasonable technical methods shall be employed to safeguard data in a manner consistent with ISO 27001/27002 and section 13402(H)(2) of Public Law 111-5.
Time is Money Join Law Insider Premium to draft better contracts faster.