Common use of Security Technology Clause in Contracts

Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.

Appears in 56 contracts

Sources: Data Privacy & Security, Virginia School Data Privacy Agreement, Data Privacy Agreement

Security Technology. When the service is accessed using a supported web browser, ,FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.

Appears in 16 contracts

Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement

Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 800-171, or equivalent industry best practices.

Appears in 14 contracts

Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement

Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practicesstandards.

Appears in 1 contract

Sources: Data Privacy Agreement

Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171800171, or equivalent industry best practicesstandards.

Appears in 1 contract

Sources: Data Privacy Agreement

Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated compliant transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.

Appears in 1 contract

Sources: Data Privacy Agreement