Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.
Appears in 56 contracts
Sources: Data Privacy & Security, Virginia School Data Privacy Agreement, Data Privacy Agreement
Security Technology. When the service is accessed using a supported web browser, ,FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.
Appears in 16 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 800-171, or equivalent industry best practices.
Appears in 14 contracts
Sources: Data Privacy Agreement, Data Privacy Agreement, Data Privacy Agreement
Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practicesstandards.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171800171, or equivalent industry best practicesstandards.
Appears in 1 contract
Sources: Data Privacy Agreement
Security Technology. When the service is accessed using a supported web browser, FIPS 140-2 validated compliant transmission encryption protocols, or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall follow National Institute of Standards and Technology (NIST) 800- 171, or equivalent industry best practices.
Appears in 1 contract
Sources: Data Privacy Agreement