Technical Security Controls Sample Clauses

Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
AutoNDA by SimpleDocs
Technical Security Controls. With respect to information technology infrastructure, servers, databases, or networks that Process, store, or transmit Data, Supplier shall use the following technical security controls where applicable (and keep them current by incorporating and using all updates commercially available): D.
Technical Security Controls. Access Policy R3’s internal access control processes and policies are designed to prevent unauthorized persons and/or systems from gaining access to systems used to process personal data. R3’s information security manager ensures only authorized users have access to personal data and all users are allocated unique user IDs for access to systems processing personal information. Data Production systems containing personal information will be logically segregated from development systems. Appropriate authentication schemes will be maintained for systems processing personal information. Systems processing personal data will adequately protect that information at rest and in transit. Personal Data will be deleted in accordance to Data Retention and Deletion section above. Subprocessor Security
Technical Security Controls. A. Workstation/Laptop encryption. All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 1415 EXHIBIT B X:\CONTRACTS - 2016 -\2016-2018\BH\Integrated Community Services -VNCOC FY 16-17 - IC.doc VNC08BHKK18 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Technical Security Controls. By executing this Agreement, CONTRACTOR, for itself, and its assignees and successors in interest, agrees as follows:
Technical Security Controls. With respect to KnowBe4 infrastructure that processes, stores, or transmits Customer Confidential Information, KnowBe4 will use the following technical security controls where applicable (and keep them current by incorporating and using all updates commercially available):
AutoNDA by SimpleDocs
Technical Security Controls. The customary technical control elements taken to protect information at Data Importer that are evaluated during a risk assessment and the corporate auditing process are as follows: Authentication Users are typically authenticated through the use of a user name and password combination. Employees and other authorized users are responsible to protect passwords and other security authentication mechanisms from unauthorized use or disclosure. In some circumstances, such as some system administrator access or access to Data Importer’s network through a Virtual Private Network, a second authentication factor is used. This second factor is typically a logical key that the user must physically possess, in addition to knowing a user name and password, in order to gain access. Access Control Access to personal data is typically granted to specific data elements within a processing operation based on the role that a person performs within the company. This is known as the “role based security model”. Security Administration Administrative roles are distributed within the company. Persons within the working group using a processing operation typically administer security on those operations. These persons are more aware of the security requirements of the data than a remote security administrator would be. Administrator accounts with broad access, such as those used to accomplish hardware maintenance or data backup services, are closely monitored with both technical and organizational controls to assure appropriate use.
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140–2 certified algorithm DocuSign Envelope ID: BB2DBDF4-FD05-4D02-A0FE-074FE18D982A 1 which is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by 2 the COUNTY.
Technical Security Controls. 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 7 of 00 XXXXXXX X X:\XXX\XXXXXXXXXX XXXXXX\XXX #00-000000 XX XXXXXXXX-XXX KK FY 19-20 - LW - REDLINE.DOC CCS07-MACWS01BHKK19 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.
Time is Money Join Law Insider Premium to draft better contracts faster.