Common use of Transmission encryption Clause in Contracts

Transmission encryption. All data transmissions of DSH PCI outside the contractor’s secure internal network must be encrypted using a FIPS 140-2 certified algorithm, such as Advanced Encryption Standard (AES), with a 128bit key or higher. Encryption can be end to end at the network level, or the data files containing DSH PCI can be encrypted. This requirement pertains to any type of DSH PCI in motion such as website access, file transfer, and E-Mail.

Appears in 4 contracts

Samples: www.acgov.org, files.covid19.ca.gov, www.countyofsb.org

AutoNDA by SimpleDocs

Transmission encryption. All data transmissions of DSH CDPH PCI outside the contractor’s secure internal network must be encrypted using a FIPS 140-2 certified algorithm, such as Advanced Encryption Standard (AES), with a 128bit key or higher. Encryption can be end to end at the network level, or the data files containing DSH CDPH PCI can be encrypted. This requirement pertains to any type of DSH CDPH PCI in motion such as website access, file transfer, and E-Mail.

Appears in 4 contracts

Samples: Grant Agreement, humboldt.legistar.com, marin.granicus.com

Transmission encryption. All data transmissions of DSH CDPH PCI outside the contractor’s secure internal network must be encrypted using a FIPS 140-2 certified algorithm, such as Advanced Encryption Standard (AES), with a 128bit 128-bit key or higher. Encryption can be end to end at the network level, or the data files containing DSH CDPH PCI can be encrypted. This requirement pertains to any type of DSH CDPH PCI in motion such as website access, file transfer, and E-Mail.

Appears in 2 contracts

Samples: And Disclosure Agreement, And Disclosure Agreement

Transmission encryption. All data transmissions of DSH CDPH PCI outside the contractor’s secure internal network must be encrypted using a FIPS 140-2 certified algorithm, such as Advanced Encryption Standard (AES), with a 128bit key or higher. Encryption can be end to end- to-end at the network level, or the data files containing DSH CDPH PCI can be encrypted. This requirement pertains to any type of DSH CDPH PCI in motion such as website access, file transfer, and Ee-Mailmail.

Appears in 2 contracts

Samples: STD Program Management, STD Program Management

AutoNDA by SimpleDocs

Transmission encryption. All data transmissions of DSH CDPH PCI outside the contractorApplicant’s secure internal network must be encrypted using a FIPS 140-2 certified algorithm, such as Advanced Encryption Standard (AES), with a 128bit key or higher. Encryption can be end to end-to-end at the network level, or the data files containing DSH CDPH PCI can be encrypted. This requirement pertains to any type of DSH CDPH PCI in motion such as website access, file transfer, and E-Mail.

Appears in 1 contract

Samples: Security Requirements Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.