Transmission encryption. 1. All data transmissions of confidential information outside of a secure internal network must be encrypted using a FIPS 140-2 certified algorithm that is 128 bit or higher, such as AES or TLS. It is encouraged, when available and when feasible, that 256 bit encryption be used. 2. Encryption can be end to end at the network level, or the data files containing confidential information can be encrypted. 3. This requirement pertains to any type of confidential information in motion such as website access, file transfer, and email.
Appears in 3 contracts
Sources: Contract for Web Application Services, Contract, Contract
Transmission encryption. 1. All data transmissions of confidential information Protected Data outside of a the secure internal network must be encrypted using a FIPS 140-2 certified algorithm that is 128 bit or higheralgorithm, such as AES Advanced Encryption Standard (AES), with a 128bit key or TLS. It is encouraged, when available and when feasible, that 256 bit encryption be used.
2higher. Encryption can be end to end at the network level, or the data files containing confidential information Protected Data can be encrypted.
3. This requirement pertains to any type of confidential information Protected Data in motion such as website access, file transfer, and emailE-Mail.
Appears in 2 contracts
Sources: Data Use and Disclosure Agreement, Data Use and Disclosure Agreement
Transmission encryption. 1. All data transmissions of confidential information Protected Data outside of a the secure internal network must be encrypted using a FIPS 140-2 certified algorithm that is 128 bit or higheralgorithm, such as AES AES, with a 128bit key or TLS. It is encouraged, when available and when feasible, that 256 bit encryption be used.
2higher. Encryption can be end to end at the network level, or the data files containing confidential information Protected Data can be encrypted.
3. This requirement pertains to any type of confidential information Protected Data in motion such as website access, file transfer, and emaile-mail.
Appears in 2 contracts
Sources: Data Use and Disclosure Agreement, Data Use and Disclosure Agreement
Transmission encryption. 1. All data Any and all transmissions of confidential information Identifiable Information outside of a the secure internal network must be encrypted using a FIPS 140-2 certified algorithm that which is 128 bit 128bit or higher, such as AES or TLS. It is encouraged, when available and when feasible, that 256 bit encryption be used.
2AES. Encryption can be end to end at the network level, or the data files containing confidential information Identifiable Information can be encrypted.
3. This requirement pertains applies to any type of confidential information Identifiable Information in motion such as website access, file transfer, access and emaile-mail.
Appears in 1 contract
Sources: Professional Services