Transmitted Data Clause Samples

Transmitted Data. All transmitted (e.g. network) County PI, PHI and/or Ml require encryption in accordance with: (a) NIST Special Publication 800-52 Guidelines for the Selection and Use of Transport Layer Security Implementations; and (b) NIST Special Publication 800-57 Recommendation for Key Management - Part 3: Application-Specific Key Management Guidance. Secure Sockets Layer (SSL) is minimally required with minimum cipher strength of 128-bit.
Transmitted Data. ‌ Nothing in this clause 17 will affect the rights of the Customer or any Third Party with respect to any data transmitted via the Services.
Transmitted Data. ‌ Nothing in this clause 15 will affect the rights of the Customer or any Third Party with respect to any data transmitted via the Services. 16 Confidentiality‌
Transmitted Data. The Customer expresses and guarantees to KDDIA that it has the right and capacity to send the Transmitted Data and that the Transmitted Data does not infringe any rights of any third parties.
Transmitted Data. With respect to transmitted data, Gogo shall retain American owned data for a minimum of three (3) years.
Transmitted Data. Nothing in this clause 14 is intended to affect the Intellectual Property rights of the Customer or any third party with respect to any data transmitted via the Services.

Related to Transmitted Data

  • De-Identified Data Provider agrees not to attempt to re-identify de-identified Student Data. De-Identified Data may be used by the Provider for those purposes allowed under FERPA and the following purposes: (1) assisting the LEA or other governmental agencies in conducting research and other studies; and (2) research and development of the Provider's educational sites, services, or applications, and to demonstrate the effectiveness of the Services; and (3) for adaptive learning purpose and for customized student learning. Provider's use of De-Identified Data shall survive termination of this DPA or any request by ▇▇▇ to return or destroy Student Data. Except for Subprocessors, ▇▇▇▇▇▇▇▇ agrees not to transfer de- identified Student Data to any party unless (a) that party agrees in writing not to attempt re-identification, and (b) prior written notice has been given to the LEA who has provided prior written consent for such transfer. Prior to publishing any document that names the LEA explicitly or indirectly, the Provider shall obtain the LEA’s written approval of the manner in which de-identified data is presented.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Transmission encryption All data transmissions of County PHI or PI outside the secure internal network must be encrypted using a FIPS 140-2 certified algorithm which is 128-bit or higher, such as AES. Encryption can be end to end at the network level, or the data files containing PHI can be encrypted. This requirement pertains to any type of PHI or PI in motion such as website access, file transfer, and E-Mail.

  • Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).

  • Customer Materials Subject to Section 4(a), all right, title and interest (including all Intellectual Property Rights) in and to the Customer Materials are owned by Customer or Customer’s suppliers.