Data Encryption definition

Data Encryption refers to enciphering data with a NIST-approved algorithm or cryptographic module using a NIST-approved key length. Encryption must be applied in such a way that it renders data unusable to anyone but the authorized users.
Data Encryption refers to ciphers, algorithms or other mechanisms that will encode data to protect its confidentiality. Data encryption can be required during data transmission or data storage depending on the level of protection required.
Data Encryption means the ability to protect the integrity and authenticity of stored and/or transmitted data through the use of technologies which makes the data unreadable except for those possessing a key, right etc. to unlock/read the data;

Examples of Data Encryption in a sentence

  • Encryption must be via an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules per GSA policy.

  • The Passive Authentication Mechanism and the Data Encryption are performed completely and independently of the TOE by the TOE environment.

  • The ICAO defines the baseline security methods Passive Authentication and the optional advanced security methods Basic Access Control to the logical MRTD, Active Authentication of the MRTD’s chip, Extended Access Control to and the Data Encryption of sensitive biometrics as optional security measure in the ICAO Doc 9303 [ICAO-9303].

  • Sessions (or files) must be encrypted with an approved NIST algorithm, such as Advanced Encryption Standard (AES) or Triple Data Encryption Standard (3DES), in accordance with Federal Information Processing Standards Publication (FIPS PUB) 140-2, Security Requirements for Cryptographic Modules.

  • Encryption must be through an approved NIST algorithm with a valid certification, such as Advanced Encryption Standard or Triple Data Encryption Standard, in accordance with Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, as required by GSA policy.

  • Connections between all components of the Tribal Lottery System shall only be through the use of secure communication protocols which are designed to prevent unauthorized access or tampering, employing Data Encryption Standards (DES) or equivalent encryption with changeable seeds or algorithms.

  • Subtotal741,953.00741,953.00 (2) Reasons for equity instrument investments designated as at fair value through other comprehensive income The company's equity instrument investment is an investment that the company plans to hold for a long time for strategic purposes, so the company designates it as a financial asset measured at fair value and whose changes are included in other comprehensive income.

  • Any sensitive State Data transmitted over a network, or taken off site via removable media must be encrypted pursuant to the State’s Data encryption standard ITS-SEC-01 Data Encryption and Cryptography.

  • The ICAO defines the baseline security methods Passive Authentication and the optional advanced security methods Basic Access Control to the logical MRTD, Active Authentication of the MRTD’s chip, Extended Access Control to and the Data Encryption of additional sensitive biometrics as optional security measure in the ICAO Doc 9303 [ICAO-9303].

  • Triple DES – Data Encryption Standards should be the benchmark for all data transmitted and authenticated between each party.

Related to Data Encryption

  • Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).

  • data user means a natural or legal person who has lawful access to certain personal or non-personal data and has the right, including under Regulation (EU) 2016/679 in the case of personal data, to use that data for commercial or non-commercial purposes;

  • Encrypted means the transformation of data into a form which results in a low probability of assigning meaning without the use of a protective process or key.

  • Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 128 bits.

  • Network Data Mover (NDM) or “Connect Direct” means the industry standard protocol for transferring information electrically.

  • Data Log means a complete record of all Data Interchanged representing the Messages and their Associated Data between the parties;

  • VPN means Virtual Private Network.

  • Database Management System (“DBMS”) is a computer process used to store, sort, manipulate and update the data required to provide Selective Routing and ALI.

  • Interface means the mixture occurring in pipeline operations between adjoining batches having similar or dissimilar physical characteristics.

  • Customer Software means software which is owned by or licensed to the Customer, including Specially Written Software and Assigned Software and software which is or will be used by the Supplier for the purposes of providing the Services but excluding the Supplier Software;

  • Interfaces means all points of interaction during a system or subsystem life cycle, including operation and maintenance where different actors of the rail sector will work together in order to manage the risks;

  • Contractor Software means software which is proprietary to the Contractor, including software which is or will be used by the Contractor for the purposes of providing the Services.

  • Server Software means software that provides services or functionality on a computer acting as a server.

  • Connectivity means the physical and logical interconnection to the TELVIVA System (including via third party data telecommunications networks) as may be specified by TELVIVA to access and use the Communication Services, including the type and bandwidth of the relevant access circuit;

  • Network User means a customer or a potential customer of a transmission system operator, and transmission system operators themselves in so far as it is necessary for them to carry out their functions in relation to transmission;

  • Interoperability means the ability of a CenturyLink OSS Function to process seamlessly (i.e., without any manual intervention) business transactions with CLEC's OSS application, and vice versa, by means of secure exchange of transaction data models that use data fields and usage rules that can be received and processed by the other Party to achieve the intended OSS Function and related response. (See also Electronic Bonding.)

  • Customer Data means any content, materials, data and information that Authorized Users enter into the production system of a Cloud Service or that Customer derives from its use of and stores in the Cloud Service (e.g. Customer-specific reports). Customer Data and its derivatives will not include SAP’s Confidential Information.

  • Electronic Subcontracting Reporting System (eSRS) means the Governmentwide, electronic, web-based system for small business subcontracting program reporting. The eSRS is located at http://www.esrs.gov.

  • Database means the Commercial Driver Alcohol and Drug Testing Database of the Office of Driver Services of the Arkansas Department of Finance and Administration.

  • SMS means a subscriber management system or device which stores the subscriber records and details with respect to name, address and other information regarding the hardware being utilized by the subscriber, channels or bouquets of channels subscribed to by the subscriber, price of such channels or bouquets of channels as defined in the system, the activation or deactivation dates and time for any channel or bouquet of channels, a log of all actions performed on a subscriber’s record, invoices raised on each subscriber and the amounts paid and discounts allowed to the subscriber for each billing period.

  • Hosted Software means Samsara’s web-based software platform, including the interface accessed online at cloud.samsara.com.

  • Systems Software means software designed to support, guide, control, direct, or monitor information technology equipment, other system software, mechanical and physical components, arrangements, procedures, programs, services or routines.

  • End User Data means personal data, (including sensitive personal data) of End Users (including prospective End Users) that the Communications Provider provides or makes available to BT for the purposes of this Contract;

  • Data Access Services has the meaning ascribed thereto in Section 6.1 hereof.

  • Computer database or “database means” a collection of recorded information in a form capable of, and for the purpose of, being stored in, processed, and operated on by a computer. The term does not include computer software.

  • Tyler Software means our proprietary software, including any integrations, custom modifications, and/or other related interfaces identified in the Investment Summary and licensed by us to you through this Agreement.