{"component": "definition", "props": {"groups": [{"snippet_links": [{"key": "confidential-information", "type": "definition", "offset": [16, 40]}, {"key": "digital-certificate", "type": "clause", "offset": [118, 137]}, {"key": "authorized-users", "type": "clause", "offset": [175, 191]}, {"key": "length-of", "type": "clause", "offset": [219, 228]}, {"key": "if-available", "type": "definition", "offset": [383, 395]}], "snippet": "means to encode Confidential Information into a format that can only be read by those possessing a \u201ckey\u201d; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.", "samples": [{"hash": "k53vm2ZuwKF", "uri": "/contracts/k53vm2ZuwKF#encrypt", "label": "Professional Service Contract", "score": 36.3936767578, "published": true}, {"hash": "iFVk9LVwpYg", "uri": "/contracts/iFVk9LVwpYg#encrypt", "label": "Client Service Contract", "score": 36.1163253784, "published": true}, {"hash": "97O14Skvjxc", "uri": "/contracts/97O14Skvjxc#encrypt", "label": "Personal Service Contract", "score": 36.0951118469, "published": true}], "size": 281, "hash": "46d5d376465a830e8d10626c030164cd", "id": 1}, {"snippet_links": [{"key": "confidential-information", "type": "definition", "offset": [16, 40]}, {"key": "digital-certificate", "type": "clause", "offset": [118, 137]}, {"key": "authorized-users", "type": "clause", "offset": [175, 191]}, {"key": "length-of", "type": "clause", "offset": [219, 228]}, {"key": "if-available", "type": "definition", "offset": [383, 395]}], "snippet": "means to encode Confidential Information into a format that can only be read by those possessing a \u201ckey;\u201d a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.", "samples": [{"hash": "k53vm2ZuwKF", "uri": "/contracts/k53vm2ZuwKF#encrypt", "label": "Professional Service Contract", "score": 36.3936767578, "published": true}, {"hash": "iFVk9LVwpYg", "uri": "/contracts/iFVk9LVwpYg#encrypt", "label": "Client Service Contract", "score": 36.1163253784, "published": true}, {"hash": "97O14Skvjxc", "uri": "/contracts/97O14Skvjxc#encrypt", "label": "Personal Service Contract", "score": 36.0951118469, "published": true}], "size": 244, "hash": "d28da838f8b4501e402c9ffbd0e09901", "id": 2}, {"snippet_links": [{"key": "confidential-information", "type": "definition", "offset": [16, 40]}, {"key": "digital-certificate", "type": "clause", "offset": [118, 137]}, {"key": "authorized-users", "type": "clause", "offset": [175, 191]}, {"key": "length-of", "type": "clause", "offset": [219, 228]}], "snippet": "means to encode Confidential Information into a format that can only be read by those possessing a \u201ckey\u201d; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 128 bits.", "samples": [{"hash": "8kwZB2XrQmR", "uri": "/contracts/8kwZB2XrQmR#encrypt", "label": "Personal Service Contract", "score": 33.3729019165, "published": true}, {"hash": "5ml16PJjAeD", "uri": "/contracts/5ml16PJjAeD#encrypt", "label": "Personal Service Contract", "score": 33.3482666016, "published": true}, {"hash": "c7FaoXYNyIH", "uri": "/contracts/c7FaoXYNyIH#encrypt", "label": "Master Contract", "score": 30.5178279877, "published": true}], "size": 166, "hash": "afa52785a24a1a44247e2f40e12f7a4b", "id": 3}, {"snippet_links": [{"key": "electronic-data", "type": "clause", "offset": [28, 43]}, {"key": "length-of", "type": "clause", "offset": [88, 97]}], "snippet": "means to encipher or encode electronic data using software that generates a minimum key length of 128 bits.", "samples": [{"hash": "dgJZdeOPXkR", "uri": "/contracts/dgJZdeOPXkR#encrypt", "label": "Contract", "score": 24.1081447601, "published": true}, {"hash": "chwWbNMKEKW", "uri": "/contracts/chwWbNMKEKW#encrypt", "label": "Foster Care Contract", "score": 23.2648868561, "published": true}, {"hash": "flkqTZuAgw9", "uri": "/contracts/flkqTZuAgw9#encrypt", "label": "Managed Care Contract", "score": 22.2026004791, "published": true}], "size": 25, "hash": "8c21144f95805020e1c8a2ce6bb97d4f", "id": 4}, {"snippet_links": [{"key": "confidential-process", "type": "clause", "offset": [140, 160]}, {"key": "processing-standards", "type": "clause", "offset": [337, 357]}], "snippet": "means to use an algorithmic process to transform data into a form in which there is a low probability of assigning meaning without use of a confidential process or key, which process conforms to NIST Special Publications 800\u2013111, 800\u201352, 800\u201377, or 800\u2013113, as appropriate, or that is otherwise validated against the Federal Information Processing Standards (FIPS) 140\u20132.", "samples": [{"hash": "jKXL9szIR0F", "uri": "/contracts/jKXL9szIR0F#encrypt", "label": "Services Agreements", "score": 34.9979858398, "published": true}, {"hash": "gUFd0ASvjrJ", "uri": "/contracts/gUFd0ASvjrJ#encrypt", "label": "Services Agreement", "score": 34.0846176147, "published": true}, {"hash": "kYCmhT7Gy8H", "uri": "/contracts/kYCmhT7Gy8H#encrypt", "label": "Business Associate Agreement", "score": 26.1690616608, "published": true}], "size": 22, "hash": "306f40c4a4f4c0cee8f969731a9ec085", "id": 5}, {"snippet_links": [{"key": "confidential-process", "type": "clause", "offset": [226, 246]}, {"key": "and-key", "type": "definition", "offset": [247, 254]}, {"key": "security-technology", "type": "definition", "offset": [269, 288]}, {"key": "sensitivity-of-the-data", "type": "clause", "offset": [349, 372]}], "snippet": ", \u201cEncrypted\u201d or \u201cEncryption\u201d shall mean encoding data into ciphertext\u2014at rest or in transit\u2014rendering it unusable, unreadable, or indecipherable without converting the ciphertext to plaintext, through the use of a reasonable confidential process and key, leveraging a security technology, methodology, or encryption algorithm commensurate with the sensitivity of the data at issue.", "samples": [{"hash": "5656C9UEIpg", "uri": "https://www.naag.org/wp-content/uploads/2025/04/2023.10.05-IN-Assurance-of-Voluntary-Compliance.pdf", "label": "www.naag.org", "score": 20.2922859192, "published": false}, {"hash": "68fXVLfYukv", "uri": "https://www.sec.gov/Archives/edgar/data/1280058/000128005823000040/blkbex992formofadministrat.htm", "label": "Blackbaud Inc", "score": 18.7576999664, "published": false}, {"hash": "hE1958GM58v", "uri": "https://www.ohioattorneygeneral.gov/Files/Briefing-Room/News-Releases/Consumer-Protection/2023-10-05-Blackbaud-Inc-2023-10-05-In-The-Matter.aspx", "label": "www.ohioattorneygeneral.gov", "score": 18.755279541, "published": false}], "size": 19, "hash": "21b518e692cd287a92d4750ab11e8db1", "id": 6}, {"snippet_links": [{"key": "unauthorized-person", "type": "definition", "offset": [95, 114]}, {"key": "security-technology", "type": "definition", "offset": [125, 144]}, {"key": "generally-accepted", "type": "definition", "offset": [160, 178]}, {"key": "information-security", "type": "clause", "offset": [195, 215]}], "snippet": "\u201cEncrypted,\u201d or \u201cEncryption\u201d shall mean rendered unusable, unreadable, or indecipherable to an unauthorized person through a security technology or methodology generally accepted in the field of information security.", "samples": [{"hash": "le7P4iEPqIo", "uri": "https://attorneygeneral.utah.gov/wp-content/uploads/2018/09/2018-09-26-Uber-UTAH-Proposed-Judgment.pdf", "label": "attorneygeneral.utah.gov", "score": 8.1704311371, "published": false}, {"hash": "b7qwDQyT3FI", "uri": "https://ag.ks.gov/docs/default-source/consumer-judgments/2018/2018-cv-745.pdf?sfvrsn=669ed11a_4", "label": "ag.ks.gov", "score": 7.3682408333, "published": false}, {"hash": "5du3hsokYjP", "uri": "https://www.business.ct.gov/-/media/ag/press_releases/2018/20180926_uber.pdf", "label": "www.business.ct.gov", "score": 7.3668718338, "published": false}], "size": 19, "hash": "6170285665e9b6ce62c36830453018ac", "id": 7}, {"snippet_links": [{"key": "security-technology", "type": "definition", "offset": [127, 146]}, {"key": "generally-accepted", "type": "definition", "offset": [162, 180]}, {"key": "information-security", "type": "clause", "offset": [197, 217]}, {"key": "sensitivity-of-the-data", "type": "clause", "offset": [240, 263]}], "snippet": "\u201cENCRYPTED,\u201d or \u201cENCRYPTION\u201d shall mean rendering data\u2014at rest or in transit\u2014unusable, unreadable, or indecipherable through a security technology or methodology generally accepted in the field of information security commensurate with the sensitivity of the data at issue.", "samples": [{"hash": "h6Smz4sBzem", "uri": "https://www.sec.gov/Archives/edgar/data/33185/000119312519198584/d734596dex104.htm", "label": "Equifax Inc", "score": 14.5523614883, "published": false}, {"hash": "9kkSQ5SFs0t", "uri": "https://www.huntonprivacyblog.com/wp-content/uploads/sites/28/2020/04/d7c3425f-ffbb-4472-b67e-595ca5fc5fc4.pdf", "label": "www.huntonprivacyblog.com", "score": 10.1416835785, "published": false}, {"hash": "8xmVYU7wkib", "uri": "https://calendarmedia.blob.core.windows.net/assets/d7c3425f-ffbb-4472-b67e-595ca5fc5fc4.pdf", "label": "calendarmedia.blob.core.windows.net", "score": 10.1416835785, "published": false}], "size": 14, "hash": "9aea4bd870f526bfa94c38f87f2e8fbb", "id": 8}, {"snippet_links": [{"key": "data-encryption", "type": "definition", "offset": [32, 47]}, {"key": "not-limited", "type": "clause", "offset": [62, 73]}], "snippet": "means the use of any process of data encryption including but not limited to", "samples": [{"hash": "5h9mJeyJBnv", "uri": "https://archive.legmt.gov/bills/2023/AmdPublicWeb/HB0161.001.001_Amendments-in-Context_final-full.pdf", "label": "archive.legmt.gov", "score": 16.9747772217, "published": false}, {"hash": "7wu7VgigspR", "uri": "https://archive.legmt.gov/bills/2023/AmdPublicWeb/HB0161.001.002_Amendments-in-Context_final-full.pdf", "label": "archive.legmt.gov", "score": 16.7531433105, "published": false}, {"hash": "8KBlgLkpAZY", "uri": "https://archive.legmt.gov/bills/2023/AmdPublicWeb/HB0161.002.002_Amendments-in-Context_final-full.pdf", "label": "archive.legmt.gov", "score": 16.6088657379, "published": false}], "size": 10, "hash": "321699943b69d518d627db74c3c966a6", "id": 9}, {"snippet_links": [{"key": "for-the-purpose-of", "type": "definition", "offset": [43, 61]}], "snippet": "means to treat electronically or otherwise for the purpose of preventing intelligible reception;", "samples": [{"hash": "lgciZjvTKBQ", "uri": "https://www.mediacouncil.or.ke/jdownloads/Media%20Laws/media_act_2007_and_rules_of_procedure..pdf", "label": "www.mediacouncil.or.ke", "score": 5.4544830322, "published": false}, {"hash": "ekImZhgj8YV", "uri": "http://kenyalaw.org/kl/fileadmin/pdfdownloads/bills/2007/The_Media_Bill_2007.pdf", "label": "kenyalaw.org", "score": 5.0, "published": false}, {"hash": "c80Uax3DwDz", "uri": "http://kenyalaw.org/kl/fileadmin/pdfdownloads/RepealedStatutes/MediaAct_No.3of2007.pdf", "label": "kenyalaw.org", "score": 4.789185524, "published": false}], "size": 6, "hash": "0180b062e5e8cca4efee85cd13269035", "id": 10}], "next_curs": "ClQSTmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjALEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIQZW5jcnlwdCMwMDAwMDAwYQyiAQJlbhgAIAA=", "definition": {"title": "Encrypt", "snippet": "means to encode Confidential Information into a format that can only be read by those possessing a \u201ckey\u201d; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 256 bits for symmetric keys, or 2048 bits for asymmetric keys. When a symmetric key is used, the Advanced Encryption Standard (AES) must be used if available.", "size": 693, "id": "encrypt", "examples": ["<strong>Encrypt</strong> user passwords in any data storage location and obfuscate password entry fields in any entry interface controlled by the discloser.", "<strong>Encrypt</strong> portable computer devices, such as laptops and notebook computers that process and/or store Medi-Cal PII, with a solution using a vendor product that is recognized as an industry leader in meeting the needs for the intended solution.", "<strong>Encrypt</strong> all electronic files that contain Medi-Cal PII when the file is stored on any removable media type device (i.e. USB thumb drives, floppies, CD/DVD, etc.) using a vendor product that is recognized as an industry leader in meeting the needs for the intended solution, such as products specified on the CSSI.", "<strong>Encrypt</strong> workstations where Medi-Cal PII is stored using a vendor product that is recognized as an industry leader in meeting the needs for the intended solution, such as products specified on the CSSI.", "Provider must <strong>Encrypt</strong> Student Data and APPR Data at rest and in transit in accordance with applicable New York laws and regulations.", "Business Associate shall <strong>Encrypt</strong> all transmissions of ePHI and all portable media or storage devices on which ePHI may be stored, including laptops, back-up media, CDs, or USB drives.", "<strong>Encrypt</strong>, as described above, all State-owned data transmitted from one computing device or storage medium to another.", "<strong>Encrypt</strong> all State-owned data stored on portable computing devices and portable electronic storage media using government-certified Advanced Encryption Standard (AES) cipher algorithm with a 256-bit or 128-bit encryption key to protect CALTRANS data stored on every sector of a hard drive, including temp files, cached data, hibernation files, and even unused disk space.", "<strong>Encrypt</strong> all sensitive federal data and information (i.e., PII, protected health information [PHI], proprietary information, etc.) in transit (i.e., email, network connections, etc.) and at rest (i.e., servers, storage devices, mobile devices, backup media, etc.) with FIPS 140-2 validated encryption solution.", "You may request replacement Let\u2019s <strong>Encrypt</strong> Certificates before revoking the affected Certificates, provided that the warranties in Section 3.1 above are true with respect to the replacement Certificates."], "related": [["encrypted", "Encrypted", "Encrypted"], ["encryption", "Encryption", "Encryption"], ["encrypt-or-encryption", "Encrypt or Encryption", "<strong>Encrypt</strong> or Encryption"], ["crypt", "Crypt", "Crypt"], ["images", "Images", "Images"]], "related_snippets": [], "updated": "2025-07-26T06:10:51+00:00"}, "json": true, "cursor": ""}}