{"component": "definition", "props": {"groups": [{"size": 3, "snippet_links": [{"key": "use-of-the-services", "type": "clause", "offset": [139, 158]}], "snippet": "means a unique randomised string of letters, numbers and characters that may be used to decrypt and access the Encrypted Data, through the use of the Services;", "samples": [{"hash": "h4RQIoTp5dA", "uri": "/contracts/h4RQIoTp5dA#encryption-key", "label": "End User Agreement", "score": 28.377856635, "published": true}, {"hash": "dtWnx3zZZjE", "uri": "/contracts/dtWnx3zZZjE#encryption-key", "label": "Secure Digital Exchange Service Customer Agreement", "score": 28.3751190258, "published": true}], "hash": "130cf20a9109fa28beab2c31cb30a5bd", "id": 1}, {"size": 2, "snippet_links": [], "snippet": "means a sequence of numbers used to encrypt or decrypt (to decode/decipher) data.", "samples": [{"hash": "caApba9aa58", "uri": "https://apps.legislature.ky.gov/services/karmaservice/documents/8432/ToWord?markup=false&style=web", "label": "apps.legislature.ky.gov", "score": 16.4187111441, "published": false}, {"hash": "at1gDgWMhZH", "uri": "https://apps.legislature.ky.gov/services/karmaservice/documents/8432/ToPDF?markup=false", "label": "apps.legislature.ky.gov", "score": 9.2197125257, "published": false}], "hash": "dd76e01abba8c22e93677dcc53989165", "id": 2}, {"size": 2, "snippet_links": [{"key": "personal-information", "type": "definition", "offset": [73, 93]}], "snippet": "' means the confidential key or process designed to render the encrypted personal information useable, readable, and decipherable.", "samples": [{"hash": "gnc1YY4VsE0", "uri": "http://delcode.delaware.gov/title6/c012b/index.shtml", "label": "delcode.delaware.gov", "score": 10.1704312115, "published": false}, {"hash": "cJd4IexXiaE", "uri": "https://www.shulmanrogers.com/wp-content/uploads/2018/11/iCERT_Liability_Report_MAY_2018.pdf", "label": "www.shulmanrogers.com", "score": 6.2443531828, "published": false}], "hash": "e26c701d6ace3348024005c1355a730d", "id": 3}, {"size": 2, "snippet_links": [{"key": "the-code", "type": "clause", "offset": [6, 14]}, {"key": "by-the-service-provider", "type": "clause", "offset": [24, 47]}, {"key": "the-data", "type": "clause", "offset": [97, 105]}, {"key": "of-the-customer", "type": "clause", "offset": [147, 162]}, {"key": "to-the-service", "type": "clause", "offset": [172, 186]}], "snippet": "means the code provided by the Service Provider to the Customer to enable the Customer to access the data stored by the Service Provider on behalf of the Customer pursuant to the Service;", "samples": [{"hash": "aqvqz6N5nMD", "uri": "https://www.vysiion.co.uk/wp-content/uploads/2019/01/Vysiion003_Vysiion_Terms-and-Conditions-for-the-Supply-of-Services_Iss1-4.pdf", "label": "www.vysiion.co.uk", "score": 6.4120465435, "published": false}, {"hash": "4yAvdzF4ZHp", "uri": "https://1stdirectory.co.uk/_assets/files_comp/de329a2d-feaf-4483-8ed9-6157b1196fd7.pdf", "label": "1stdirectory.co.uk", "score": 5.4154688569, "published": false}], "hash": "5919a648938109095921c48c948372e9", "id": 4}, {"size": 1, "snippet_links": [], "snippet": "means the confidential key or process designed to render the encrypted data useable, readable, and decipherable.", "samples": [{"hash": "cxJ8idkcBNx", "uri": "https://legis.delaware.gov/json/BillDetail/GenerateHtmlDocument?legislationId=25794&legislationTypeId=1&docTypeId=2&legislationName=HB180", "label": "legis.delaware.gov", "score": 8.1704312115, "published": false}], "hash": "48c005b6bdf07794897233d108024bf3", "id": 5}, {"size": 1, "snippet_links": [{"key": "by-the-client", "type": "clause", "offset": [39, 52]}, {"key": "encrypt-the-data", "type": "clause", "offset": [56, 72]}, {"key": "access-to-the", "type": "clause", "offset": [103, 116]}, {"key": "in-relation-to", "type": "clause", "offset": [149, 163]}, {"key": "security-interest", "type": "definition", "offset": [184, 201]}, {"key": "personal-property-securities-act-2009", "type": "clause", "offset": [220, 257]}, {"key": "a-mortgage", "type": "definition", "offset": [269, 279]}, {"key": "other-security", "type": "definition", "offset": [318, 332]}, {"key": "the-property", "type": "clause", "offset": [338, 350]}, {"key": "title-retention", "type": "clause", "offset": [381, 396]}, {"key": "agreement-to", "type": "clause", "offset": [480, 492]}], "snippet": "means the pass phrase used and created by the Client to encrypt the data stored with TIMG. TIMG has no access to the pass phrase.Encumbrances means, in relation to any property:\n(a) a security interest as defined in the Personal Property Securities Act 2009 (Cth);\n(b) a mortgage, charge, encumbrance, pledge, lien or other security over the property;\n(c) a preferential interest, title retention, or other estate, interest, claim or arrangement affecting the property; or\n(d) an agreement to grant, create, allow or register any of these, and whether the encumbrance is registered or unregistered, statutory, legal or equitable.", "samples": [{"hash": "6S4Bx3leumZ", "uri": "/contracts/6S4Bx3leumZ#encryption-key", "label": "Service and Supply Agreement", "score": 24.7193702943, "published": true}], "hash": "a921a9cb56e62aad26d6dac3c2c47055", "id": 6}, {"size": 1, "snippet_links": [{"key": "by-the-client", "type": "clause", "offset": [39, 52]}, {"key": "encrypt-the-data", "type": "clause", "offset": [56, 72]}, {"key": "access-to-the", "type": "clause", "offset": [103, 116]}], "snippet": "means the pass phrase used and created by the Client to encrypt the data stored with T!MG. T!MG has no access to the pass phrase.", "samples": [{"hash": "bDtpzuxrqWQ", "uri": "/contracts/bDtpzuxrqWQ#encryption-key", "label": "Service and Supply Agreement", "score": 25.9240246407, "published": true}], "hash": "e69bfa0d4cd85c3acc7b58c3940c815a", "id": 7}, {"size": 1, "snippet_links": [{"key": "the-code", "type": "clause", "offset": [6, 14]}, {"key": "by-the-subscriber", "type": "clause", "offset": [24, 41]}, {"key": "the-subscribers", "type": "clause", "offset": [53, 68]}], "snippet": "means the code provided by the Subscriber to encrypt the Subscribers data with a unique signature only accessible by the Subscriber.", "samples": [{"hash": "6d4iqn4eans", "uri": "https://assets.applytosupply.digitalmarketplace.service.gov.uk/g-cloud-13/documents/700685/970080889412681-terms-and-conditions-2022-05-10-1049.pdf", "label": "assets.applytosupply.digitalmarketplace.service.gov.uk", "score": 9.1765913758, "published": false}], "hash": "eea214c92c2f1eb34085e73e7b26a6a4", "id": 8}, {"size": 1, "snippet_links": [], "snippet": "\u2019 means the confidential key or process designed to render encrypted data useable, readable, or decipherable.", "samples": [{"hash": "e3hsSbMKNFb", "uri": "https://www.govinfo.gov/content/pkg/FR-2024-02-12/pdf/2024-01667.pdf", "label": "www.govinfo.gov", "score": 8.0595482546, "published": false}], "hash": "24d8967bc7909448ca2879698181149d", "id": 9}, {"size": 1, "snippet_links": [], "snippet": "means a sequence of numbers used to encrypt or decrypt (to de- code/decipher) data.", "samples": [{"hash": "3pB0zE74tGc", "uri": "https://apps.legislature.ky.gov/law/kar/820/001/050reg.pdf", "label": "apps.legislature.ky.gov", "score": 10.3319644079, "published": false}], "hash": "0774e71f3093845bbb00d8cdd6b6fd8c", "id": 10}], "next_curs": "ClsSVWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjcLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIXZW5jcnlwdGlvbi1rZXkjMDAwMDAwMGEMogECZW4YACAA", "definition": {"size": 19, "title": "Encryption Key", "snippet": "means a unique randomised string of letters, numbers and characters that may be used to decrypt and access the Encrypted Data, through the use of the Services;", "id": "encryption-key", "examples": ["The symmetric key is sometimes called a Traffic <strong>Encryption Key</strong> (TEK) or Data <strong>Encryption Key</strong> (DEK).", "Transparent Data Encryption (TDE) is used to encrypt data in real\u2010time using Database <strong>Encryption Key</strong> (DEK) stored in the database boot record.", "Customer shall choose an <strong>Encryption Key</strong> and Password for use in connection with the Services and for access to User Files or an <strong>Encryption Key</strong> will be provided using 48 character string that will be converted into a 256 bit <strong>encryption key</strong>.", "Effective Date the meaning given in clause 1.1. <strong>Encryption Key</strong> a randomised string of letters, numbers and characters that may be used to decrypt and access encrypted data through Our Services.", "The key assigned to the root node is called Traffic <strong>Encryption Key</strong> (TEK).", "The Subscriber Agency shall sign and submit the <strong>Encryption Key</strong> Agreement to the Prime Site Agency prior to loading the <strong>Encryption Key</strong> in Subscriber Equipment.", "The <strong>Encryption Key</strong> is a randomly generated value provided as an extra input to the Hashing function to make the Hash deidentified.", "The Software shall be designed to permit access to Subscriber Files only with a valid <strong>Encryption Key</strong> and Password.", "Currently, the Master <strong>Encryption Key</strong> and the access control signers must be created by the system administrator after installation.", "The Software shall be designed to permit access to Customer Files only with a valid <strong>Encryption Key</strong> and Password."], "related": [["encryption", "Encryption", "Encryption"], ["encrypt", "Encrypt", "Encrypt"], ["encrypted", "Encrypted", "Encrypted"], ["encrypt-or-encryption", "Encrypt or Encryption", "Encrypt or Encryption"], ["crypt", "Crypt", "Crypt"]], "related_snippets": [], "updated": "2025-07-06T21:58:36+00:00"}, "json": true, "cursor": ""}}