{"component": "definition", "props": {"groups": [{"samples": [{"hash": "f2mvSHvwsIm", "uri": "/contracts/f2mvSHvwsIm#strong-encryption", "label": "Software and Professional Services Agreement (Amdocs LTD)", "score": 28.9425051335, "published": true}, {"hash": "jXpCXVvwGMo", "uri": "/contracts/jXpCXVvwGMo#strong-encryption", "label": "Resale Agreement (Mobileiron, Inc.)", "score": 28.099247091, "published": true}, {"hash": "KPloKLEP9U", "uri": "/contracts/KPloKLEP9U#strong-encryption", "label": "General Agreement (Goodman Networks Inc)", "score": 26.0869267625, "published": true}], "size": 13, "snippet_links": [{"key": "encryption-technologies", "type": "clause", "offset": [17, 40]}, {"key": "reasonable-assurance", "type": "definition", "offset": [167, 187]}, {"key": "information-from", "type": "clause", "offset": [223, 239]}, {"key": "unauthorized-access", "type": "definition", "offset": [240, 259]}, {"key": "confidentiality-and-privacy", "type": "clause", "offset": [291, 318]}, {"key": "policy-for", "type": "definition", "offset": [385, 395]}, {"key": "management-of-the", "type": "clause", "offset": [400, 417]}, {"key": "encryption-keys", "type": "clause", "offset": [418, 433]}], "snippet": "means the use of encryption technologies with minimum key lengths of 128-bits for symmetric encryption and 1024-bits for asymmetric encryption whose strength provides reasonable assurance that it will protect the encrypted information from unauthorized access and is adequate to protect the confidentiality and privacy of the encrypted information, and which incorporates a documented policy for the management of the encryption keys and associated processes adequate to protect the confidentiality and privacy of the keys and passwords used as inputs to the encryption algorithm.", "hash": "ab07538cd2c6f74bfb3886876f9560b4", "id": 1}, {"samples": [{"hash": "5eIRilfH5Z7", "uri": "/contracts/5eIRilfH5Z7#strong-encryption", "label": "Agreement No. 02026713 (Amdocs LTD)", "score": 25.9336071184, "published": true}, {"hash": "jGZHE4syQoi", "uri": "/contracts/jGZHE4syQoi#strong-encryption", "label": "Turf Program Agreement (Goodman Networks Inc)", "score": 24.3155373032, "published": true}, {"hash": "ieTZjLmmTBq", "uri": "/contracts/ieTZjLmmTBq#strong-encryption", "label": "Turf Program Agreement (Goodman Networks Inc)", "score": 24.1211498973, "published": true}], "size": 10, "snippet_links": [{"key": "encryption-technologies", "type": "clause", "offset": [17, 40]}, {"key": "reasonable-assurance", "type": "definition", "offset": [167, 187]}, {"key": "information-from", "type": "clause", "offset": [223, 239]}, {"key": "unauthorized-access", "type": "definition", "offset": [240, 259]}, {"key": "confidentiality-and-privacy", "type": "clause", "offset": [292, 319]}], "snippet": "means the use of encryption technologies with minimum key lengths of 128-bits for symmetric encryption and 1024-bits for asymmetric encryption whose strength provides reasonable assurance that it will protect the encrypted information from unauthorized access, and is adequate to protect the confidentiality and privacy of the encrypted information.", "hash": "d73c659508ec67bd79ff1039a31d4773", "id": 2}, {"samples": [{"hash": "c4bRKQx80mm", "uri": "https://www.questionmark.com/app/uploads/2023/12/Technical-and-Organizational-Security-Measures-for-Questionmarks-OnDemand-Service-19-Dec-2023.pdf", "label": "www.questionmark.com", "score": 11.9815195072, "published": false}, {"hash": "a5dT7Vbnp1W", "uri": "https://www.questionmark.com/app/uploads/2023/05/Technical-and-Organizational-Security-Measures-for-Questionmarks-OnDemand-Service-26-May-2023.pdf", "label": "www.questionmark.com", "score": 11.7980835044, "published": false}, {"hash": "fpJ1Hfclqre", "uri": "https://www.questionmark.com/app/uploads/2023/02/questionmark_ondemand_technical_and_organisational_security_measures_6-dec-2022.pdf", "label": "www.questionmark.com", "score": 11.5420944559, "published": false}], "size": 5, "snippet_links": [{"key": "industry-standard", "type": "definition", "offset": [17, 34]}], "snippet": "means the use of industry standard encryption measures compliant with FIPS 140-2.", "hash": "4ede38cec14851de99fb5eb71d83728d", "id": 3}, {"samples": [{"hash": "fSI4YuWxJa8", "uri": "/contracts/fSI4YuWxJa8#strong-encryption", "label": "Agreement No. 53258.c (Amdocs LTD)", "score": 35.9596167009, "published": true}, {"hash": "iaf356ETxbD", "uri": "/contracts/iaf356ETxbD#strong-encryption", "label": "Master Services and Software License Agreement (Amdocs LTD)", "score": 32.9472963723, "published": true}, {"hash": "djrP5AKSGnH", "uri": "/contracts/djrP5AKSGnH#strong-encryption", "label": "Master Services and Software License Agreement (Amdocs LTD)", "score": 30.9370294319, "published": true}], "size": 5, "snippet_links": [{"key": "encryption-technologies", "type": "clause", "offset": [17, 40]}, {"key": "strong-cryptography", "type": "definition", "offset": [52, 71]}], "snippet": "means the use of encryption technologies based upon Strong Cryptography.", "hash": "699b5ef32f13a6f5dede911ec39663b0", "id": 4}, {"samples": [{"hash": "fSpomCoPyhX", "uri": "/contracts/fSpomCoPyhX#strong-encryption", "label": "Main Subscription Agreement", "score": 33.3739933173, "published": true}, {"hash": "cUAlRCDKvMT", "uri": "/contracts/cUAlRCDKvMT#strong-encryption", "label": "Main Subscription Agreement", "score": 33.368518099, "published": true}, {"hash": "5Ka44nBWPfC", "uri": "/contracts/5Ka44nBWPfC#strong-encryption", "label": "Data Processing Addendum", "score": 32.814748389, "published": true}], "size": 3, "snippet_links": [{"key": "industry-standard", "type": "definition", "offset": [17, 34]}, {"key": "technical-and-organizational-measures", "type": "definition", "offset": [108, 145]}, {"key": "from-time-to-time", "type": "clause", "offset": [181, 198]}, {"key": "where-required", "type": "clause", "offset": [247, 261]}, {"key": "information-on", "type": "clause", "offset": [317, 331]}, {"key": "compliance-programs", "type": "clause", "offset": [355, 374]}, {"key": "organization-of-information-security", "type": "clause", "offset": [489, 525]}], "snippet": "means the use of industry standard encryption measures. This document is a high-level overview of JAGGAER\u2019s technical and organizational measures. JAGGAER may change these measures from time to time to adapt to the evolving security landscape and where required will notify customers of these changes. For the latest information on JAGGAER\u2019s security and compliance programs, including information on approved sub-processor organizations, please visit \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/trustcenter/ Organization of Information Security To outline \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2019s information security structure.", "hash": "134f388e3105e235284a8704cd113282", "id": 5}, {"samples": [{"hash": "1eq2xhyuNOp", "uri": "https://www.questionmark.com/app/uploads/2023/09/Technical-and-Organizational-Security-Measures-for-Questionmarks-OnDemand-Service-4-Sep-2023.pdf", "label": "www.questionmark.com", "score": 11.8364134155, "published": false}, {"hash": "8vEdjKBsuRu", "uri": "https://support.questionmark.com/sites/default/files/questionmark_european_ondemand_and_services_terms_and_conditions_technical_and_organisational_security_measures_7-jan-2020.pdf", "label": "support.questionmark.com", "score": 11.0602327173, "published": false}], "size": 3, "snippet_links": [{"key": "industry-standard", "type": "definition", "offset": [17, 34]}], "snippet": "means the use of industry standard encryption measures", "hash": "55735c1267abdb7f9ba02d0b043eb893", "id": 6}, {"samples": [{"hash": "jcNrOGvWTCS", "uri": "/contracts/jcNrOGvWTCS#strong-encryption", "label": "Amendment 2 (Amdocs LTD)", "score": 30.954825462, "published": true}, {"hash": "fnEQuGffegh", "uri": "https://fcc.report/FCC-ID/A3LRF4420D-D1A/4738088.pdf", "label": "fcc.report", "score": 10.1923340178, "published": false}], "size": 2, "snippet_links": [{"key": "encryption-technologies", "type": "clause", "offset": [17, 40]}, {"key": "reasonable-assurance", "type": "definition", "offset": [167, 187]}, {"key": "information-from", "type": "clause", "offset": [223, 239]}, {"key": "unauthorized-access", "type": "definition", "offset": [240, 259]}, {"key": "confidentiality-and-privacy", "type": "clause", "offset": [291, 318]}, {"key": "policy-for", "type": "definition", "offset": [385, 395]}, {"key": "management-of-the", "type": "clause", "offset": [400, 417]}, {"key": "encryption-keys", "type": "clause", "offset": [418, 433]}, {"key": "expiration-of", "type": "clause", "offset": [449, 462]}, {"key": "two-years", "type": "clause", "offset": [499, 508]}, {"key": "supplier-must", "type": "clause", "offset": [659, 672]}, {"key": "rule-of", "type": "clause", "offset": [689, 696]}, {"key": "least-privilege", "type": "clause", "offset": [697, 712]}, {"key": "separation-of-duties", "type": "clause", "offset": [717, 737]}], "snippet": "means the use of encryption technologies with minimum key lengths of 128-bits for symmetric encryption and 2048-bits for asymmetric encryption whose strength provides reasonable assurance that it will protect the encrypted information from unauthorized access and is adequate to protect the confidentiality and privacy of the encrypted information, and which incorporates a documented policy for the management of the encryption keys, including the expiration of encryption keys at least once every two years, and associated processes adequate to protect the confidentiality and privacy of the keys and credentials used as inputs to the encryption algorithm. Supplier must ensure that the rule of least privilege and separation of duties are properly implemented and maintained.", "hash": "18c54519738775d52cfd8300cc721b3f", "id": 7}, {"samples": [{"hash": "8qmaoNK4SwP", "uri": "/contracts/8qmaoNK4SwP#strong-encryption", "label": "Master Services Agreement", "score": 26.3524982888, "published": true}, {"hash": "jgMncvenCpl", "uri": "/contracts/jgMncvenCpl#strong-encryption", "label": "Data Processing Addendum", "score": 25.1875427789, "published": true}], "size": 2, "snippet_links": [{"key": "encryption-technologies", "type": "clause", "offset": [17, 40]}, {"key": "reasonable-assurance", "type": "definition", "offset": [198, 218]}, {"key": "information-from", "type": "clause", "offset": [254, 270]}, {"key": "unauthorized-access", "type": "definition", "offset": [271, 290]}, {"key": "confidentiality-and-privacy", "type": "clause", "offset": [323, 350]}, {"key": "policy-for", "type": "definition", "offset": [417, 427]}, {"key": "management-of-the", "type": "clause", "offset": [432, 449]}, {"key": "encryption-keys", "type": "clause", "offset": [450, 465]}, {"key": "secure-sockets-layer", "type": "definition", "offset": [622, 642]}, {"key": "security-protocols", "type": "clause", "offset": [663, 681]}], "snippet": "means the use of encryption technologies with key lengths of at least 256-bits Advanced Encryption Standard for symmetric encryption and 2048-bits for asymmetric encryption, whose strength provides reasonable assurance that it will protect the encrypted information from unauthorized access, and is adequate to protect the confidentiality and privacy of the encrypted information, and which incorporates a documented policy for the management of the encryption keys and associated processes adequate to protect the confidentiality of the keys and passwords used as inputs to the encryption algorithm. Insecure versions of Secure Sockets Layer and Transport Layer Security protocols, such as SSL 3.0 and TLS 1.0, are not strong cryptographic protocols.", "hash": "104b0acbafbbde158ddaf3ce744c3584", "id": 8}, {"samples": [{"hash": "aoKjQshs0Os", "uri": "https://info.nasuni.com/hubfs/Nasuni.com-assets/Legal%20Docs/TOMS%20Statement%20-%20Nasuni%20Rev-5.pdf", "label": "info.nasuni.com", "score": 18.6928399644, "published": false}, {"hash": "lLXwNHmMYK7", "uri": "https://info.nasuni.com/hubfs/Nasuni.com-assets/Legal%20Docs/TOMS%20Statement%20-%20Nasuni%20Rev-4.pdf", "label": "info.nasuni.com", "score": 11.2286105407, "published": false}], "size": 2, "snippet_links": [{"key": "industry-standard", "type": "definition", "offset": [17, 34]}], "snippet": "means the use of industry standard encryption measures with sufficiently large keys, meeting or exceeding that defined by NIST standards.", "hash": "91c83f44c501ab4c80d31e8b5d57cc5b", "id": 9}, {"samples": [{"hash": "iYyZdm3TQ7w", "uri": "/contracts/iYyZdm3TQ7w#strong-encryption", "label": "Security and Privacy Requirements", "score": 26.4770704997, "published": true}], "size": 1, "snippet_links": [{"key": "industry-standards", "type": "definition", "offset": [41, 59]}, {"key": "relating-to", "type": "definition", "offset": [73, 84]}, {"key": "all-work", "type": "clause", "offset": [180, 188]}], "snippet": "means Encryption that meets then-current industry standards (e.g., NIST) relating to the strength of the algorithm, the secrecy of the key, the initialization vectors and how they all work together within the cryptosystem.", "hash": "ea3cb44cfd07020be44add4b2d72e2df", "id": 10}], "next_curs": "Cl4SWGoVc35sYXdpbnNpZGVyY29udHJhY3RzcjoLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIac3Ryb25nLWVuY3J5cHRpb24jMDAwMDAwMGEMogECZW4YACAA", "definition": {"title": "Strong Encryption", "size": 46, "snippet": "means the use of encryption technologies with minimum key lengths of 128-bits for symmetric encryption and 1024-bits for asymmetric encryption whose strength provides reasonable assurance that it will protect the encrypted information from unauthorized access and is adequate to protect the confidentiality and privacy of the encrypted information, and which incorporates a documented policy for the management of the encryption keys and associated processes adequate to protect the confidentiality and privacy of the keys and passwords used as inputs to the encryption algorithm.", "id": "strong-encryption", "examples": ["Use <strong>Strong Encryption</strong> to protect all In-Scope Information stored on Mobile and Portable Devices.", "Use <strong>Strong Encryption</strong> to protect AT&amp;T\u2019s SPI when transmitted over any network.", "If Supplier transfers any Secure Information via the internet or any untrusted network, it shall encrypt the Secure Information using <strong>Strong Encryption</strong> methods while in transit.", "Supplier shall encrypt Secure Information stored on any Information Technology System using <strong>Strong Encryption</strong> methods.", "JAGGAER encrypts all data stored on the storage media within our production data centers, using <strong>Strong Encryption</strong> (AES 256) Access to production data centers where Customer Data is stored is done via VPN Tunnel (IPSEC) and requires multi-factor authentication.", "Use <strong>Strong Encryption</strong> to protect all of In-Scope Information stored on Mobile and Portable Devices.", "Use <strong>Strong Encryption</strong> to protect all of AT&amp;T\u2019s Information stored on Mobile and Portable Devices.", "Company shall also encrypt using <strong>Strong Encryption</strong>, at minimum, Restricted AHS Information when stored on any system (i.e., \u201cdata at rest\u201d), including, but not limited to, servers, workstations, mobile devices, backup tapes, removable media, or any other electronic storage medium.", "Company shall encrypt, at minimum, Restricted AHS Information using <strong>Strong Encryption</strong> when transmitted over the internet (i.e., \u201cdata in transit\u201d) or any other un-trusted network.", "Software for <strong>Strong Encryption</strong> using ECC or FIPS-certified technology, which may be included with the Program, may not be installed or used without the purchase of a separate license."], "related": [["encryption", "Encryption", "Encryption"], ["encrypt", "Encrypt", "Encrypt"], ["encrypted", "Encrypted", "Encrypted"], ["encrypt-or-encryption", "Encrypt or Encryption", "Encrypt or Encryption"], ["sms", "SMS", "SMS"]], "related_snippets": [], "updated": "2025-07-06T21:55:40+00:00"}, "json": true, "cursor": ""}}