Cryptography Clause Samples
The Cryptography clause defines the requirements and standards for the use of cryptographic methods to protect sensitive data within the scope of an agreement. It typically specifies which types of encryption algorithms or protocols must be used, outlines key management practices, and may set minimum security levels for data in transit and at rest. By establishing clear expectations for cryptographic protections, this clause helps ensure data confidentiality and integrity, reducing the risk of unauthorized access or data breaches.
POPULAR SAMPLE Copied 1 times
Cryptography a. Jamf will maintain policies and standards regarding the use of cryptographic controls that are implemented to protect Customer Content. Jamf will implement Industry Standard key management policies and practices designed to protect encryption keys for their entire lifetime.
Cryptography. Use of transport encryption for information that traverses across networks outside of the direct control of Zoho including, but not limited to the Internet, Wi-Fi and mobile phone networks.
Cryptography. Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.
Cryptography. 6.1. As defined by ▇▇▇▇ & ▇▇▇▇▇▇’▇ Cryptography Policy, cryptographic controls are employed to protect sensitive data both whilst in transit and at rest.
6.2. Encryption on Mobile Devices is enforced via Microsoft Intune Endpoint Manager policies
6.3. PII Database encryption is in place via Thales CipherTrust (AES 256-Bit Encryption, data tokenisation and encryption services).
6.4. Database Encryption is in place using Transparent Data Encryption (TDE) AES-256 Encryption.
6.5. All traffic from/to our Public facing applications (Websites + Mobile App) utilize HTTPS certificates issued by GlobalSign Certificate Authority and are encrypted with TLS 1.2 or higher.
6.6. All backups are encrypted.
Cryptography. Empower uses cryptography techniques that assist Empower with preventing the unauthorized capture, modification of or access to data or inf ormation. Empower uses standard encryption algorithms that f ollow up-to-date encryption standards and industry practices. Such cryptography techniques may include but are not limited to: encryption of sensitive data sent across external communication lines; requirement of minimum 128-bit encryption TLS encryption f or web browsers; and encryption of Personal Data while stored on laptops, mobile devices, and in recordkeeping databases.
Cryptography. The application uses PBKDF2-HMAC-SHA512 hashing algorithm for storing the hashes of users’ passwords and authentication tokens. The cloud service does not encrypt any data with public-key or symmetric-key algorithms. SSL versions lower than 3.0 are prevented from accessing the service. At the moment the service supports encryption protocols TLS 1.2, TLS 1.1 and TLS 1.0. SSLv3 and SSLv2 are all supported. TLS 1.0 support will be removed by the end of 2020. From Iris AI’s security documentation: Continuous Protection keeps data safe on SQL Server 2019. Every change to your data is written to write-ahead logs, which are shipped to multi-datacenter, high-durability storage. In the unlikely event of unrecoverable hardware failure, these logs can be automatically ‘replayed’ to recover the database to within seconds of its last known state. We also provide you with the ability to backup your database to meet your own backup and data retention requirements.
Cryptography refers to all methods used to transform the information contained in a readable data into a form that cannot be understood by unwanted parties.
Cryptography. 6.1. The Supplier shall:
6.1.1. ensure that any electronic Confidential Information transfers over public / non-secure network are undertaken securely using appropriate encryption methods;
6.1.2. have appropriate technical controls to prevent the unauthorised transfer of Customer Data to Portable Media and Devices; and
6.1.3. ensure that Confidential Information is not stored on Portable Media and Devices unless appropriately encrypted.
Cryptography. 6.1 Leading Resolutions shall ensure that cryptographic keys and digital certificates are managed securely at all times, in accordance with documented control requirements and procedures which are consistent with Good Industry Practice.
6.2 Leading Resolutions shall ensure that if public key infrastructure (PKI) is used, it shall be protected by ‘hardening’ the underlying operating system(s) and restricting access to a Certificate Authority.
6.3 All of the Customer’s Confidential Information stored on any digital or electronic portable storage device must be encrypted with a Federal Information Processing Standards (FIPS) or National Institute for Standards and Technology (NIST) certified cipher and any associated encryption keys are managed by Leading Resolutions.
Cryptography. A policy on the use of cryptographic controls for the protection of information is implemented.