Encrypted Web Site Sample Clauses

Encrypted Web Site. If End User is employing the Web to transmit Confidential Data, the secure socket layers (SSL) must be used and the web site must be secure. SSL encrypts data transmitted via a Web site.
AutoNDA by SimpleDocs
Encrypted Web Site. If ENTITY is employing the Web to transmit Confidential Data, the secure socket layers (SSL) shall be used and the web site shall be secure. SSL encrypts data transmitted via a Web site. File Hosting Services, also known as File Sharing Sites. ENTITY shall not use file hosting services, such as Dropbox or Google Cloud Storage, to transmit Confidential Data. Ground Mail Service. “When ENTITY is sending a single piece of mail that includes confidential data for more than 400 clients, ENTITY shall only send this piece of mail via certified ground mail within the continental U.S.” Mobile Devices. If ENTITY is employing mobile devices (such as iPads, Android tablets, mobile phones, and laptop computers) to transmit Confidential Data said devices shall be encrypted and password-protected. Open Wireless Networks. End User may not transmit Confidential Data via an open wireless network which is a network or segment of a network that is not designated by the State of New Hampshire Department of Information Technology (DoIT) or its delegate as a protected network, adequately secure for the transmission of the Confidential Data, unless employing a secure method of transmission or remote access, which complies with the terms and conditions of this Agreement.
Encrypted Web Site. If ENTITY is employing the Web to transmit Confidential Data, the secure socket layers (SSL) shall be used and the web site shall be secure. SSL encrypts data transmitted via a Web site.

Related to Encrypted Web Site

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.

Time is Money Join Law Insider Premium to draft better contracts faster.