Encryption and Key Management Sample Clauses

Encryption and Key Management. All communications must be encrypted in-transit between environments.
AutoNDA by SimpleDocs
Encryption and Key Management. 9.1. Graylog uses industry-standard encryption techniques to encrypt Customer Content in transit. The Graylog System is configured by default to encrypt user data files using transport layer security (TLS) encryption for web communication sessions.
Encryption and Key Management. Datadog maintains policies and procedures for the management of encryption mechanisms and cryptographic keys in Datadog’s cryptosystem. • Datadog enlists encryption at rest and in transit between public networks, as applicable, according to industry- standard practice.
Encryption and Key Management. CDW recognizes that some information requires heightened security. Accordingly, we encrypt certain sensitive information, including information classified as Confidential or Highly Confidential, at rest and/or in transit, based on the information classification and encryption policies. CDW uses industry-standard methods of cryptography and maintains detailed key management processes to ensure that keys are securely managed and appropriately protected.
Encryption and Key Management. UnitedLayer maintains policies and procedures for the management of encryption mechanisms and cryptographic keys in UnitedLayer’s cryptosystem. • UnitedLayer enlists encryption at rest and in transit between public networks, as applicable, according to industry-standard practice.
Encryption and Key Management. CSS encrypts work documents when they are stored in the personal cloud, allowing the enterprise to set policies that prevent unauthorized use.
Encryption and Key Management. Third Party shall have a policy and process for managing encryption keys which shall include security requirements for key creation, use, storage, and protection. Third Party shall use industry standard encryption technologies for data contained within, accessed by, or transmitted through the Third Party Systems.
AutoNDA by SimpleDocs

Related to Encryption and Key Management

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Communications and Operations Management a. Network Penetration Testing - Transfer Agent shall, on approximately an annual basis, contract with an independent third party to conduct a network penetration test on its network having access to or holding or containing Fund Data. Transfer Agent shall have a process to review and evaluate high risk findings resulting from this testing.

  • Staffing Consultant will designate in writing to Authority its representative, and the manner in which it will provide staff support for the project, which must be approved by Authority. Consultant must notify Authority’s Contract Representative of any change in personnel assigned to perform work under this Contract, and the Authority’s Contract Representative has the right to reject the person or persons assigned to fill the position or positions. The Authority’s Contract Representative shall also have the right to require the removal of the Consultant’s previously assigned personnel, including Consultant’s representative, provided sufficient cause for such removal exists. The criteria for requesting removal of an individual will be based on, but not limited to, the following: technical incompetence, inability to meet the position’s qualifications, failure to perform, poor attendance, ethics violation, unsafe work habits, or damage to Authority or other property. Upon notice for removal, Consultant shall replace such personnel with personnel substantially equal in ability and qualifications for the positions and shall submit the proposed replacement personnel qualification and abilities to the Authority, in writing, for approval.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Contract Management To ensure full performance of the Contract and compliance with applicable law, the System Agency may take actions including:

  • Relationship Management LAUSD expects Contractors and their Representatives to ensure that their business dealings with and/or on behalf of LAUSD are conducted in a manner that is above reproach.

Time is Money Join Law Insider Premium to draft better contracts faster.