Section outline

  • The Company uses a variety of encryption methods depending on the nature of the information being stored or transferred, its location, and its use. Below are the standard and acceptable forms of encryption used by The Company. 

    Symmetric Key Encryption Algorithms 

    • Advanced Encryption Standard (AES)- Minimum encryption key length of 256 bits 

    Asymmetric Key Encryption Algorithms 

    • Digital Signature Standard (DSS) 

    • Elliptic Curve Digital Signature Algorithm (ECDSA) 

    • RSA 

    Encryption Protocols 

    • IPSec (IP Security) 

    • SSH (Secure Shell) 

    • TLS (Transport Layer Security) 

    • S/MIME (Secure Multipurpose Internet Extension)