Cryptography & Encryption
If software encryption [e.g., keys (i.e., hardware, software, database, etc.), data
transfer, etc.] is used or required in your software, the EPRI Project Manager
must complete the Cryptography and Encryption Functions
Checklist and Definitions (51 KB) and submit it to York Huang ("cc" the EPRI Software
For software encryption assistance, contact York Huang in the EPRI Legal Department.