Privilege Management Sample Clauses

Privilege Management. Supplier shall restrict and control the allocation and use of privileges to information systems and services through a formal authorization process. Privileges shall be allocated to users on a need-to-use basis and on least privileges in line with the access control policy.
AutoNDA by SimpleDocs
Privilege Management. Airship personnel with access to the Airship customer account or technical management systems are required to authenticate themselves via logical access controls with multi-factor authentication in order to administer the Service. Any access to customer data by an Airship representative is logged and tracked in real time, with oversight from the security team. In addition, Airship has implemented these additional privilege management measures: ● Internal Data Access Processes and Policies. Airship’s internal data access processes and policies are designed to prevent unauthorized persons and/or systems from gaining access to systems used to process data in the Service.
Privilege Management. Subscriber’s administrators must authenticate themselves via a central authentication system or via a single sign on system in order to administer the Services.
Privilege Management. Customer’s administrators and Customer End Users must authenticate themselves via a central authentication system or via a single sign on system in order to use the Services.
Privilege Management. 4.3.3.1.1. The computer and communications system privileges of all users, systems, and programs must be restricted based on the need to know.
Privilege Management. Customer’s Administrators and End Users must authenticate themselves via a central authentication system or via a single sign on system in order to use the Services. Internal Data Access Processes and Policies – Access Policy. Google’s internal data access processes and policies are designed to prevent unauthorized persons and/or systems from gaining access to systems used to process Customer Data. Google designs its systems to (i) only allow authorized persons to access data they are authorized to access; and (ii) ensure that Customer Data cannot be read, copied, altered or removed without authorization during processing, use and after recording. The systems are designed to detect any inappropriate access. Google employs a centralized access management system to control personnel access to production servers, and only provides access to a limited number of authorized personnel. Google’s authentication and authorization systems utilize SSH certificates and security keys, and are designed to provide Google with secure and flexible access mechanisms. These mechanisms are designed to grant only approved access rights to site hosts, logs, data and configuration information. Google requires the use of unique user IDs, strong passwords, two factor authentication and carefully monitored access lists to minimize the potential for unauthorized account use. The granting or modification of access rights is based on: the authorized personnel’s job responsibilities; job duty requirements necessary to perform authorized tasks; and a need to know basis. The granting or modification of access rights must also be in accordance with Google’s internal data access policies and training. Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for accountability. Where passwords are employed for authentication (e.g. login to workstations), password policies that follow at least industry standard practices are implemented. These standards include restrictions on password reuse and sufficient password strength. For access to extremely sensitive information (e.g. credit card data), Google uses hardware tokens.

Related to Privilege Management

  • Change Management BellSouth provides a collaborative process for change management of the electronic interfaces through the Change Control Process (CCP). Guidelines for this process are set forth in the CCP document as amended from time to time during this Agreement. The CCP document may be accessed via the Internet at xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx.

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • Transportation Management Tenant shall fully comply with all present or future programs intended to manage parking, transportation or traffic in and around the Building, and in connection therewith, Tenant shall take responsible action for the transportation planning and management of all employees located at the Premises by working directly with Landlord, any governmental transportation management organization or any other transportation-related committees or entities.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Member Management Except as otherwise expressly provided in this Agreement, the business and affairs of the LLC shall be managed and controlled by the Member, and the Member shall have full, exclusive and complete authority and discretion to make all the decisions affecting the business and affairs of the LLC, and to take all such actions as the Member deems necessary or appropriate to accomplish the purposes of the LLC; and any actions taken by the Member shall be binding on the LLC.

  • Communications and Operations Management a. Network Penetration Testing - Transfer Agent shall, on approximately an annual basis, contract with an independent third party to conduct a network penetration test on its network having access to or holding or containing Fund Data. Transfer Agent shall have a process to review and evaluate high risk findings resulting from this testing.

  • Case Management Prompt resolution of any dispute is important to both parties; and the parties agree that the arbitration of any dispute shall be conducted expeditiously. The arbitrators are instructed and directed to assume case management initiative and control over the arbitration process (including scheduling of events, pre-hearing discovery and activities, and the conduct of the hearing), in order to complete the arbitration as expeditiously as is reasonably practical for obtaining a just resolution of the dispute.

  • Relationship Management LAUSD expects Contractors and their Representatives to ensure that their business dealings with and/or on behalf of LAUSD are conducted in a manner that is above reproach.

  • Management (a) The General Partner shall conduct, direct and manage all activities of the Partnership. Except as otherwise expressly provided in this Agreement, all management powers over the business and affairs of the Partnership shall be exclusively vested in the General Partner, and no Limited Partner shall have any management power over the business and affairs of the Partnership. In addition to the powers now or hereafter granted a general partner of a limited partnership under applicable law or that are granted to the General Partner under any other provision of this Agreement, the General Partner, subject to Section 7.3, shall have full power and authority to do all things and on such terms as it determines to be necessary or appropriate to conduct the business of the Partnership, to exercise all powers set forth in Section 2.5 and to effectuate the purposes set forth in Section 2.4, including the following:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!