Access Authorization Sample Clauses

Access Authorization i. The Contractor must have data access policies which implements the following:
AutoNDA by SimpleDocs
Access Authorization i. Cisco shall have user account creation and deletion procedures, with appropriate approvals, for granting and revoking access to Customer’s systems and networks. Cisco shall use an enterprise access control system that requires revalidation of its personnel by managers at regular intervals based on the principle of “least privilege” and need-to-know criteria based on job role.
Access Authorization. (1) iManage maintains an authorization management system designed to ensure that only authorized iManage Personnel (technical and non-technical) are granted access to systems containing Customer Data.
Access Authorization. (i) CiteRight maintains an authorization management system designed to ensure that only authorized CiteRight Personnel (technical and non-technical) are granted access to systems containing Customer Data.
Access Authorization i. The Data Importer maintains and updates a record of personnel authorized to access systems that contain customer data.
Access Authorization. A. Microsoft maintains and updates a record of personnel authorized to access Microsoft systems that contain Customer Data.
Access Authorization. Notice! Depending on your access authorization, you can only use certain functions of the panel controller. If you select a function for which a particular access authorization is required and no user with the appropriate authorization is logged on, you will be asked to enter your user ID and password. Access authorizations are assigned for access levels two to four. Only a few functions can be used on access level one, while all functions can be used on access level four. To check the access authorization of the person who is logged in, press the "key" key after logging in: The relevant access authorization is displayed.
AutoNDA by SimpleDocs
Access Authorization a. Acuity maintains and updates a record of personnel authorized to access Acuity systems that contain Customer Data.
Access Authorization. Business Associate shall implement policies and procedures for granting access to PHI. Business Associate will provide secure role-based account management granting privileges utilizing the principle of least privilege. Business Associate will monitor all user accounts with administrative level access to Operating Systems and databases used to create, receive, transmit, transact or store PHI. Business Associate will restrict the ability to install software to only authorized technical support personnel.
Access Authorization. (i) Provider maintains and updates a record of personnel authorized to access systems that contain customer data.
Time is Money Join Law Insider Premium to draft better contracts faster.