Common use of Access Control Clause in Contracts

Access Control. IBM maintains logical separation of client data. Client data resides in its own client-specific schema and is designed to be accessible through the Cloud Service or client-specified data export. Access to the Cloud Service and client data is controlled and managed by the client’s designated administrator. IBM uses multi factor authentication and encrypted VPN tunnel technology when accessing client systems. Access is restricted to those individuals requiring access in order to maintain and administer the Cloud Service and associated hardware and software infrastructure in third party data center facilities. IBM uses WIFI (a/k/a 802.11) network traffic that is encrypted using WPA2 with the AES encryption algorithm option and provides for non-broadcast SSID and mutual authentication between the server and the end devices when accessing systems containing client data.

Appears in 6 contracts

Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

AutoNDA by SimpleDocs

Access Control. IBM maintains logical separation of client data. Client data resides in its own client-specific schema and is designed to be accessible through the Cloud Service or client-specified data export. Access to the Cloud Service and client data is controlled and managed by the client’s designated administrator. IBM uses multi factor authentication and encrypted VPN tunnel technology when accessing client systems. Access is restricted to those individuals requiring access in order to maintain and administer the Cloud Service and associated hardware and software infrastructure in third party data center facilities. IBM uses WIFI (a/k/a 802.11) network traffic that is encrypted using WPA2 with the AES encryption algorithm option and provides for non-broadcast SSID and mutual authentication between the server and the end devices when accessing systems containing client data.

Appears in 1 contract

Samples: Services Agreement

AutoNDA by SimpleDocs

Access Control. IBM maintains logical separation of client data. Client data resides in its own client-specific schema and is designed to be accessible through the Cloud Service application or client-specified data export. Access to the Cloud Service IBM application and client data is controlled and managed by the client’s designated administrator. IBM uses multi factor authentication and encrypted VPN tunnel technology when accessing client systems. Access is restricted to those individuals requiring access in order to maintain and administer the Cloud Service IBM application and associated hardware and software infrastructure in third party data center facilities. IBM uses WIFI (a/k/a 802.11) network traffic that is encrypted using WPA2 with the AES encryption algorithm option and provides for non-broadcast SSID and mutual authentication between the server and the end devices when accessing systems containing client data.

Appears in 1 contract

Samples: Services Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.