Access Controls on Information Systems Sample Clauses

The Access Controls on Information Systems clause establishes requirements for managing and restricting access to digital systems and data. It typically mandates that only authorized personnel can access certain information, often through the use of passwords, user authentication, and role-based permissions. By implementing these controls, the clause helps protect sensitive data from unauthorized access, thereby reducing the risk of data breaches and ensuring compliance with privacy and security standards.
Access Controls on Information Systems. Appropriate procedures and measures to control access to all systems hosting Personal Data and/or providing services on behalf of Media Company (“Systems”) through the use of physical and logical access control systems, grant access only to authorized individuals and, based on the principle of least privileges, prevent unauthorized persons from gaining access to Personal Data, appropriately limit and control the scope of access granted to any authorized person, and log all relevant access events, including:
Access Controls on Information Systems. Appropriate procedures and measures to control access to all systems hosting Raytheon Data and/or providing services on behalf of Raytheon (“Systems”) through the use of physical and logical access control systems that uniquely identify each individual requiring access, grant access only to authorized individuals and, based on the principle of least privileges, prevent unauthorized persons from gaining access to Raytheon Data, appropriately limit and control the scope of access granted to any authorized person, and log and monitor all relevant access events, including: