Common use of Access Controls on Information Systems Clause in Contracts

Access Controls on Information Systems. Appropriate procedures and measures to control access to all systems hosting Raytheon Data and/or providing services on behalf of Raytheon (“Systems”) through the use of physical and logical access control systems that uniquely identify each individual requiring access, grant access only to authorized individuals and, based on the principle of least privileges, prevent unauthorized persons from gaining access to Raytheon Data, appropriately limit and control the scope of access granted to any authorized person, and log and monitor all relevant access events, including:

Appears in 2 contracts

Sources: Data Privacy & Security, Data Privacy & Security