Access Policy Sample Clauses

Access Policy. An access control policy is established, documented, and reviewed based on business and information security requirements.
AutoNDA by SimpleDocs
Access Policy. Cisco shall determine appropriate access control rules, rights, and restrictions for each specific user’s roles towards their assets. Cisco shall maintain a record of security privileges of its personnel that have access to Protected Data, networks, and network services. Cisco shall restrict and tightly control the use of utility programs that might be capable of over- riding system and application controls.
Access Policy. CiteRight enforces an access control policy (physical, technical and administrative) based on least privileges principles.
Access Policy iManage enforces an access control policy (physical, technical and administrative) based on least privileges principles.
Access Policy. Acuity maintains a record of security privileges of individuals having access to Customer Data.
Access Policy. Microsoft maintains a record of security privileges of individuals having access to Customer Data.
Access Policy. A. Prior to providing access to the Datacenter, it is required that everyone that will enter the space read, fully understand and sign the DLR 11101 -
AutoNDA by SimpleDocs
Access Policy. Supplier shall determine appropriate access control rules, rights, and restrictions for each specific user’s roles towards their assets. Supplier shall maintain a record of security privileges of its personnel that have access to Protected Data, networks, and network services.
Access Policy. R3’s internal access control processes and policies are designed to prevent unauthorized persons and/or systems from gaining access to systems used to process personal data. R3’s information security manager ensures only authorized users have access to personal data and all users are allocated unique user IDs for access to systems processing personal information. Data Production systems containing personal information will be logically segregated from development systems. Appropriate authentication schemes will be maintained for systems processing personal information. Systems processing personal data will adequately protect that information at rest and in transit. Personal Data will be deleted in accordance to Data Retention and Deletion section above. Subprocessor Security
Access Policy. DoubleClick will restrict access to DoubleClick’s DART Web Ad Serving Log Files in the following manner:
Time is Money Join Law Insider Premium to draft better contracts faster.