Access Verification Sample Clauses

Access Verification. 8.1 The External Party shall implement a documented process to enable and record Authorised User access to Information Services. 8.2 Once an Authorised User has been authenticated as described above, the External Party shall employ a verification scheme that identifies the Authorised User and provides an acceptable measure of security for access to Information Services. 8.3 The External Party must have procedures in place that create appropriate audit trails for access to Information Services and retain those audit trails for not less than ninety (90) days online and one (1) year offline. 8.4 The External Party must take steps to protect access to Information Services by timing out the Authorised User session after a period of inactivity not to exceed fifteen (15) minutes.
Access Verification. 8.1 The Customer shall implement a documented process to enable and record Authorised User access to Information Services. 8.2 Once an Authorised User has been authenticated as described above, the Customer shall employ a verification scheme that identifies the Authorised User and provides an acceptable measure of security for access to Information Services. 8.3 The Customer must have procedures in place that create appropriate audit trails for access to Information Services and retain those audit trails for not less than ninety (90) days online and one (1) year offline. 8.4 The Customer must take steps to protect access to Information Services by timing out the Authorised User session after a period of inactivity not to exceed fifteen (15) minutes.
Access Verification. 10.1 Both Parties shall implement a documented process to enable and record Authorised User access to Information Services. 10.2 Once an Authorised User has been authenticated as described above, both parties shall employ a verification scheme that identifies the Authorised User and provides an acceptable measure of security for access to Information Services. 10.3 Both Parties must have procedures in place that create appropriate audit trails for access to Information Services and retain those audit trails for as long as legally necessary 10.4 Both parties must take steps to protect access to Information Services by timing out the Authorised User session after a period of inactivity which has been deemed acceptable for business use without incurring unnecessary risk.