Admission control. The following implemented measures prevent unauthorized persons from gaining access to the data processing systems: ● Authentication with user and password ● Use of anti-virus software ● Use of firewalls ● Encryption of data carriers ● Encryption of notebooks / tablets ● Use of 2-factor authentication ● Key regulation / key book ● General instruction to manually lock the desktop when leaving the workstation
Appears in 2 contracts
Sources: Data Processing Agreement, Data Processing Agreement
Admission control. The following implemented measures prevent unauthorized persons from gaining access to the data processing systems: ● Cleandesk corporate guideline ● Authentication with user and password ● Use of anti-virus software Regulated authorization management and user administration ● Use of firewalls ● Encryption of data carriers ● Encryption of notebooks / tablets ● Use of 2-factor authentication antivirus software ● Key regulation / key book Virtual client separation ● General instruction to manually Automatic screen lock the desktop when leaving the workstationwith password activation
Appears in 2 contracts
Sources: Data Processing Agreement, Data Processing Agreement