Common use of Data Access Control/User Control Clause in Contracts

Data Access Control/User Control. Prevention of third parties using automatic processing systems with equipment for data transmission (authentication with user and password). The following technical and organizational measures have been implemented by the Operator for the processing of Personal Information described in this Agreement / Addendum. Authentication with user name/password (passwords assigned based on the valid password regulations) Usage of intrusion detection systems Usage of anti-virus software Usage of a software firewall Creation of user profiles Assignment of user profiles to IT systems Usage of VPN technology Encryption of mobile data storage media Encryption of data storage media in laptops Usage of central smartphone administration software (e.g. for the external erasure of data) Miscellaneous:

Appears in 5 contracts

Samples: Operator Agreement, Operator Agreement, Operator Agreement

AutoNDA by SimpleDocs

Data Access Control/User Control. Prevention of third parties using automatic processing systems with equipment for data transmission (authentication with user and password). The following technical and organizational measures have been implemented by the Operator for the processing of Personal Information described in this Agreement / Agreement/ Addendum. Authentication with user name/password (passwords assigned based on the valid password regulations) Usage of intrusion detection systems Usage of anti-virus software Usage of a software firewall Creation of user profiles Assignment of user profiles to IT systems Usage of VPN technology Encryption of mobile data storage media Encryption of data storage media in laptops Usage of central smartphone administration software (e.g. e.g., for the external erasure of data) Miscellaneous:

Appears in 4 contracts

Samples: Operator Agreement, Operator Agreement, Operator Agreement

Data Access Control/User Control. Prevention of third parties using automatic processing systems with equipment for data transmission (authentication with user and password). The following technical and organizational measures have been implemented by the Operator for the processing of Personal Information described in this Agreement / AddendumOperator Agreement. Authentication with user name/password (passwords assigned based on the valid password regulations) Usage of intrusion detection systems Usage of anti-virus software Usage of a software firewall Creation of user profiles Assignment of user profiles to IT systems Usage of VPN technology Encryption of mobile data storage media Encryption of data storage media in laptops Usage of central smartphone administration software (e.g. for the external erasure of data) Miscellaneous:

Appears in 1 contract

Samples: Operator Agreement

Data Access Control/User Control. Prevention of third parties using automatic processing systems with equipment for data transmission (authentication with user and password). The following technical and organizational measures have been implemented by the Operator for the processing of Personal Information described in this Agreement / Agreement/Addendum. Authentication with user nameusername/password (passwords assigned based on the valid password regulations) Usage of intrusion detection systems Usage of anti-virus software Usage of a software firewall Creation of user profiles Assignment of user profiles to IT systems Usage of VPN technology Encryption of mobile data storage media Encryption of data storage media in laptops Usage of central smartphone administration software (e.g. for the external erasure of data) Miscellaneous:

Appears in 1 contract

Samples: Operator Agreement

AutoNDA by SimpleDocs

Data Access Control/User Control. Prevention of third parties using automatic processing systems with equipment for data transmission (authentication with user and password). The following technical and organizational measures have been implemented by the Operator for the processing of Personal Information described in this Agreement / Agreement/Addendum. Authentication with user name/password (passwords assigned based on the valid password regulations) Usage of intrusion detection systems Usage of anti-virus software Usage of a software firewall Creation of user profiles Assignment of user profiles to IT systems Usage of VPN technology Encryption of mobile data storage media Encryption of data storage media in laptops Usage of central smartphone administration software (e.g. for the external erasure of data) Miscellaneous:

Appears in 1 contract

Samples: cdn-s3.sappi.com

Time is Money Join Law Insider Premium to draft better contracts faster.