Entrance Control Sample Clauses

Entrance Control. The City will control the construction or use of any entrances along the Project within the City including those shown on the final Design Plans.
AutoNDA by SimpleDocs
Entrance Control. The Processor’s EU based cloud provider conforms to ISO 27001 certifications and/or SSAE 16 SOC 1 Type II or SOC 2 to ensure secure entrance control. All offices are locked when unsupervised to prevent unauthorised access to Personal Data.
Entrance Control. Technical or organisational measures regarding access control, especially regarding legitimation of authorised persons: The aim of the entrance control is to prevent unauthorised people from physically accessing such data processing equipment which processes or uses Personal Data. Due to their respective security requirements, business premises and facilities are subdivided into different security zones with different access authorisations. They are monitored by security personnel. Access for employees is only possible with an encoded ID with a photo on it. All other persons have access only after having registered before (e.g. at the main entrance). Access to special security areas for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security requirements for data centres. System Access Control
Entrance Control. Technical or organisational measures regarding access control, especially regarding legitimation of authorised persons: The aim of the entrance control is to prevent unauthorised people from physically accessing such data processing equipment which processes or uses Personal Data. Due to their respective security requirements, business premises and facilities are subdivided into different security zones with different access authorisations. Main entrance is monitored by security personnel. Access for employees is only possible with an encoded ID and through security enabled access door.
Entrance Control. Objective: No unauthorized entrance to data processing systems Existing / implemented measures: • Fence system (1) with driveway gate • Closed operating building units • Illumination of the property in the dark • Intrusion Detection System (IDS) with direct connection to security service (24/7/365) and emergency power supply (at least 24 h) • Access control system through personal transponder / door codes • Documented key controlAttendance records • Company´s and visitor´s badge control • Data protection obligations for employees • Data protection guidelines for visitors • Escort of visitors (external partners) • Video cameras (CCTV) with recording on motion, data memory 30 days • Emergency exit doors with day alarm • Labeling of data processing areas (SISP – Sensitive Storage and Processing Area) • Additional access controls of sensitive areas (archives, IT rooms) • Prohibition of image and voice recordings in the SISP areas.
Entrance Control. Technical or organizational measures regarding access control, especially regarding legitimation of authorized persons: The aim of the entrance control is to prevent unauthorised people from physically accessing such data pro- cessing equipment which processes or uses Personal Data. Due to their respective security requirements, business premises and facilities are subdivided into different se- curity zones with different access authorizations. They are monitored by security personnel. Access for employ- ees is only possible with an encoded ID with a photo on it. All other persons have access only after having reg- istered before (e.g. at the main entrance). Access to special security areas such as the service centre for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security re- quirements for data centres
Entrance Control softgarden ensures that unauthorized persons have no access to the office, server and archive rooms. This is done by: Les mesures techniques et organisationnelles décrites à l’article 32 du RGPD ne sont pas destinées au grand public. Ces informations ne sont accessibles qu’au délégué à la protection des données de la société, aux autorités de contrôle respectives en matière de protection des données et à leurs propres salariés autorisés de l’unité de traitement des données concernée. Abréviations
AutoNDA by SimpleDocs
Entrance Control softgarden ensures that unauthorized persons have no access to the office, server and archive rooms. This is done by: Środki techniczne i organizacyjne opisane w art. 32 RODO nie są przeznaczone do użytku publicznego. Informacje te są dostępne tylko dla Inspektora Ochrony Danych osobowych w przedsiębiorstwie, dla odpowiednich organów nadzoru ds. ochrony danych oraz dla własnych upoważnionych pracowników danej jednostki przetwarzania danych. Skróty • DC: Centrum danych • B: Biuro softgarden Berlin

Related to Entrance Control

  • Weed Control The tenant shall control all noxious weeds on the subject lands and maintain all summerfallow in a reasonably weed-free condition.

  • Traffic Control The Surveyor shall control traffic in and near surveying operations adequately to comply with provisions of the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI which can be found on the State’s internet site. In the event field crew personnel must divert traffic or close traveled lanes, a Traffic Control Plan based upon principles outlined in the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI shall be prepared by the Surveyor and approved by the State prior to commencement of field work. A copy of the approved plan shall be in the possession of field crew personnel on the job site at all times and shall be made available to the State’s personnel for inspection upon request.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Job Control Personal Data being processed on commission (i.e., Personal Data processed on a customer’s behalf) is processed solely in accordance with the Agreement and related instructions of the customer. Measures: • SAP uses controls and processes to monitor compliance with contracts between SAP and its customers, subprocessors or other service providers. • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • All SAP employees and contractual subprocessors or other service providers are contractually bound to respect the confidentiality of all sensitive information including trade secrets of SAP customers and partners.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Erosion Control a. The Purchaser shall construct slash and debris erosion barriers, dips, water bars or ditches in skid trails and landings as directed by the Forest Officer.

  • Dust Control Dust-proof enclosures or partitions for protection wherever dusty or dirty work is performed and dampening of debris to avoid dusting when removed shall be provided and included as a cost of the work.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Pest Control A. Whenever a department utilizes a pest control chemical in State owned or managed buildings/grounds, the department will provide at least forty-eight (48) hours notice prior to application of the chemical, unless an infestation occurs which requires immediate action. Notices will be posted in the lobby of the building and will be disseminated to building tenant contacts.

  • Cost Control The budget established by the OWNER for the construction of the Project and CONSULTANT fee shall be considered as absolute. The CONSULTANT shall advise OWNER in writing of the following:

Time is Money Join Law Insider Premium to draft better contracts faster.