Identification and Authentication Sample Clauses

Identification and Authentication. Customer shall assure that any access to any database related to the Cloud Services, whether by Customer or SAP, is automatically disconnected after a period of no-activity and that it has in place a method of handling malfunctions connected with identification authentication, all in accordance with the requirements under Section 9 of the Regulations.
AutoNDA by SimpleDocs
Identification and Authentication. 8. For access to In-Scope Information and for host devices that support it, assign unique credentials (eg. UserIDs, passwords) to authorized individual users, assign individual ownership to system service accounts, and ensure that system service accounts are not shared by administrators.
Identification and Authentication. User ID Requirements. The PSAP Manager shall require a unique logon ID to the Call Handling software system for every dispatcher (but not the PC Windows):  This unique logon shall have a 4‐character prefix corresponding to the PSAP County Code and Agency (Appendix D).  The leading 4‐character prefix may be followed by whatever remaining characters desired according to individual PSAP policy.  The logon shall have maximum character length is 32 and use only alpha‐numeric characters (no special characters such as “!@^&” may be used). Password Requirements. PSAP shall include the following minimum standards for establishing passwords:  Have a minimum length of eight (8) characters  Not be a dictionary word or proper name (best practice)  Not be the same as the User ID (best practice)  Password shall not shared.
Identification and Authentication. The data importer shall take the measures that ensures the identification and authentication of the users. The data importer shall establish a mechanism that permits the identification of any user who tries to access the information system and the verification of his authorization. The data importer’s documentation shall establish the frequency, which under no circumstances shall be less than yearly, with which the passwords shall be changed. While in force, passwords shall be stored in an unintelligible way.
Identification and Authentication. All access to any Mercury Information or any Global Processing Resources shall be Identified and Authenticated as defined in this Section. “Identification” refers to processes which establish the identity of the person or entity requesting access to Mercury Information and/or Global Processing Resources. “Authentication” refers to processes which validate the purported identity of the requestor. For access to Mercury Information or Global Processing Resources, each party shall require *****. Each party shall maintain its own procedures to ensure the protection, integrity, and soundness of all passwords created and/or used in connection with the Agreement.
Identification and Authentication. 40. A banking corporation shall determine the means of personal identification and authentication for its E-Banking activity in accordance with the risk assessment and policy approved by the Board of Directors.
Identification and Authentication. Each user who shares data as part of the eHealth Exchange shall be uniquely identified and their identity verified prior to granting access to a Participant’s system. The eHealth Exchange is a business associate of each Participant
AutoNDA by SimpleDocs
Identification and Authentication. All access to any Customer Information or any Notified Processing Resources shall be Identified and Authenticated as defined in this Section. “Identification” refers to processes which establish the identity of the person or entity requesting access to Customer Information and/or Notified Processing Resources. “Authentication” refers to processes which validate the purported identity of the requestor. For access to Customer Information or Notified Processing Resources, Notified shall require Authentication by the use of an individual, unique user ID and an individual password and/or other appropriate Authentication technique (e.g. soft token, pin, etc.). Notified shall obtain written approval from Customer prior to using digital certificates as part of Notified’s Identification or Authorization processes. Notified shall maintain procedures to ensure the protection, integrity, and soundness of all passwords created by Notified and/or used by Notified in connection with the Agreement.
Identification and Authentication. Access to Personal Data or any Cognizant Infrastructure shall be Identified and Authenticated as defined in this clause. "Identification" or "Identified" refers to processes that establish the identity of the person requesting access to the Personal Data and/or Cognizant Infrastructure. "Authentication" refers to processes that validate the purported identity of the requester. For access to Personal Data or Cognizant Infrastructure, Cognizant shall require Authentication by the use of an individual, unique user ID and an individual password or other appropriate Authentication technique. Cognizant shall maintain procedures designed for the protection, integrity, and soundness of any passwords created by Cognizant and/or used by Cognizant in connection with the performance of the services to Customer.
Identification and Authentication. All access to any Customer Information or any Notified Processing Resources shall be Identified and Authenticated as defined in this Section. “Identification” refers to processes which establish the identity of the person or entity requesting access to Customer Information identity of the requestor. For access to Customer Information or Notified Processing Resources, Notified shall require Authentication by the use of an individual, unique user ID and an individual password and/or other appropriate Authentication technique (e.g. soft token, pin, etc.). Notified shall obtain written approval from Customer prior to using digital certificates as part of Notified’s Identification or Authorization processes. Notified shall maintain procedures to ensure the protection, integrity, and soundness of all passwords created by Notified and/or used by Notified in connection with the Agreement.
Time is Money Join Law Insider Premium to draft better contracts faster.