Logical Access Control Sample Clauses

Logical Access Control. The goal of logical access control is to prevent unauthorized persons from using data processing systems that process and use personal data. Data terminals (PC, servers, network components) are accessed by means of authorization and authentication in all systems. Access control regulations include the following measures: • Passwords (lower and upper case letters, special characters, numbers, minimum 8 characters, changed regularly, password history) • Company ID with PKI encryption (two-stage security) • Role-based rights are tied to access ID (classified according to administrator, user, etc.) • Screen lock with password activation in user’s absence • Encryption of data storage devices while in transit (including notebook hard drives) • Use of firewalls and antivirus software including regular security updates and patches.
AutoNDA by SimpleDocs
Logical Access Control. No unauthorized access to data processing systems is granted. Access to our electronic data pro- cessing systems through external interfaces is firewall protected. Sensitive services, which must not be accessible publicly, are protected through a VPN. Publicly accessible systems, such as email and internet access are isolated from other services through appropriate segmentation. HWD operates diverse, depending on the security classification, in part physically separated networks. All systems are password-protected and only allow user-specific access. Group access is not implemented. In addition to strong password requirements on the basis of internal password guidelines, a 2-factor-authentica- tion system is used for authentication on sensitive systems of HWD. HWD’s password policy, besides defining password complexity requirements, also includes additional framework parameters, such as the mandatory password resetting within defined terms, as well as prohibiting reuse of the same password. Access privileges to customer equipment are handled in detail according to specific customer instruc- tion and based on the services provided by HWD. According to HWD internal policies, depending on system type and classification, failed login attempts are responded to in different appropriate manners. Along with temporary access blocking, dynamic addition of network blocking, or permanent access removal, also logging and alerting takes place.
Logical Access Control. Unauthorised persons shall be denied access to data processing equipment with which personal data are processed or used. Userlane GmbH Xxxxxxxxxxx Xxx. 000x 00000 Xxxxxx Registry: HRB 000000 Xxxxxxxx Xxxxx Xxxxxx Board of Directors: Xxxxxxx Xxxx, Xxxxx Xxxxxxx Document Owner: Contact: xxx@xxxxxxxx.xxx Date of last modification: 19th May 2021 Page: 8 of 16 Access to Personal Data in Visitor Areas: It is ensured that personal data in the company is not freely accessible in visitor areas. Password Manager: A password manager is used in the company. The following password manager is used: Password Manager - Access Control: The used password manager offers sufficient access control and encrypted storage.
Logical Access Control. Measures appropriate for preventing unauthorized persons from using data processing systems. Functional and/or time-limited assignment of user authorizations Creation of user profiles Password policy including regulations regarding password length, assignment and changes Assignment of user profiles to IT systems Authentication with user name / password Use of VPN technology Use of intrusion detection systems and intrusion prevention systems Use of central smartphone administration software (e.g. for external deletion of data) Use of antivirus software Use of a software firewall Use of a hardware firewall Laptop hard disc encryption Use of e-mail spam filters Additional login system for different applications
Logical Access Control a. Service Infrastructure.
Logical Access Control i. Enom requires that its employees and contractors secure computers and data while unattended.
Logical Access Control. Logical access control procedures are in place, designed to prevent or mitigate the threat of unauthorized application access and data loss in corporate and production environments. Employees are granted minimum (or “least privilege”) access to specified Genesys systems, applications, networks, and devices as needed. Further, user privileges are segregated based on functional role and environment. Administrative controls set or restrict agent/user access to certain actions, setup areas, departments and folders. The Genesys operational system is only accessible with an authorized username (or email) and password combination. Usernames (and emails) must be unique throughout the entire Genesys system, and minimum password length and complexity requirements are enforced. Enhanced password controls, including initial login reset, rotation, aging, non-reuse and incorrect password lockout, are available to administrators in the user configuration settings. Single Sign On (SSO) integration is available to Enterprise subscribers using XXXX 2.0-compliant user management systems. User logins to Genesys are logged and reported within the application. Access to these reports can be restricted using permission settings.
AutoNDA by SimpleDocs
Logical Access Control a. IBM will:
Logical Access Control. Authorised user names and individual passwords for accessing data processing systems.
Logical Access Control. No unauthorized system usage is provided. SSH keys are required when identifying trusted computers along with usernames and passwords. Two-step authentication is enabled on every cloud platform that is providing it (platforms such as AWS). Individual authentication credentials are not shared. SSH keys are frequently rotated. All end-points (computers, laptops, mobile phones) are using encrypted storage, secure passwords, and auto-locking mechanisms.
Time is Money Join Law Insider Premium to draft better contracts faster.