{"component": "clause", "props": {"groups": [{"samples": [{"hash": "Xl1jNZTaEC", "uri": "/contracts/Xl1jNZTaEC#physical-access-control", "label": "Order Form", "score": 32.2249832153, "published": true}, {"hash": "kEDBpgOHYp8", "uri": "/contracts/kEDBpgOHYp8#physical-access-control", "label": "General Terms and Conditions for Cloud Services", "score": 31.873840332, "published": true}, {"hash": "bw3Yq8AwGOO", "uri": "/contracts/bw3Yq8AwGOO#physical-access-control", "label": "Personal Data Processing Agreement", "score": 30.5653781891, "published": true}], "size": 175, "snippet_links": [{"key": "unauthorized-persons", "type": "definition", "offset": [0, 20]}, {"key": "access-to-premises", "type": "clause", "offset": [57, 75]}, {"key": "data-processing-systems", "type": "clause", "offset": [102, 125]}, {"key": "personal-data", "type": "definition", "offset": [150, 163]}], "snippet": "Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.", "hash": "a22b85c960141984e51f316cad24cb46", "id": 1}, {"samples": [{"hash": "5scs28ehptK", "uri": "/contracts/5scs28ehptK#physical-access-control", "label": "Personal Data Processing Agreement", "score": 29.5306529999, "published": true}, {"hash": "kfbWLu92lcn", "uri": "/contracts/kfbWLu92lcn#physical-access-control", "label": "Personal Data Processing Agreement", "score": 29.4950675964, "published": true}, {"hash": "jXHgk7cPWaG", "uri": "/contracts/jXHgk7cPWaG#physical-access-control", "label": "Personal Data Processing Agreement", "score": 29.4950675964, "published": true}], "size": 25, "snippet_links": [{"key": "based-on", "type": "definition", "offset": [67, 75]}, {"key": "security-policy", "type": "definition", "offset": [84, 99]}, {"key": "in-general", "type": "clause", "offset": [102, 112]}, {"key": "access-control-systems", "type": "clause", "offset": [144, 166]}, {"key": "card-access-system", "type": "clause", "offset": [180, 198]}, {"key": "minimum-requirement", "type": "clause", "offset": [208, 227]}, {"key": "points-of", "type": "clause", "offset": [252, 261]}, {"key": "the-building", "type": "clause", "offset": [262, 274]}, {"key": "key-management", "type": "definition", "offset": [343, 357]}, {"key": "security-classification", "type": "definition", "offset": [378, 401]}, {"key": "additional-measures", "type": "clause", "offset": [484, 503]}, {"key": "video-surveillance", "type": "clause", "offset": [545, 563]}, {"key": "alarm-systems", "type": "clause", "offset": [574, 587]}, {"key": "access-rights", "type": "definition", "offset": [628, 641]}, {"key": "granted-to", "type": "definition", "offset": [646, 656]}, {"key": "authorized-persons", "type": "clause", "offset": [657, 675]}, {"key": "individual-basis", "type": "clause", "offset": [682, 698]}, {"key": "according-to", "type": "definition", "offset": [699, 711]}, {"key": "the-system", "type": "definition", "offset": [712, 722]}, {"key": "access-control-measures", "type": "clause", "offset": [732, 755]}, {"key": "applies-to", "type": "clause", "offset": [799, 809]}, {"key": "guests-and-visitors", "type": "clause", "offset": [826, 845]}, {"key": "data-centers", "type": "clause", "offset": [1047, 1059]}, {"key": "adhere-to", "type": "clause", "offset": [1060, 1069]}, {"key": "security-procedures", "type": "definition", "offset": [1077, 1096]}, {"key": "surveillance-cameras", "type": "clause", "offset": [1117, 1137]}, {"key": "measures-to", "type": "clause", "offset": [1193, 1204]}, {"key": "data-center-facilities", "type": "clause", "offset": [1227, 1249]}, {"key": "authorized-representatives", "type": "clause", "offset": [1279, 1305]}, {"key": "access-to-systems", "type": "clause", "offset": [1311, 1328]}, {"key": "the-data", "type": "clause", "offset": [1355, 1363]}, {"key": "security-equipment", "type": "clause", "offset": [1425, 1443]}, {"key": "on-a-regular-basis", "type": "definition", "offset": [1502, 1520]}, {"key": "data-center-providers", "type": "clause", "offset": [1548, 1569]}, {"key": "the-names", "type": "clause", "offset": [1574, 1583]}, {"key": "authorized-personnel", "type": "definition", "offset": [1597, 1617]}, {"key": "private-areas", "type": "definition", "offset": [1633, 1646]}], "snippet": "SAP protects its assets and facilities using the appropriate means based on the SAP Security Policy \u2022 In general, buildings are secured through access control systems (e.g., smart card access system). \u2022 As a minimum requirement, the outermost entrance points of the building must be fitted with a certified key system including modern, active key management. \u2022 Depending on the security classification, buildings, individual areas and surrounding premises may be further protected by additional measures. These include specific access profiles, video surveillance, intruder alarm systems and biometric access control systems. \u2022 Access rights are granted to authorized persons on an individual basis according to the System and Data Access Control measures (see Section 1.2 and 1.3 below). This also applies to visitor access. Guests and visitors to SAP buildings must register their names at reception and must be accompanied by authorized SAP personnel. \u2022 SAP employees and external personnel must wear their ID cards at all SAP locations. \u2022 All Data Centers adhere to strict security procedures enforced by guards, surveillance cameras, motion detectors, access control mechanisms and other measures to prevent equipment and Data Center facilities from being compromised. Only authorized representatives have access to systems and infrastructure within the Data Center facilities. To protect proper functionality, physical security equipment (e.g., motion sensors, cameras, etc.) undergo maintenance on a regular basis. \u2022 SAP and all third-party Data Center providers log the names and times of authorized personnel entering SAP\u2019s private areas within the Data Centers.", "hash": "e7f2c9121ef6541b9317bff9d4d2f48d", "id": 2}, {"samples": [{"hash": "aURYhFWpKW4", "uri": "/contracts/aURYhFWpKW4#physical-access-control", "label": "Data Processing Addendum", "score": 35.4831619263, "published": true}, {"hash": "7CmxGu4bafj", "uri": "/contracts/7CmxGu4bafj#physical-access-control", "label": "Data Processing Addendum", "score": 35.4806747437, "published": true}, {"hash": "8dhWxn2BnPa", "uri": "/contracts/8dhWxn2BnPa#physical-access-control", "label": "Data Processing Addendum", "score": 35.2261009216, "published": true}], "size": 17, "snippet_links": [{"key": "data-center", "type": "clause", "offset": [26, 37]}, {"key": "industry-standard", "type": "definition", "offset": [57, 74]}, {"key": "to-ensure", "type": "clause", "offset": [86, 95]}, {"key": "authorized-staff", "type": "definition", "offset": [124, 140]}, {"key": "the-services", "type": "definition", "offset": [202, 214]}, {"key": "access-controls", "type": "clause", "offset": [297, 312]}, {"key": "access-to-the", "type": "clause", "offset": [322, 335]}, {"key": "alarm-systems", "type": "clause", "offset": [360, 373]}, {"key": "unauthorized-access", "type": "definition", "offset": [391, 410]}], "snippet": "UKG shall ensure that its data center sub-processor uses industry standard technology to ensure that only the appropriately authorized staff have access to those systems of UKG that are used to provide the Services. This shall include at least the following measures: visitor sign-ins, role-based access controls, limited access to the server rooms and to the alarm systems which report any unauthorized access.", "hash": "4ef34da75c8d81634c4089cafb30c27e", "id": 3}, {"samples": [{"hash": "icHnNgGOE88", "uri": "/contracts/icHnNgGOE88#physical-access-control", "label": "Data Processing Agreement", "score": 30.3674259186, "published": true}, {"hash": "8d23VioVS6Y", "uri": "/contracts/8d23VioVS6Y#physical-access-control", "label": "Data Processing Agreement", "score": 23.8432579041, "published": true}, {"hash": "2fnhrjGmzeU", "uri": "/contracts/2fnhrjGmzeU#physical-access-control", "label": "Data Processing Agreement", "score": 23.8432579041, "published": true}], "size": 8, "snippet_links": [{"key": "access-to-premises", "type": "clause", "offset": [92, 110]}, {"key": "data-processing-systems", "type": "clause", "offset": [137, 160]}, {"key": "personal-data", "type": "definition", "offset": [198, 211]}, {"key": "physical-components", "type": "definition", "offset": [216, 235]}, {"key": "data-center-facilities", "type": "clause", "offset": [243, 265]}, {"key": "host-software", "type": "definition", "offset": [302, 315]}, {"key": "physical-barrier", "type": "clause", "offset": [357, 373]}, {"key": "access-points", "type": "definition", "offset": [506, 519]}, {"key": "control-devices", "type": "clause", "offset": [600, 615]}, {"key": "intrusion-detection", "type": "clause", "offset": [637, 656]}, {"key": "employees-and-third-parties", "type": "clause", "offset": [766, 793]}, {"key": "signed-in", "type": "clause", "offset": [898, 907]}, {"key": "use-of-video-cameras", "type": "clause", "offset": [912, 932]}, {"key": "access-to-data", "type": "clause", "offset": [971, 985]}, {"key": "data-centers", "type": "clause", "offset": [1008, 1020]}, {"key": "security-guards", "type": "definition", "offset": [1029, 1044]}, {"key": "the-building", "type": "clause", "offset": [1083, 1095]}], "snippet": "The following measures as implemented are designed to protect against unauthorized physical access to premises, buildings or rooms where data processing systems are located which process and/or use Personal Data:\na) Physical components of the data center facilities, servers, networking equipment, and host software are housed in nondescript facilities.\nb) Physical barrier controls are used to prevent unauthorized entrance to these facilities both at the perimeter (e.g., fencing, walls) and at building access points.\nc) Physical access points to server locations are managed by electronic access control devices and are secured with intrusion detection devices that sound alarms if the door is forced open or held open.\nd) Establishing access authorizations for employees and third parties, including the respective documentation.\ne) All visitors are required to present identification and are signed in.\nf) Use of video cameras (CCTV) to monitor individual physical access to data center facilities.\ng) Data centers utilize security guards 24x7, who are stationed in and around the building.", "hash": "be98dde51862ab4d661c0d499f937100", "id": 4}, {"samples": [{"hash": "2RPqXazQY6U", "uri": "/contracts/2RPqXazQY6U#physical-access-control", "label": "Data Processing Agreement", "score": 32.1065177917, "published": true}, {"hash": "3gedcePm6f8", "uri": "/contracts/3gedcePm6f8#physical-access-control", "label": "Data Processing Agreement", "score": 31.6220016479, "published": true}, {"hash": "2j4kalgFZp8", "uri": "/contracts/2j4kalgFZp8#physical-access-control", "label": "Data Processing Agreement", "score": 31.2706947327, "published": true}], "size": 6, "snippet_links": [{"key": "unauthorized-persons", "type": "definition", "offset": [33, 53]}, {"key": "data-processing-systems", "type": "clause", "offset": [77, 100]}, {"key": "personal-data", "type": "definition", "offset": [112, 125]}], "snippet": "Measures suitable for preventing unauthorized persons from gaining access to data processing systems with which personal data are processed or used.", "hash": "a3668af085fba52ba661b3bc8a566e2e", "id": 5}, {"samples": [{"hash": "lwhUceDoWEf", "uri": "/contracts/lwhUceDoWEf#physical-access-control", "label": "Terms of Service", "score": 32.5444946289, "published": true}, {"hash": "1Lx93fqcPhw", "uri": "/contracts/1Lx93fqcPhw#physical-access-control", "label": "Terms of Service", "score": 31.7833766937, "published": true}], "size": 6, "snippet_links": [{"key": "access-control-systems", "type": "clause", "offset": [37, 59]}, {"key": "in-place", "type": "clause", "offset": [60, 68]}, {"key": "access-authorization", "type": "clause", "offset": [74, 94]}, {"key": "employees-only", "type": "clause", "offset": [110, 124]}, {"key": "an-employee", "type": "definition", "offset": [257, 268]}], "snippet": "Netigate has card-based personalised access control systems in place with access authorization for authorised employees only (in Frankfurt, Osloand Stockholm). \u2022 Visitor regulations. Visitors are registered in a visitor\u2019s book and are always accompanied by an employee.", "hash": "154da24a3d3dd75302f185b56a89baec", "id": 6}, {"samples": [{"hash": "8RGq54KKx1H", "uri": "/contracts/8RGq54KKx1H#physical-access-control", "label": "Personal Data Processing Agreement", "score": 29.9932689667, "published": true}, {"hash": "f7HBOK3JOln", "uri": "/contracts/f7HBOK3JOln#physical-access-control", "label": "Personal Data Processing Agreement", "score": 29.5306529999, "published": true}, {"hash": "evLhXbzwYni", "uri": "/contracts/evLhXbzwYni#physical-access-control", "label": "Personal Data Processing Agreement", "score": 29.4950675964, "published": true}], "size": 5, "snippet_links": [{"key": "unauthorized-persons", "type": "definition", "offset": [0, 20]}, {"key": "access-to-premises", "type": "clause", "offset": [57, 75]}, {"key": "data-processing-systems", "type": "clause", "offset": [102, 125]}, {"key": "personal-data", "type": "definition", "offset": [150, 163]}], "snippet": "Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located. \ubb3c\ub9ac\uc801 \uc561\uc138\uc2a4 \uc81c\uc5b4. \uc2b9\uc778\ub418\uc9c0 \uc54a\uc740 \uc0ac\ub78c\uc774 \uac1c\uc778 \uc815\ubcf4\ub97c \ucc98\ub9ac\ud558\uac70\ub098 \uc0ac\uc6a9\ud558\ub294 \uc815\ubcf4 \ucc98\ub9ac \uc2dc\uc2a4\ud15c\uc774 \uc704\uce58\ud574 \uc788\ub294 \uc0ac\uc5c5\uc7a5, \uac74\ubb3c, \uc2e4\ub0b4\uc5d0 \ub300\ud55c \ubb3c\ub9ac\uc801 \uc561\uc138\uc2a4\ub97c \ud655\ubcf4\ud558\ub294 \uac83\uc744 \ubc29\uc9c0\ud569\ub2c8\ub2e4.", "hash": "a902360d2ae8566e7907563aa9e370d3", "id": 7}, {"samples": [{"hash": "eiBjtH2i528", "uri": "/contracts/eiBjtH2i528#physical-access-control", "label": "Data Processing and Transfer Agreement", "score": 36.5509934344, "published": true}, {"hash": "jXBiPTa80Sp", "uri": "/contracts/jXBiPTa80Sp#physical-access-control", "label": "Data Processing Agreement", "score": 35.2326545715, "published": true}, {"hash": "j54wXjEcWxE", "uri": "/contracts/j54wXjEcWxE#physical-access-control", "label": "Data Processing and Transfer Agreement", "score": 34.5523605347, "published": true}], "size": 5, "snippet_links": [{"key": "security-document", "type": "definition", "offset": [4, 21]}, {"key": "data-importer", "type": "clause", "offset": [44, 57]}, {"key": "access-to-the", "type": "clause", "offset": [111, 124]}, {"key": "information-systems", "type": "definition", "offset": [181, 200]}], "snippet": "The security document shall require and the data importer shall ensure that only the personnel authorized have access to the places housing the physical equipment that supports the information systems.", "hash": "5637eddfc5e6f736e05724e6f3ed957d", "id": 8}, {"samples": [{"hash": "8GQRKAP8zwc", "uri": "/contracts/8GQRKAP8zwc#physical-access-control", "label": "Data Processing Agreement", "score": 33.3301200867, "published": true}, {"hash": "9DixehkB9GN", "uri": "/contracts/9DixehkB9GN#physical-access-control", "label": "Data Processing Agreement", "score": 32.924987793, "published": true}, {"hash": "cDjcpBUeBMp", "uri": "/contracts/cDjcpBUeBMp#physical-access-control", "label": "Data Processing Agreement", "score": 32.7662200928, "published": true}], "size": 5, "snippet_links": [{"key": "the-software", "type": "clause", "offset": [0, 12]}, {"key": "data-centers", "type": "clause", "offset": [26, 38]}, {"key": "technical-and-organizational-measures", "type": "clause", "offset": [87, 124]}, {"key": "the-data", "type": "clause", "offset": [134, 142]}, {"key": "in-detail", "type": "clause", "offset": [216, 225]}], "snippet": "The software is hosted in data centers operated by Hetzner Online GmbH in Germany. The technical and organizational measures taken in the data centers of the subcontracted processor Hetzner Online GmbH are described in detail here: \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587\u2587\u2587\u2587\u2587.\u2587\u2587\u2587/AV/\u2587\u2587\u2587.pdf", "hash": "00409d1bd9e273f53c03721160e86706", "id": 9}, {"samples": [{"hash": "3x4t4CHXyDZ", "uri": "/contracts/3x4t4CHXyDZ#physical-access-control", "label": "Master Subscription Agreement", "score": 34.9688835144, "published": true}, {"hash": "6FxG0fVOWlT", "uri": "/contracts/6FxG0fVOWlT#physical-access-control", "label": "Master Subscription Agreement", "score": 27.77891922, "published": true}, {"hash": "dUYu2Amj7TM", "uri": "/contracts/dUYu2Amj7TM#physical-access-control", "label": "Master Subscription Agreement", "score": 26.8494186401, "published": true}], "size": 5, "snippet_links": [{"key": "data-centers", "type": "clause", "offset": [31, 43]}, {"key": "access-to-data", "type": "clause", "offset": [54, 68]}, {"key": "security-staff", "type": "definition", "offset": [200, 214]}, {"key": "employees-and-contractors", "type": "definition", "offset": [284, 309]}, {"key": "business-need", "type": "definition", "offset": [332, 345]}, {"key": "when-an-employee", "type": "clause", "offset": [367, 383]}], "snippet": "(i) Physical Protection of the Data Centers. Physical access to data centers is strictly controlled by the data center provider (\u201cDC Provider\u201d) both at the perimeter and at building ingress points by security staff. The DC Provider only provides data center access and information to employees and contractors who have a legitimate business need for such privileges. When an employee or contractor no longer has a business need for these privileges, his or her access is immediately revoked, even if he or she continues to be an employee or contractor of the DC Provider. All physical access to data centers is logged and audited routinely.", "hash": "9f5d0da604071e799005e8d707ca3daf", "id": 10}], "next_curs": "CmASWmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjwLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IiBwaHlzaWNhbC1hY2Nlc3MtY29udHJvbCMwMDAwMDAwYQyiAQJlbhgAIAA=", "clause": {"title": "Physical Access Control", "parents": [["definitions", "Definitions"], ["technical-and-organizational-measures", "TECHNICAL AND ORGANIZATIONAL MEASURES"], ["data-integrity-control", "Data Integrity Control"], ["miscellaneous", "Miscellaneous"], ["confidentiality", "Confidentiality"]], "size": 378, "children": [["system-access-control", "System Access Control"], ["data-access-control", "Data Access Control"], ["climate-and-temperature", "Climate and Temperature"], ["power", "Power"], ["monitoring", "Monitoring"]], "id": "physical-access-control", "related": [["access-control", "Access Control", "Access Control"], ["system-access-control", "System Access Control", "System Access Control"], ["data-access-control", "Data Access Control", "Data Access Control"], ["access-controls", "Access Controls", "Access Controls"], ["quality-control-system", "Quality control system", "Quality control system"]], "related_snippets": [], "updated": "2025-07-24T06:49:03+00:00"}, "json": true, "cursor": ""}}