Physical and Environmental Access Controls Sample Clauses

Physical and Environmental Access Controls. Splunk limits physical access to its information systems and facilities using physical controls (e.g., coded badge access) that provide reasonable assurance that access to its data centers is limited to authorized individuals and employs camera or video surveillance systems at critical internal and external entry points. Splunk applies air temperature and humidity controls for its data centers and protects against loss due to power failure.
AutoNDA by SimpleDocs
Physical and Environmental Access Controls. Processor limits physical access to its information systems and facilities using physical controls (e.g., coded pass access) that provide reasonable assurance that access to its data centers is limited to authorized individuals and employs camera or video surveillance systems at critical internal and external entry points. Processor applies air temperature and humidity controls for its data centers and protects against loss due to power failure. Logical Access Controls Processor employs logging and monitoring technology to help detect and prevent unauthorized access attempts to its networks and production systems. Processor's monitoring includes a review of changes affecting systems' handling authentication, authorization, and auditing; privileged access to Processor's production systems.
Physical and Environmental Access Controls. Ivanti limits physical access to its information systems and facilities using physical controls (e.g., coded pass access) that provide reasonable assurance that access to its data centers is limited to authorized individuals and employs camera or video surveillance systems at critical internal and external entry points. Ivanti applies air temperature and humidity controls for its data centers and protects against loss due to power failure. Logical Access Controls Ivanti employs logging and monitoring technology to help detect and prevent unauthorized access attempts to its networks and production systems. Ivanti's monitoring includes a review of changes affecting systems' handling authentication, authorization, and auditing; privileged access to Ivanti's production systems. Vulnerability Management Ivanti regularly performs vulnerability scans and addresses detected vulnerabilities in accordance with their risk. Ivanti products are also subject to periodic vulnerability assessment and penetration testing. Disaster Recovery and Back-up Controls Ivanti performs periodic backups of production file systems and databases according to a defined schedule and maintains a formal disaster recovery plan for the production cloud data center, including regular testing. Cyber Incident Response Plan Ivanti employs an incident response plan to manage and minimize the effects of unplanned cyber events that includes procedures to be followed in the event of an actual or potential security breach, including: an internal incident response team with a response leader; an investigation team performing a root causes analysis and identifying affected parties; internal reporting and notification processes; documenting responsive actions and remediation plans; and a post- incident review of events. Storage and Transmission Security Ivanti employs technical security measures to guard against unauthorized access to Ivanti data that is being transmitted over a public electronic communications network or stored electronically.

Related to Physical and Environmental Access Controls

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Physical and Environmental Security DST shall: (i) restrict entry to DST’s area(s) where Fund Confidential Information is stored, accessed, or processed solely to DST’s personnel or DST authorized third party service providers for such access; and (ii) implement commercially reasonable practices for infrastructure systems, including fire extinguishing, cooling, and power, emergency systems and employee safety.

  • Physical Access PROVIDER agrees to allow the Office of Early Learning and COALITION staff or sub-contractors immediate access to the facilities and spaces used to offer the VPK Program during normal business hours.

  • Environmental and Social Safeguards 1. The Project Implementing Entity shall ensure that the Project is carried out and implemented in accordance with the applicable provisions of the Environmental Management Plan.

  • Operating Environment Subscriber is solely responsible for acquiring, installing, operating and maintaining the hardware, software and Internet Browser environment necessary to access the Site and use the Services. Information on operating environment requirements can be located on the Site.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Smoke Free Environment The Lessor shall make all parts of the leased premise smoke-free. "

  • Work Environment It is mutually agreed that the prevention of accidents and injuries to state employees will result in greater efficiency of operations of state government. Toward this end, the Employer shall make every reasonable effort to provide and maintain safe and healthy working conditions and the Union shall fully cooperate by encouraging all employees to perform their assigned tasks in a safe manner.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

Time is Money Join Law Insider Premium to draft better contracts faster.