System Access Controls Sample Clauses

System Access Controls. Data Processor shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
AutoNDA by SimpleDocs
System Access Controls. Q4, as a Data Processor, shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.
System Access Controls. Aircall shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factors authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Zendesk takes reasonable measures to prevent Service Data from being used without authorisation.
System Access Controls. Our Sub-processors will take reasonable measures to prevent Service Data from being used without authorisation. These controls shall vary based on the nature of the processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorisation processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Third-party service providers shall take reasonable measures to prevent data processing systems from being used without authorization. These controls shall vary based on the nature of processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.
System Access Controls data importer shall take reasonable measures to prevent personal data from being used without authorization. These controls shall vary based on the nature of the processing undertaken and may include, among other controls, authentication via passwords and/or two- factor authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
AutoNDA by SimpleDocs
System Access Controls. In order to access personal data, a documented, role-based authorisation concept must be in place that restricts access to the data so that only authorised persons can access the personal data necessary for their task (minimum principle). The password regulations from access control must also be implemented as part of access control. Administrative activities must be restricted to a small group of administrators. The activities of the administrators must be monitored and logged within the framework of technically justifiable expenditure.
System Access Controls. Oracle may, depending upon the particular Cloud Services ordered, apply among others the following controls: authentication via passwords and/or multi-factor authentication, documented authorization and change management processes, and logging of access. All remote access to the Oracle Cloud Network by Oracle personnel that have access to Your Content is restricted through the use of a Virtual Private Network which utilizes multi-factor authentication. In addition to the required use of a Virtual Private Network, before Oracle personnel are granted access to the Oracle Cloud Network, Oracle performs device posture checks and has in place controls, such as bastion hosts. Oracle prohibits (through both policy and technical controls) the use of personal devices to access the Oracle Cloud Network and the Services environment for the Cloud Services. For Cloud Services hosted at Oracle: (i) log-ins to Cloud Services environments are logged and (ii)logical access to the data centers is restricted and protected. Oracle Cloud Hosting and Delivery Policies Page 6 of 18
System Access Controls. Speexx shall take reasonable measures to prevent Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
Time is Money Join Law Insider Premium to draft better contracts faster.