System Access Controls Clause Samples
The System Access Controls clause establishes requirements for managing and restricting access to information systems within an organization. It typically outlines procedures for user authentication, authorization levels, and monitoring of system usage, ensuring that only authorized personnel can access sensitive data or critical functions. By implementing these controls, the clause helps protect against unauthorized access, data breaches, and misuse of systems, thereby safeguarding organizational assets and maintaining compliance with security standards.
System Access Controls. Data Processor shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Zendesk takes reasonable measures to prevent Service Data from being used without authorisation.
System Access Controls. Our Sub-processors will take reasonable measures to prevent Service Data from being used without authorisation. These controls shall vary based on the nature of the processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorisation processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Q4, as a Data Processor, shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.
System Access Controls. Aircall shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factors authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
System Access Controls the data importer shall take reasonable measures to prevent personal data from being used without authorization. These controls shall vary based on the nature of the processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Third-party service providers shall take reasonable measures to prevent data processing systems from being used without authorization. These controls shall vary based on the nature of processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.
System Access Controls. Oracle may, depending upon the particular Cloud Services ordered, apply among others the following controls: authentication via passwords and/or multi-factor authentication, documented authorization and change management processes, and logging of access. All remote access to the Oracle Cloud Network by Oracle personnel that have access to Your Content must be through a Virtual Private Network, utilizing multi- factor authentication. Oracle prohibits (through both policy and technical controls) the use of personal devices to access the Oracle Cloud Network and the Services environment for the Cloud Services. For Cloud Services hosted at Oracle: (i) log-ins to Cloud Services environments are logged and (ii) logical access to the data centers is restricted and protected.
System Access Controls. In order to access personal data, a documented, role-based authorisation concept must be in place that restricts access to the data so that only authorised persons can access the personal data necessary for their task (minimum principle). The password regulations from access control must also be implemented as part of access control. Administrative activities must be restricted to a small group of administrators. The activities of the administrators must be monitored and logged within the framework of technically justifiable expenditure.
System Access Controls. Speexx shall take reasonable measures to prevent Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
