Systems Access Control and Network Access Control Sample Clauses

The Systems Access Control and Network Access Control clause establishes requirements for managing and restricting access to information systems and networks. It typically mandates that only authorized users are granted access, often through authentication mechanisms such as passwords, multi-factor authentication, or access cards, and may require regular review of user permissions. This clause is essential for protecting sensitive data and preventing unauthorized access, thereby reducing the risk of data breaches and ensuring compliance with security standards.
Systems Access Control and Network Access Control 

Related to Systems Access Control and Network Access Control

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Network Access During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.