Workstation Security Sample Clauses

Workstation Security i. Users are not able to deactivate or bypass security settings.
AutoNDA by SimpleDocs
Workstation Security. Business Associate will implement physical safeguards for all workstations that access, create, receive, transmit, transact, or store PHI to restrict access to authorized users.
Workstation Security i. Anti-virus applications and detection signatures is configured on a regular basis.
Workstation Security. (all applicants)
Workstation Security. I agree to practice good workstation security measures on any computing device I use to access the secure electronic database. Good security measures include, but are not limited to, maintaining physical security of electronic devices, never leaving a device unattended while in use, and adequately shielding the screen from unauthorized viewing by others.
Workstation Security. The Provider ensures security of any workstation used to access Merck systems that process personal data. This must be ensured by: Workstation Security Implemented? (Yes / No)
Workstation Security. Implement physical safeguards to reduce the risk that unauthorized users will access workstations that access EPHI.
AutoNDA by SimpleDocs
Workstation Security i. Users are not able to deactivate or bypass security settings. SoS Consultancy Ltd. – October 2021
Workstation Security. Vendor workstations are secured using industry standard technology and practices, including firewalls, disk encryption, anti-virus software and asset tracking. Disaster Recovery and Business Continuity Vendor maintains a Business Continuity Plan (BCP), which defines the processes and procedures for the company to follow in the event of a disaster. Vendor will regularly review and test the BCP to ensure that it is capable of recovering Vendor assets and continuing key Vendor business processes in a timely manner.
Workstation Security. I understand that:
Time is Money Join Law Insider Premium to draft better contracts faster.