{"component": "definition", "props": {"groups": [{"snippet_links": [{"key": "security-zone", "type": "definition", "offset": [87, 100]}, {"key": "all-other-individuals", "type": "clause", "offset": [123, 144]}, {"key": "subject-to", "type": "clause", "offset": [149, 159]}], "snippet": "means a system for allowing only approved individuals to have unescorted access to the security zone and for ensuring that all other individuals are subject to escorted access.", "size": 103, "samples": [{"hash": "6P1HVrhn3PD", "uri": "https://www.nrc.gov/docs/ML2430/ML24305A217.pdf", "label": "www.nrc.gov", "score": 19.6580123901, "published": false}, {"hash": "RIapZXCxkQ", "uri": "https://docs.legis.wisconsin.gov/code/register/2023/810b/insert/dhs157.pdf", "label": "docs.legis.wisconsin.gov", "score": 18.2396774292, "published": false}, {"hash": "bOtnCv0yJ3T", "uri": "https://docs.legis.wisconsin.gov/code/admin_code/dhs/110/157.pdf", "label": "docs.legis.wisconsin.gov", "score": 18.2352581024, "published": false}], "hash": "4e9f59b62d35570dd7acf7744e6eeff8", "id": 1}, {"snippet_links": [{"key": "application-of", "type": "clause", "offset": [10, 24]}, {"key": "unauthorised-persons", "type": "definition", "offset": [53, 73]}], "snippet": "means the application of means by which the entry of unauthorised persons or unauthorised vehicles, or both, may be prevented;", "size": 39, "samples": [{"hash": "kMKDf0ZCXh8", "uri": "https://assets.ctfassets.net/biom0eqyyi6b/2APWrM6ic94QBCP6vtptdt/f928eeb2700ec1d321330585fc8e0578/Acces_Policy_2025__ENG_.pdf", "label": "assets.ctfassets.net", "score": 19.9582996368, "published": false}, {"hash": "cKLcPVfHYBS", "uri": "https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52007AG0003", "label": "eur-lex.europa.eu", "score": 17.2786121368, "published": false}, {"hash": "kRtZUVGCm7C", "uri": "https://www.legislation.gov.im/cms/images/LEGISLATION/SUBORDINATE/2024/2024-0120/2024-0120_1.pdf", "label": "www.legislation.gov.im", "score": 17.0837097168, "published": false}], "hash": "5a35a55dea684f5bd6be6f7117a16445", "id": 2}, {"snippet_links": [{"key": "the-relevant", "type": "clause", "offset": [0, 12]}, {"key": "segregation-of-duties", "type": "clause", "offset": [47, 68]}, {"key": "areas-of-responsibility", "type": "clause", "offset": [81, 104]}, {"key": "the-organisation", "type": "clause", "offset": [209, 225]}, {"key": "user-access-management", "type": "clause", "offset": [236, 258]}, {"key": "to-ensure", "type": "clause", "offset": [260, 269]}, {"key": "authorised-user", "type": "definition", "offset": [270, 285]}, {"key": "access-to-information-systems", "type": "clause", "offset": [321, 350]}, {"key": "user-registration", "type": "definition", "offset": [352, 369]}, {"key": "a-formal", "type": "clause", "offset": [386, 394]}, {"key": "in-place", "type": "clause", "offset": [442, 450]}, {"key": "all-information", "type": "clause", "offset": [487, 502]}, {"key": "systems-and-services", "type": "clause", "offset": [503, 523]}, {"key": "privilege-management", "type": "clause", "offset": [525, 545]}, {"key": "the-allocation", "type": "clause", "offset": [547, 561]}, {"key": "review-of-user-access-rights", "type": "clause", "offset": [620, 648]}, {"key": "regular-intervals", "type": "definition", "offset": [698, 715]}, {"key": "formal-process", "type": "clause", "offset": [724, 738]}, {"key": "network-access-control", "type": "clause", "offset": [740, 762]}, {"key": "unauthorized-access", "type": "definition", "offset": [786, 805]}, {"key": "networked-services", "type": "clause", "offset": [809, 827]}, {"key": "network-services", "type": "definition", "offset": [846, 862]}, {"key": "access-to-the-services", "type": "clause", "offset": [898, 920]}, {"key": "processing-activities", "type": "clause", "offset": [1031, 1052]}, {"key": "audit-logging", "type": "clause", "offset": [1054, 1067]}, {"key": "audit-logs", "type": "definition", "offset": [1069, 1079]}, {"key": "user-activities", "type": "definition", "offset": [1090, 1105]}, {"key": "and-information", "type": "clause", "offset": [1119, 1134]}, {"key": "security-events", "type": "clause", "offset": [1135, 1150]}, {"key": "agreed-period", "type": "definition", "offset": [1185, 1198]}, {"key": "to-assist", "type": "clause", "offset": [1199, 1208]}, {"key": "investigations-and-access", "type": "clause", "offset": [1219, 1244]}, {"key": "monitoring-system-use", "type": "clause", "offset": [1265, 1286]}, {"key": "use-of-information", "type": "clause", "offset": [1314, 1332]}, {"key": "processing-facilities", "type": "definition", "offset": [1333, 1354]}, {"key": "results-of-the", "type": "clause", "offset": [1384, 1398]}, {"key": "monitoring-activities", "type": "clause", "offset": [1399, 1420]}, {"key": "the-network", "type": "clause", "offset": [1450, 1461]}, {"key": "services-information", "type": "definition", "offset": [1489, 1509]}, {"key": "access-permissions", "type": "definition", "offset": [1581, 1599]}, {"key": "information-security-management-system", "type": "definition", "offset": [1684, 1722]}, {"key": "changes-in", "type": "definition", "offset": [1802, 1812]}], "snippet": "The relevant ISO27001 controls are as follows: Segregation of duties: Duties and areas of responsibility shall be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organisation\u2019s assets. User access management: To ensure authorised user access and to prevent unauthorised access to information systems. User registration: There shall be a formal user registration and deregistration procedure in place for granting and revoking access to all information systems and services. Privilege management: The allocation and use of privileges shall be restricted and controlled. Review of user access rights: Management shall review users\u2019 access rights at regular intervals using a formal process. Network access control: Objective: To prevent unauthorized access to networked services. Policy on use of network services: Users shall only be provided with access to the services that they have been specifically authorized to use. Monitoring: Objective: To detect unauthorised information processing activities. Audit logging: Audit logs recording user activities, exceptions, and information security events shall be produced and kept for an agreed period to assist in future investigations and access control monitoring. Monitoring system use: Procedures for monitoring use of information processing facilities shall be established and the results of the monitoring activities reviewed regularly. Comment: The network upon which Scottish Public Services Information will be processed is configured in such a way as to ensure appropriate access permissions. The relevant controls from ISO27001 are shown above, and these are included in the Information Security Management System. The HR team also informs IT Admin of new joiners, those who have left and any changes in role which may affect user access.", "size": 12, "samples": [{"hash": "hENuEl16qMR", "uri": "/contracts/hENuEl16qMR#access-control", "label": "Services Contract", "score": 34.1679840088, "published": true}, {"hash": "lTwLHsi0jRJ", "uri": "/contracts/lTwLHsi0jRJ#access-control", "label": "Services Contract", "score": 34.0840339661, "published": true}, {"hash": "gLUFvcyADQ8", "uri": "/contracts/gLUFvcyADQ8#access-control", "label": "Services Contract", "score": 33.182926178, "published": true}], "hash": "af035878b7e1c8846543b02bda366091", "id": 3}, {"snippet_links": [{"key": "the-system", "type": "definition", "offset": [0, 10]}, {"key": "access-to", "type": "definition", "offset": [37, 46]}, {"key": "adult-supervision", "type": "clause", "offset": [115, 132]}, {"key": "adult-programming", "type": "definition", "offset": [214, 231]}], "snippet": "The System will be designed to limit access to only those persons who are adult passengers or who are minors under adult supervision. Passengers will be able to limit access to various services, such as gaming and adult programming, by enabling lock-out codes and using password procedures.", "size": 7, "samples": [{"hash": "lnh01tF0Sih", "uri": "/contracts/lnh01tF0Sih#access-control", "label": "Concession Agreement (Allin Communications Corp)", "score": 18.0, "published": true}, {"hash": "hQHjP42RAnt", "uri": "/contracts/hQHjP42RAnt#access-control", "label": "Service Agreement (Allin Communications Corp)", "score": 18.0, "published": true}, {"hash": "8Zhw65ukhhy", "uri": "/contracts/8Zhw65ukhhy#access-control", "label": "Concession Agreement (Allin Communications Corp)", "score": 18.0, "published": true}], "hash": "5cd3c1af4060a5edb403b911b5ecad6b", "id": 4}, {"snippet_links": [{"key": "access-to", "type": "definition", "offset": [21, 30]}, {"key": "commercial-and-industrial-premises", "type": "definition", "offset": [45, 79]}], "snippet": "means the control of access to and exit from Commercial and Industrial Premises.", "size": 6, "samples": [{"hash": "eZxdZS2a524", "uri": "https://www.sic.co.ls/wp-content/uploads/2022/03/Broad-Form-Security-Companies.pdf", "label": "www.sic.co.ls", "score": 11.094455719, "published": false}, {"hash": "7ryZ3J8YbQw", "uri": "https://leppard.co.za/wp-content/uploads/2023/06/SecurityLiabilityProposal2023.pdf", "label": "leppard.co.za", "score": 9.4736480713, "published": false}, {"hash": "hYxwVBpgchm", "uri": "http://stibt.co.za/wp-content/uploads/2016/08/Security-Liability-Proposal-2003.pdf", "label": "stibt.co.za", "score": 8.4277887344, "published": false}], "hash": "274f96f413bbbba2266e102947959903", "id": 5}, {"snippet_links": [{"key": "security-procedure", "type": "clause", "offset": [10, 28]}, {"key": "to-ensure", "type": "clause", "offset": [37, 46]}, {"key": "only-persons", "type": "clause", "offset": [52, 64]}, {"key": "the-premises", "type": "clause", "offset": [198, 210]}], "snippet": "means the security procedure applied to ensure that only persons authorised, authorised vehicles and authorised items carried by such persons or transported in such vehicles are allowed access into the premises or zone being controlled;", "size": 6, "samples": [{"hash": "auHvnYnnv9c", "uri": "https://registers.ecoimpact.co.za/app/webroot/uploads/doc_legislations/file_6696222fae972o_1i2t7av4i1hhb1efk7q81snm1kml7.pdf", "label": "registers.ecoimpact.co.za", "score": 19.4417686462, "published": false}, {"hash": "dRytPd6U6VJ", "uri": "https://www.sanparks.org/docs/groups_tenders/2013/ppp_skukuza_airport/appendix-b.pdf", "label": "www.sanparks.org", "score": 6.2073922157, "published": false}, {"hash": "4izcwW6gdEf", "uri": "https://cisp.cachefly.net/assets/articles/attachments/40106_r425.pdf", "label": "cisp.cachefly.net", "score": 6.2073922157, "published": false}], "hash": "56a7e88fd8e85323eca98a49040fd1f8", "id": 6}, {"snippet_links": [{"key": "security-measure", "type": "clause", "offset": [8, 24]}, {"key": "access-to", "type": "definition", "offset": [37, 46]}], "snippet": "means a security measure restricting access to a resource to those who are authorized.", "size": 5, "samples": [{"hash": "dWzHHnvkSCb", "uri": "https://hbex.coveredca.com/solicitations/2013-08/library/2013-08%20Enterprise%20Analytics%20Solution%20-%20RFP%20-%20Addendum%205.pdf", "label": "hbex.coveredca.com", "score": 7.5201916695, "published": false}, {"hash": "lh0WTJo3nr3", "uri": "https://hbex.coveredca.com/solicitations/2013-08/library/2013-08%20Enterprise%20Analytics%20Solution%20-%20RFP%20-%20Addendum%204.pdf", "label": "hbex.coveredca.com", "score": 7.4859685898, "published": false}, {"hash": "hSLI3jvalUo", "uri": "https://hbex.coveredca.com/solicitations/2013-08/library/2013-08%20Enterprise%20Analytics%20Solution%20-%20RFP%20-%20Addendum%203.pdf", "label": "hbex.coveredca.com", "score": 7.4490075111, "published": false}], "hash": "b80c0618e629707e7659e0c9a4169c8b", "id": 7}, {"snippet_links": [{"key": "the-right-of-access", "type": "definition", "offset": [11, 30]}, {"key": "the-highway", "type": "definition", "offset": [59, 70]}, {"key": "department-or", "type": "definition", "offset": [112, 125]}], "snippet": "means that the right of access between a property abutting the highway and the highway has been acquired by the department or eliminated by law.", "size": 5, "samples": [{"hash": "cjcbUV7wuRc", "uri": "http://klamathcounty.org/AgendaCenter/ViewFile/ArchivedAgenda/_10162019-809?packet=true", "label": "klamathcounty.org", "score": 9.0273780823, "published": false}, {"hash": "6HnG0i9fHGY", "uri": "https://www.klamathcounty.org/AgendaCenter/ViewFile/Agenda/_10162019-653?packet=true", "label": "www.klamathcounty.org", "score": 8.9096508026, "published": false}, {"hash": "MtzHfVYtpR", "uri": "https://www.oregon.gov/odot/Engineering/Doc_TechnicalGuidance/AM15-02b.pdf", "label": "www.oregon.gov", "score": 7.6064338684, "published": false}], "hash": "e1322c3e75fa367349d0411b25d674d9", "id": 8}, {"snippet_links": [{"key": "a-policy", "type": "clause", "offset": [0, 8]}, {"key": "unique-user", "type": "definition", "offset": [21, 32]}, {"key": "lockout-policy", "type": "clause", "offset": [79, 93]}, {"key": "access-monitoring", "type": "clause", "offset": [95, 112]}, {"key": "in-place", "type": "clause", "offset": [122, 130]}], "snippet": "A policy that covers Unique User ID, Password Rules, Automatic Logoff, Account Lockout Policy, Access Monitoring shall be in place.", "size": 5, "samples": [{"hash": "2MNsKQwRZe5", "uri": "/contracts/2MNsKQwRZe5#access-control", "label": "Licence Agreement", "score": 29.8372383118, "published": true}, {"hash": "jAUBMvtWJJo", "uri": "/contracts/jAUBMvtWJJo#access-control", "label": "Licence Agreement", "score": 29.4950675964, "published": true}, {"hash": "f6tTulRc4Lh", "uri": "/contracts/f6tTulRc4Lh#access-control", "label": "Licence Agreement", "score": 28.175655365, "published": true}], "hash": "c89877b8107e7201e1c7351045355c8e", "id": 9}, {"snippet_links": [{"key": "no-right", "type": "clause", "offset": [6, 14]}, {"key": "the-highway", "type": "definition", "offset": [60, 71]}, {"key": "the-right-of-access", "type": "definition", "offset": [89, 108]}, {"key": "department-or", "type": "definition", "offset": [139, 152]}], "snippet": "means no right of access exists between a property abutting the highway and the highway. The right of access may have been acquired by the Department or eliminated by law.", "size": 4, "samples": [{"hash": "hFvoix61Gzk", "uri": "https://records.sos.state.or.us/ORSOSWebDrawer/Record/8158597/file/browserviewable?inline=true", "label": "records.sos.state.or.us", "score": 4.0, "published": false}, {"hash": "keBc9OT4yB7", "uri": "http://huntingtontrafficsolutions.com/uploads/2010/07/3-TempRuleDraft6-27-Complete-text.pdf", "label": "huntingtontrafficsolutions.com", "score": 3.2532513142, "published": false}, {"hash": "bxftpNYS4ux", "uri": "https://records.sos.state.or.us/ORSOSWebDrawer/Record/8162449/file/browserviewable?inline=true", "label": "records.sos.state.or.us", "score": 3.0, "published": false}], "hash": "2d46f68863984e91f2ec83cd126ac622", "id": 10}], "next_curs": "ClsSVWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjcLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIXYWNjZXNzLWNvbnRyb2wjMDAwMDAwMGEMogECZW4YACAA", "definition": {"title": "Access control", "snippet": "means a system for allowing only approved individuals to have unescorted access to the security zone and for ensuring that all other individuals are subject to escorted access.", "size": 248, "id": "access-control", "examples": ["<strong>Access control</strong> devices may be unmonitored and may occasionally malfunction.", "<strong>Access control</strong> lists (ACLs) implemented in the form of tiered ACLs on routers, firewall rules and host based firewall rules are implemented in the network with restrictions on network communication, protocols, and port numbers.", "<strong>Access control</strong> technologies that are used to limit the use of digital content and devices in online or offline environments.", "<strong>Access control</strong> to the facilities where the data is stored is logged for security and reporting purposes.", "<strong>Access control</strong> should start by denying access to everything, and then explicitly granting access according to the \u201cneed to know\u201d principle.", "Digital Rights Management <strong>Access control</strong> technologies that are used by hardware manufacturers, licensors, copyright holders and individuals to limit the use of digital content and devices in on-line or off-line environments.", "<strong>Access control</strong> lists define the behavior of any user within our information systems, and security policies limit them to authorized behaviors.", "These policies are built around strict requirements in a number of areas, such as; \u2022 Information security \u2022 Hosting environment security \u2022 Third party access \u2022 Capacity control \u2022 Change management \u2022 Backup and recovery \u2022 <strong>Access control</strong> \u2022 Documentation \u2022 Logging and monitoring \u2022 Incident response \u2022 Release management itslearning have a team of security experts who are responsible for the overall information security of the organization.", "<strong>Access control</strong> audit trails must be maintained sufficient to support an investigation.", "<strong>Access control</strong> rules shall account for and reflect Supplier&#x27;s policies for information dissemination and authorization, and these rules shall be supported by formal procedures and clearly defined responsibilities."], "related": [["access-channel", "Access Channel", "Access Channel"], ["access-card", "Access Card", "Access Card"], ["access-tandem-switch", "Access Tandem Switch", "Access Tandem Switch"], ["local-access-transport-area", "Local Access Transport Area", "Local Access Transport Area"], ["site-control", "Site Control", "Site Control"]], "related_snippets": [], "updated": "2025-07-24T04:27:56+00:00"}, "json": true, "cursor": ""}}