Access Control Sample Clauses

Access Control. Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
AutoNDA by SimpleDocs
Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Access Control. Landlord shall be the sole determinant of the type and amount of any access control or courtesy guard services to be provided to the Project, if any. IN ALL EVENTS, LANDLORD SHALL NOT BE LIABLE TO TENANT, AND TENANT HEREBY WAIVES ANY CLAIM AGAINST LANDLORD, FOR (I) ANY UNAUTHORIZED OR CRIMINAL ENTRY OF THIRD PARTIES INTO THE PREMISES, THE BUILDING OR THE PROJECT, (II) ANY DAMAGE TO PERSONS, OR (III) ANY LOSS OF PROPERTY IN AND ABOUT THE PREMISES, THE BUILDING OR THE PROJECT, BY OR FROM ANY UNAUTHORIZED OR CRIMINAL ACTS OF THIRD PARTIES, REGARDLESS OF ANY ACTION, INACTION, FAILURE, BREAKDOWN, MALFUNCTION AND/OR INSUFFICIENCY OF THE ACCESS CONTROL OR COURTESY GUARD SERVICES PROVIDED BY LANDLORD, IF ANY. Tenant shall provide such supplemental security services and shall install within the Premises such supplemental security equipment, systems and procedures as may reasonably be required for the protection of its employees and invitees, provided that Tenant shall coordinate such services and equipment with any security provided by Landlord. The determination of the extent to which such supplemental security equipment, systems and procedures are reasonably required shall be made in the sole judgment, and shall be the sole responsibility, of Tenant. Tenant acknowledges that it has neither received nor relied upon any representation or warranty made by or on behalf of Landlord with respect to the safety or security of the Premises or the Project or any part thereof or the extent or effectiveness of any security measures or procedures now or hereafter provided by Landlord, and further acknowledges that Tenant has made its own independent determinations with respect to all such matters.
Access Control. The City will maintain the control of access rights and prohibit the construction or use of any entrances or access points along the Project within the City other than those shown on the final Design Plans, unless prior approval is obtained from the Secretary.
Access Control. 9.17.10.1 Subrecipient shall implement formal procedures to control access to its systems, services and data, including, but not limited to, user account management procedures and other controls as outlined in this Subparagraph 9.17. Subrecipient shall ensure that network access to both internal and external networked services shall be controlled through the use of properly configured firewalls, etc. Operating systems will be used to enforce access controls to computer resources including, but not limited to, authentication, authorization and event logging. Applications will include access control to limit user access to information and application system functions. All systems will be monitored to detect deviation from access control policies and identify suspicious activity. Subrecipient shall record, review and act upon all events in accordance with incident response policies set forth herein.
Access Control. In addition to maintenance of MEAL cards, the Manufacturing and Central Computers shall record and generate a report on any access including date, time of access, person (by employee number) accessing the computer, and the reason for access.
Access Control. The access of authorized persons is limited to the personal data required for the fulfillment of their tasks. Facilities for data transfer are checked and it is determined, to whom personal data was transferred or provided or to whom personal data can be transferred and provided. Data recipients, to whom personal data is enclosed via facilities for data transfer (e.g. via remote access) can be identified.
AutoNDA by SimpleDocs
Access Control. IBM maintains logical separation of client data. Client data resides in its own client-specific schema and is designed to be accessible through the Cloud Service or client-specified data export. Access to the Cloud Service and client data is controlled and managed by the client’s designated administrator. IBM uses multi factor authentication and encrypted VPN tunnel technology when accessing client systems. Access is restricted to those individuals requiring access in order to maintain and administer the Cloud Service and associated hardware and software infrastructure in third party data center facilities. IBM uses WIFI (a/k/a 802.11) network traffic that is encrypted using WPA2 with the AES encryption algorithm option and provides for non-broadcast SSID and mutual authentication between the server and the end devices when accessing systems containing client data.
Access Control. Authentication and authorization controls must be appropriatelyrobust for the risk of the system, data, application and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.
Access Control. 1.1. Supplier will limit information system access to authorized users, authorized processes acting on behalf of authorized users, or authorized devices (including other information systems), and such access will be limited to only those types of transactions and functions authorized users or devices are permitted to exercise.
Time is Money Join Law Insider Premium to draft better contracts faster.