Access Control Sample Clauses

POPULAR SAMPLE Copied 34 times
Access Control. Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
Access Control. Genesys will implement appropriate access controls to ensure only authorized users have access to Customer Data within the Genesys PureConnect Cloud Service environment.
Access Control. Landlord shall be the sole determinant of the type and amount of any access control or courtesy guard services to be provided to the Project, if any. IN ALL EVENTS, LANDLORD SHALL NOT BE LIABLE TO TENANT, AND TENANT HEREBY WAIVES ANY CLAIM AGAINST LANDLORD, FOR (I) ANY UNAUTHORIZED OR CRIMINAL ENTRY OF THIRD PARTIES INTO THE PREMISES, THE BUILDING OR THE PROJECT, (II) ANY DAMAGE TO PERSONS, OR (III) ANY LOSS OF PROPERTY IN AND ABOUT THE PREMISES, THE BUILDING OR THE PROJECT, BY OR FROM ANY UNAUTHORIZED OR CRIMINAL ACTS OF THIRD PARTIES, REGARDLESS OF ANY ACTION, INACTION, FAILURE, BREAKDOWN, MALFUNCTION AND/OR INSUFFICIENCY OF THE ACCESS CONTROL OR COURTESY GUARD SERVICES PROVIDED BY LANDLORD, IF ANY. Tenant shall provide such supplemental security services and shall install within the Premises such supplemental security equipment, systems and procedures as may reasonably be required for the protection of its employees and invitees, provided that Tenant shall coordinate such services and equipment with any security provided by Landlord. The determination of the extent to which such supplemental security equipment, systems and procedures are reasonably required shall be made in the sole judgment, and shall be the sole responsibility, of Tenant. Tenant acknowledges that it has neither received nor relied upon any representation or warranty made by or on behalf of Landlord with respect to the safety or security of the Premises or the Project or any part thereof or the extent or effectiveness of any security measures or procedures now or hereafter provided by Landlord, and further acknowledges that Tenant has made its own independent determinations with respect to all such matters.
Access Control. Data Processor shall limit access to information and information processing facilities. Minimum requirements: An access control policy shall be established, documented and reviewed based on business and information security requirements Users shall only be provided with access to the network and network services that they have been specifically authorized to use Data Processor shall ensure authorized user access only and prevent unauthorized access to systems and services. Minimum requirements: A formal user registration and de-registration process shall be implemented to enable assignment of access rights A formal user access provisioning process shall be implemented to assign or revoke access rights for all user types to all systems and services The allocation and use of privileged access rights shall be restricted and controlled Asset owners shall review users’ access rights at regular intervals The access rights of all employees and external party users to information and information processing facilities shall be removed upon termination of their employment, contract or agreement, or adjusted upon change Data Processor shall define a robust and comprehensive set of attributes for passwords to be used on all accounts. All systems users shall be authenticated through state of the art authentication means. Minimum requirements: Minimum number of 12 digits Combination of three types characters Prohibition of common terms Frequent renewal Data Processor shall ensure the protection of information in networks and its supporting information processing facilities. Minimum requirements: Networks shall be managed and controlled to protect information in systems and applications Security mechanisms, service levels and management requirements of all network services shall be identified and included in network services agreements, whether these services are provided in-house or outsourced Groups of information services, users and information systems shall be segregated on networks Data Processor shall record events and generate evidence. Minimum requirements: Event logs recording user activities, exceptions, faults and information security events shall be produced, kept and regularly reviewed Logging facilities and log information shall be protected against tampering and unauthorized access System administrator and system operator activities shall be logged and the logs protected and regularly reviewed Data Processor shall ensure that all endpoints are protected. M...
Access Control. In addition to maintenance of MEAL cards, the Manufacturing and Central Computers shall record and generate a report on any access including date, time of access, person (by employee number) accessing the computer, and the reason for access.
Access Control. The City will maintain the control of access rights and prohibit the construction or use of any entrances or access points along the Project within the City other than those shown on the final Design Plans, unless prior approval is obtained from the Secretary.
Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Access Control. 9.17.10.1 Subrecipient shall implement formal procedures to control access to its systems, services and data, including, but not limited to, user account management procedures and other controls as outlined in this Subparagraph 9.17. Subrecipient shall ensure that network access to both internal and external networked services shall be controlled through the use of properly configured firewalls, etc. Operating systems will be used to enforce access controls to computer resources including, but not limited to, authentication, authorization and event logging. Applications will include access control to limit user access to information and application system functions. All systems will be monitored to detect deviation from access control policies and identify suspicious activity. Subrecipient shall record, review and act upon all events in accordance with incident response policies set forth herein. 9.17.10.2 Subrecipient shall develop, implement and enforce/maintain a password policy which requires users who are authorized to access confidential County Information Assets on electronic media to: create a strong complex password containing at least eight (8) characters, which shall include upper and lower case letters, digits and symbols; and, change his/her password at a minimum every ninety (90) days, etc. 9.17.10.3 Subrecipient shall develop, implement and enforce/maintain a password policy which provides for the following system requirements: when user changes his/her password, the system shall restrict user from re-using any of the last six (6) passwords; the system will lock itself after a minimum of three
Access Control. 10.1 Authentication and authorization controls must be appropriately robust for the risk of the system, data, application, and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.
Access Control. The access of authorized persons is limited to the personal data required for the fulfillment of their tasks. Facilities for data transfer are checked and it is determined, to whom personal data was transferred or provided or to whom personal data can be transferred and provided. Data recipients, to whom personal data is enclosed via facilities for data transfer (e.g. via remote access) can be identified.