Access Control. Authentication and authorization controls must be appropriatelyrobust for the risk of the system, data, application and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.
Appears in 4 contracts
Samples: Student Data Privacy Agreement, higherlogicdownload.s3.amazonaws.com, www.queensu.ca
Access Control. 10.1 Authentication and authorization controls must be appropriatelyrobust appropriately robust for the risk of the system, data, application application, and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.
Appears in 2 contracts
Samples: Data Processing Agreement, Data Processing Agreement
Access Control. Authentication and authorization controls must be appropriatelyrobust appropriately robust for the risk of the system, data, application application, and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.
Appears in 2 contracts
Samples: zoom.us, explore.zoom.us