Common use of Access Control Clause in Contracts

Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.

Appears in 10 contracts

Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

AutoNDA by SimpleDocs

Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.

Appears in 6 contracts

Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM Emptoris data centers that support this Cloud Servicecenters. Access control logs are audited regularly. Termination and employment change procedures are in place and include return of assets and access right removal.

Appears in 5 contracts

Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM data centers that support this Cloud Service.

Appears in 4 contracts

Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.

Appears in 2 contracts

Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.

Appears in 2 contracts

Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer There is no usage of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.

Appears in 2 contracts

Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two-factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.

Appears in 2 contracts

Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of dutiesand this access is reviewed quarterly. IBM support staff use two-factor authentication to an intermediate “gateway” management host. All connections are host and encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment Access is logged. There is no usage of WIFI use is prohibited within the IBM data centers that support this Cloud Servicecenters.

Appears in 2 contracts

Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement

Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.

Appears in 1 contract

Samples: Ibm Cloud Services Agreement

Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management man- agement host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM Emptoris data centers that support this Cloud Servicecenters. Access control logs are audited regularly. Termination and employ- ment change procedures are in place and include return of assets and access right removal.

Appears in 1 contract

Samples: Ibm Cloud Services Agreement

AutoNDA by SimpleDocs

Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management host. All connections are use encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM data centers that support this the Cloud Service.

Appears in 1 contract

Samples: Ibm Cloud Services Agreement

Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.

Appears in 1 contract

Samples: Ibm Cloud Services Agreement

Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.

Appears in 1 contract

Samples: Services Agreement

Access Control. Access to client data, if required, data is allowed only by authorized IBM support Support representatives according to principles of segregation of duties. IBM Support staff use two-factor authentication to an intermediate “gateway” gateway management host. All connections are encrypted channels when accessing client data. All access to client data and is logged. All transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM SmartCloud data centers that support this Cloud Servicecenters. Access control logs are audited regularly. Termination and employment change procedures are in place and include return of assets and access right removal.

Appears in 1 contract

Samples: Ibm Cloud Services Agreement

Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two-factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and is logged. All transfer of data into into, or out of of, the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM data centers that support this Cloud Servicecenters. Access control logs are audited regularly. Termination and employment change procedures are in place and include return of assets and access right removal.

Appears in 1 contract

Samples: Ibm Cloud Services Agreement

Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM IOC data centers that support this Cloud Servicecenters. Access control logs are audited regularly. Termination and employment change procedures are in place and include return of assets and access right removal.

Appears in 1 contract

Samples: Ibm Cloud Services Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.