Access Policy Sample Clauses

Access Policy. An access control policy is established, documented, and reviewed based on business and information security requirements.
AutoNDA by SimpleDocs
Access Policy. Cisco shall determine appropriate access control rules, rights, and restrictions for each specific user’s roles towards their assets. Cisco shall maintain a record of security privileges of its personnel that have access to Protected Data, networks, and network services. Cisco shall restrict and tightly control the use of utility programs that might be capable of over- riding system and application controls.
Access Policy. CiteRight enforces an access control policy (physical, technical and administrative) based on least privileges principles.
Access Policy iManage enforces an access control policy (physical, technical, and administrative) based on least privileges principles.
Access Policy. Acuity maintains a record of security privileges of individuals having access to Customer Data.
Access Policy. Microsoft maintains a record of security privileges of individuals having access to Customer Data.
Access Policy. Supplier shall determine appropriate access control rules, rights, and re- strictions for each specific user’s roles towards their assets. Supplier shall maintain a record of security privileges of its personnel that have access to Protected Data, networks, and net- work services.
AutoNDA by SimpleDocs
Access Policy. A. Prior to providing access to the Datacenter, it is required that everyone that will enter the space read, fully understand and sign the DLR 11101 -
Access Policy. DoubleClick will restrict access to DoubleClick’s DART Web Ad Serving Log Files in the following manner:
Access Policy. Microsoft maintains a record of security privileges of individuals having access to Customer Data or Professional Services Data. Access Authorization • Microsoft maintains and updates a record of personnel authorized to access Microsoft systems that contain Customer Data or Professional Services Data. • Microsoft deactivates authentication credentials that have not been used for a period of time not to exceed six months. • Microsoft identifies those personnel who may grant, alter or cancel authorized access to data and resources. • Microsoft ensures that where more than one individual has access to systems containing Customer Data or Professional Services Data, the individuals have separate identifiers/log-ins. Least PrivilegeTechnical support personnel are only permitted to have access to Customer Data and Professional Services Data when needed. • Microsoft restricts access to Customer Data and Professional Services Data to only those individuals who require such access to perform their job function.
Time is Money Join Law Insider Premium to draft better contracts faster.