Authorization Control Sample Clauses

Authorization Control. Employees’ access to Personal Data shall be controlled by a technical system for authorization control. Employees shall be granted the lowest possible level of access when processing Personal Data. Only employees who require access to Personal Data for their work shall be granted access.
AutoNDA by SimpleDocs
Authorization Control. Security must allow access to authorized users only – to only those resources, files, applications, and services that they are authorized to use. Security will be definable by an administrator both on an individual user basis and by class of user (teachers, students, parents, administrators, etc.). Identification of a user must be unique to each individual. Operating systems and the application software must have the ability to be restricted or locked down in an appropriate way that prevents inadvertent or deliberate changes in key settings and, thereby, reduces support requirements.
Authorization Control. Entco will grant access authorizations on a "need-to-know" and "need-to-do" basis (lowest possible rights). Examples include access authorizations for task-related authorization schemes, user profiles, and functional roles. An access authorization will be sought on the basis of the role scheme and approved by the relevant supervisor. Additional control instances will be integrated into the approval process. For technical access security, Entco will use recognized security systems such as RACF, Active Directory, etc. Existing user accounts will be checked periodically and deleted or changed in the event that a user's tasks change. The responsibility for user accounts must be clearly assigned; representations are defined allowed in the current policies.
Authorization Control. Measures that ensure that those authorized to use a data processing system can only access the data subject to their access authorization and that personal data cannot be read, copied, modified or removed without authorization during processing, use and after storage. All data provided by the service recipient and all data collected as part of the survey will be treated confidentially. This is ensured by an authorization concept: The number of administrators and access rights is reduced to a minimum. Access authorizations for employees are limited to those persons involved in software development or administration and are immediately blocked or deleted by the system administrators if necessary (e.g., at the end of an employee's contract). Database accesses such as the entry, modification or deletion of entries are logged. The deletion of data carriers is done for root servers by multiple overwriting and the subsequent decommissioning of the server. If there are any other documents or data carriers that need to be destroyed, they will be transported in sealed containers to a carefully selected, certified disposal company with a written commitment to data protection, where they will be disposed of in accordance with data protection regulations.
Authorization Control. Implement a mechanism for controlling the authorization of individuals, organizations, and roles to access applications, data, and software. Assure supervision of personnel performing technical systems maintenance activities by authorized, knowledgeable persons. Work to train Users, including technical maintenance personnel, in system security.
Authorization Control. Measures to ensure that those authorized to use a Quantum data processing system can only access the data appropriate to their access authorization and that Restricted data cannot be read, copied, modified, or removed without authorization during processing, use and after storage. Technical MeasuresHard Drive wipe/file shredder  External destruction of disposal media  Physical deletion of data carriers  Logging of access to applications, specifically when entering, changing, and deleting data  SSH encrypted access  Certified SSL encryption
Authorization Control. Implement a mechanism for controlling the authorization of individuals, organizations, and roles to access applications, data, and software. Integrate with Ordering Activity's existing identity management solution where one exists to enable single sign-on and centralized identity management. Assure supervision of personnel performing technical systems maintenance activities by authorized, knowledgeable persons. Ensure that system users, including technical maintenance personnel are trained in system security.
AutoNDA by SimpleDocs
Authorization Control. The aim of access control is to ensure that only those authorized to use a data processing system can access exclusively the pD subject to their task-related access authorization and that pD cannot be read, copied, modified or removed without authorization during processing, use and after storage. The implementation of the following measures supports this requirement. ☒ All employees who handle pD are separately bound to secrecy (e.g. by contract, declaration of commitment) or by law. ☒ Implementing a sufficiently differentiated role and authorization model ☒ Use of user IDs. ☒ Identification and authentication of users. ☒ Automatic verification of authorizations. ☒ Logging of access to specific files. ☒ Use of encryption methods. ☒ Separation of test and production operations.
Authorization Control. Honeywell Homes´s service provider will grant access authorizations on a "need-to- know" and "need-to-do" basis (lowest possible rights). Examples include access authorizations for task-related authorization schemes, user profiles, and functional roles. An access authorization will be sought on the basis of the role scheme and approved by the relevant supervisor. Additional control instances will be integrated into the approval process. For technical access security, the service provider will use recognized security systems such as RACF, Active Directory, etc. Existing user accounts will be checked periodically and deleted or changed in the event that a user's tasks change. The responsibility for user accounts must be clearly assigned; representations are defined allowed in the current policies.
Authorization Control. The Contractor will grant access authorizations on a "need-to-know" and "need-to- do" basis (lowest possible rights). Examples include access authorizations for task-related authorization schemes, user profiles, and functional roles. An access authorization will be sought on the basis of the role scheme and approved by the relevant supervisor. Additional control instances will be integrated into the approval process. For technical access security, the Contractor will use recognized security systems such as RACF, Active Directory, etc. Existing user accounts will be checked periodically and deleted or changed in the event that a user's tasks change. The responsibility for user accounts must be clearly assigned; representations are defined allowed in the current policies.
Time is Money Join Law Insider Premium to draft better contracts faster.