Logical Access Controls Sample Clauses

Logical Access Controls. Trane employs internal monitoring and logging technology to help detect and prevent unauthorized access attempts to Trane’s corporate networks and production systems. Trane’s monitoring includes a review of changes affecting systems’ handling authentication, authorization, and auditing, and privileged access to Trane production systems. Trane uses the principle of “least privilege” (meaning access denied unless specifically granted) for access to customer data.
AutoNDA by SimpleDocs
Logical Access Controls. Tanium employs the principles of least privilege and need-to-know to control access to Confidential Information and Customer Data. User access privileges are restricted based on business need and job responsibilities, allowing only the minimum necessary access for users to accomplish their job function. User access is revoked upon termination of employment or termination of relevant job duties, and owners of critical applications or systems are required to perform periodic privileged access reviews to ensure access is still required to perform current job duties. In addition, Tanium protects against unauthorized access by ensuring unique user IDs and passwords are in use. Tanium appropriately manages passwords, including enforcing password complexity by (a) requiring a password length of no less than 8 characters, (b) utilizing expiring first-time log-in temporary passwords,
Logical Access Controls. Data Importer shall employ effective logical access control measures over all systems used to access, create, transmit, or process personal data, including but not limited to:
Logical Access Controls. 3.1 Authentication and authorization controls are appropriately robust for the specific levels of risk to the applicable information, data, application, and platform.
Logical Access Controls. Access to Mosaic Data by the Supplier and Supplier Parties in support of the services provided to Mosaic by the Supplier shall remain restricted on a “Need to Know” basis. When required, access will be granted based on the Least Privilege necessary to perform required business function on behalf of or in support of services provided by the Supplier. At no time shall Mosaic Data be accessible by or available to any third party except where explicit written consent is provided to the Supplier by Xxxxxx. The Supplier shall maintain logical access controls no less than industry standard for the nature of the services provided by the Supplier and appropriate for the legal requirements for the protection of Mosaic Data hosted, maintained, processed or otherwise accessed by the Supplier and Supplier Parties.
Logical Access Controls. Splunk employs monitoring and logging technology to help detect and prevent unauthorized access attempts to its networks and production systems. Splunk’s monitoring includes a review of changes affecting systems’ handling authentication, authorization, and auditing; and privileged access to Splunk production systems. Splunk uses the principle of “least privilege” (meaning access denied unless specifically granted) for access to customer data.
Logical Access Controls. All Nuance systems and personal computers are subject to access controls including at least username and password that must meet password complexity requirements and automatic logoff requirements. Data Access Controls: Access to Nuance systems storing Personal Data is granted on a need-to- know basis and is subject to administrator approval. Data at rest is protected either by encryption or compensating security controls, which include segmented networks, tiered architecture, firewalls with intrusion protection and anti-malware protections, and limiting of port access.
AutoNDA by SimpleDocs
Logical Access Controls a. IBM will:
Logical Access Controls. 11.1 Access to Moorepay systems used in the provision of the Services will be granted and revoked in accordance with Logical Access Management Policy, as defined in the Moorepay Security Policy Handbook.
Logical Access Controls. Protecting access to IT systems and applications is critical to maintain the integrity of Xxxx technology and data and prevent unauthorised access to such resources. Access to Xxxx IT infrastructure is restricted to only authorized users or processes, based on the principle of strict need to know and least privilege. Xxxx employs monitoring and logging technology to help detect and prevent unauthorized access attempts to its networks and production systems. All internal Xxxx systems require the use of MFA for staff to access. Access to Xxxx SaaS software offerings, is protected by authentication and authorisation mechanisms. XXXX and Two factor authentication. User authentication is required to gain access to all software offerings. Individuals are assigned a unique user account which is role based and requires a licence to login to the application. Individual user accounts shall not be shared. Access privileges are based on job requirements using the principle of least privilege access. Threat and Vulnerability Management Xxxx utilises a number of network monitoring tools to ensure integrity and performance on our network. These include tools for security event monitoring, network data monitoring, asset vulnerability scanning and misconfiguration detection. Malware Protection Xxxx uses industry standard endpoint security tools to protect our assets. This cloud managed system ensures our assets can always be contacted regardless of which network they are on and includes endpoint detection and response (EDR) capabilities, vulnerability and patch management, and isolated sandboxing to carry out enhanced analysis of potential malicious processes. This EDR system gives the security team a clear view of all interactions carried out by a user or system giving enhanced visibility across the estate. External Devices Xxxx operates a ban on external devices such as USB keys for the transfer of information.
Time is Money Join Law Insider Premium to draft better contracts faster.