MEASURES TO ENSURE CONFIDENTIALITY Sample Clauses

MEASURES TO ENSURE CONFIDENTIALITY. 1.1 Physical access (Access to premises must be protected) ☒ Use of authorization passes. ☒ Use of electronic access code cards/access transponders. ☒ Existence of an access authorization concept. ☒ Use of video surveillance to control physical access. ☒ Use of an alarm system. ☒ Fence around the data center. ☒ Any access to the data center is time-logged and evaluated. ☒ There is a rule/concept about keys. ☒ Use of visitor ID cards. ☒ Visitors escorted by company employees or security personnel. ☒ Security also outside working hours by (24/7) plant security. ☒ Special glass for sensitive areas or to shield against third-party inspection. ☒ Separately protected physical access to server environments and the data center.
AutoNDA by SimpleDocs
MEASURES TO ENSURE CONFIDENTIALITY. Physical access control Measures to prevent unauthorized persons from gaining access to data processing equipment used to process personal data and identification of authorized persons. Description of controls in place / measures taken: - Proxy-card readers and, where applicable, biometric readers are utilized to control entry points to ASG offices and restricted areas. Employees and contractors (e.g. cleaners) are issued with ID cards according to their job/role profile. - CCTV, 24hrs alarms, security personnel are used at our various sites as applicable. - An established physical security policy that is documented and regularly reviewed based on business and information security requirements. - Access to the premises is controlled through facility and office management. - Access points such as delivery and loading areas, and other points where unauthorized persons could enter the premises, are controlled and, if possible, isolated from information processing facilities to avoid unauthorized access. - Securing of buildings and floor accesses via electric door openers. - Access control via ID cards. - Documented key allocation. - Secure areas are protected by additional appropriate access controls. - Visitor and supplier access regulations are in place. • General Access Control and Authentication An established access control policy that is documented and regularly reviewed based on business and information security requirements. Description of controls in place / measures taken: - Key management is controlled through a formal management process. - Access to systems and applications is controlled by a secure log-on procedure. - Technical measures (password protection/MFA) and organizational measures (user master data set) for user identification and authentication: - Password management systems require strong passwords and periodic resets. Password lengths are set to 12 characters for end users and 14 characters for privilege accounts. Logs are captured for end user and privilege account activities. - Regular account reviews (every 6 months) and documented account approval procedures - An established policy regarding teleworking and mobile device usage that is documented and regularly reviewed based on business and information security requirements. - An established clean desk policy that is documented and regularly reviewed based on business and information security requirements. • Network Security - Users are only provided with access to the network and ...
MEASURES TO ENSURE CONFIDENTIALITY. 1. Physical access control Measures that physically deny unauthorized persons access to IT systems and data processing equipment used to process personal data, as well as to confidential files and data storage media. Description of physical access control: Processor’s office is protected by an electronic door lock system. Tokens to open doors are assigned to individual employees on an as needed basis and can be centrally revoked on demand at any time without access to the token. Lock access is centrally logged. Processor’s data center providing sub-processors protects Processor’s servers against any physical access besides sub-processors maintenance staff employing industry standard data center protection techniques.
MEASURES TO ENSURE CONFIDENTIALITY. 1.1. Access control Measures that physically deny unauthorised persons access to IT systems and data processing equipment used to process personal data, as well as confidential files and data carriers. Description of the access control system: · Access to hosting systems is accordingly guaranteed by the high AWS security standards across various types. · Access to appointman's business premises is only granted to persons in direct company of an appointman employee. · The business premises can only be unlocked by the managing director - no further keys can be assigned.
MEASURES TO ENSURE CONFIDENTIALITY. 2.1 Organisational controls

Related to MEASURES TO ENSURE CONFIDENTIALITY

  • INFORMATION AND CONFIDENTIALITY 20.1 Each party recognises that under this Agreement it may receive Confidential Information belonging to the other.

  • Duty to Maintain Confidentiality Each Party agrees not to disclose Confidential Business Information to any other person (other than its Affiliates, accountants, auditors, counsel, consultants, lenders, prospective lenders, employees, officers and directors), without the prior written consent of the other Party, provided that: (a) either Party may disclose Confidential Business Information, if and to the extent such disclosure is required (i) by Requirements of Law, (ii) in order for PacifiCorp to receive regulatory recovery of expenses related to this Agreement, (iii) pursuant to an order of a court or regulatory agency, or (iv) in order to enforce this Agreement or to seek approval hereof, and (b) notwithstanding any other provision hereof, PacifiCorp may in its sole discretion disclose or otherwise use for any purpose in its sole discretion the Confidential Business Information described in Sections 23.1(b) or 23.1(c). In the event a Party is required by Requirements of Law to disclose Confidential Business Information, such Party shall to the extent possible promptly notify the other Party of the obligation to disclose such information.

  • Data Confidentiality All data, regardless of form, including originals, images and reproductions, prepared by, obtained by or transmitted to the Professional in connection with this Agreement is confidential, proprietary information owned by NBU. Except as specifically provided in this Agreement, the Professional shall not intentionally disclose data generated in the performance of the Services to any third party without the prior, written consent of NBU.

  • Listing Information Confidentiality BellSouth will accord <<customer_name>>’s directory listing information the same level of confidentiality that BellSouth accords its own directory listing information, and BellSouth shall limit access to <<customer_name>>’s customer proprietary confidential directory information to those BellSouth employees or agents who are involved in the preparation of listings or directories.

  • Announcements and confidentiality The Team will not make or permit to be made any public announcement(s) in relation to this Agreement without the prior consent of the Company nor (save as required by law) disclose to any third party any information concerning the terms or subject matter of this Agreement from the date hereof.

  • Data Protection and Confidentiality 3.1. We obtain, use, process and disclose personal data about you and data subjects (as defined in the DPA) in order that we may provide the Services and for other related purposes including updating and enhancing client records, analysis for management purposes and statutory returns, crime prevention and legal and regulatory compliance.

Time is Money Join Law Insider Premium to draft better contracts faster.