Common use of System Access Control Clause in Contracts

System Access Control. The following may, among other controls, be applied depending upon the particular Cloud Services ordered: authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and logging of access on several levels. For Cloud Services hosted @Oracle: (i) log-ins to Cloud Services Environments by Oracle employees and Subprocessors are logged; (ii) logical access to the data centers is restricted and protected by firewall/VLAN; and (iii) intrusion detection systems, centralized logging and alerting, and firewalls are used.

Appears in 3 contracts

Samples: www.oracle.com, www.oracle.com, www.oracle.com

AutoNDA by SimpleDocs

System Access Control. The following may, among other controls, be applied depending upon the particular Cloud Services ordered: authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and logging of access on several levels. For Cloud Services hosted @Oracle@Selerant: (i) log-ins to Cloud Services Environments by Oracle Selerant employees and Subprocessors are logged; (ii) logical access to the data centers is restricted and protected by firewall/VLAN; and (iii) intrusion detection systems, centralized logging and alerting, and firewalls are used.

Appears in 1 contract

Samples: Cloud Services Agreement

System Access Control. The following may, among other controls, be applied depending upon the particular Cloud Services ordered: authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and logging of access on several levels. For Cloud Services hosted @Oracleat RAPID: (i) log-ins to Cloud Services Environments by Oracle RAPID employees and Third Party Subprocessors are logged; (ii) logical access to the data centers is restricted and protected by firewall/VLAN; and (iii) intrusion detection systems, centralized logging and alerting, and firewalls are used.

Appears in 1 contract

Samples: Processing Agreement

System Access Control. The following may, among other controls, be applied depending upon the particular Cloud Services ordered: authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and logging of access on several levels. For Cloud Services hosted @Oracleat Oracle: (i) log-ins to Cloud Services Environments by Oracle employees and Third Party Subprocessors are logged; (ii) logical access to the data centers is restricted and protected by firewall/VLAN; and (iii) intrusion detection systems, centralized logging and alerting, and firewalls are used.

Appears in 1 contract

Samples: www.oracle.com

AutoNDA by SimpleDocs

System Access Control. The following may, among other controls, be applied depending upon the particular Cloud Services ordered: authentication via passwords and/or two-factor authenticationpasswords, documented authorization processes, documented change management processes, and logging of access on several levels. For Cloud Services hosted @Oracle@Governor: (i) log-ins to Cloud Services Environments by Oracle Governor employees and Subprocessors are logged; (ii) logical access to the data centers is restricted and protected by firewall/VLAN; and (iii) intrusion detection systems, centralized logging and alerting, and firewalls alerting are used.

Appears in 1 contract

Samples: files.governor.io

Time is Money Join Law Insider Premium to draft better contracts faster.