System Access Controls Sample Clauses

System Access Controls. Data Processor shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
AutoNDA by SimpleDocs
System Access Controls. Zendesk takes reasonable measures to prevent Service Data from being used without authorisation.
System Access Controls. Our Sub-processors will take reasonable measures to prevent Service Data from being used without authorisation. These controls shall vary based on the nature of the processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorisation processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Aircall shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factors authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Q4, as a Data Processor, shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.
System Access Controls. Third-party service providers shall take reasonable measures to prevent data processing systems from being used without authorization. These controls shall vary based on the nature of processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.
System Access Controls the data importer shall take reasonable measures to prevent personal data from being used without authorization. These controls shall vary based on the nature of the processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
AutoNDA by SimpleDocs
System Access Controls. In order to access personal data, a documented, role-based authorisation concept must be in place that restricts access to the data so that only authorised persons can access the personal data necessary for their task (minimum principle). The password regulations from access control must also be implemented as part of access control. Administrative activities must be restricted to a small group of administrators. The activities of the administrators must be monitored and logged within the framework of technically justifiable expenditure.
System Access Controls. Couchbase shall take reasonable measures to prevent unauthorized use of the systems used for processing Customer Data. These controls shall vary based on the nature of the processing undertaken and may include, among other controls, strong authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Orca Security shall take reasonable measures to prevent unauthorized use of Personal Data. These controls may include, among other controls, authentication via passwords and two-factor authentication, documented authorization processes, documented change management processes, logging of access on several levels, system audit or event logging, and related monitoring procedures to proactively record user access and system activity for routine review.
Time is Money Join Law Insider Premium to draft better contracts faster.