Access Control Sample Clauses

Access Control. Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
AutoNDA by SimpleDocs
Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Access Control. Landlord shall be the sole determinant of the type and amount of any access control or courtesy guard services to be provided to the Project, if any. IN ALL EVENTS, LANDLORD SHALL NOT BE LIABLE TO TENANT, AND TENANT HEREBY WAIVES ANY CLAIM AGAINST LANDLORD, FOR (I) ANY UNAUTHORIZED OR CRIMINAL ENTRY OF THIRD PARTIES INTO THE PREMISES, THE BUILDING OR THE PROJECT, (II) ANY DAMAGE TO PERSONS, OR (III) ANY LOSS OF PROPERTY IN AND ABOUT THE PREMISES, THE BUILDING OR THE PROJECT, BY OR FROM ANY UNAUTHORIZED OR CRIMINAL ACTS OF THIRD PARTIES, REGARDLESS OF ANY ACTION, INACTION, FAILURE, BREAKDOWN, MALFUNCTION AND/OR INSUFFICIENCY OF THE ACCESS CONTROL OR COURTESY GUARD SERVICES PROVIDED BY LANDLORD, IF ANY. Tenant shall provide such supplemental security services and shall install within the Premises such supplemental security equipment, systems and procedures as may reasonably be required for the protection of its employees and invitees, provided that Tenant shall coordinate such services and equipment with any security provided by Landlord. The determination of the extent to which such supplemental security equipment, systems and procedures are reasonably required shall be made in the sole judgment, and shall be the sole responsibility, of Tenant. Tenant acknowledges that it has neither received nor relied upon any representation or warranty made by or on behalf of Landlord with respect to the safety or security of the Premises or the Project or any part thereof or the extent or effectiveness of any security measures or procedures now or hereafter provided by Landlord, and further acknowledges that Tenant has made its own independent determinations with respect to all such matters.
Access Control. The City will maintain the control of access rights and prohibit the construction or use of any entrances or access points along the Project within the City other than those shown on the final Design Plans, unless prior approval is obtained from the Secretary.
Access Control. 9.17.10.1 Subrecipient shall implement formal procedures to control access to its systems, services and data, including, but not limited to, user account management procedures and other controls as outlined in this Subparagraph 9.17. Subrecipient shall ensure that network access to both internal and external networked services shall be controlled through the use of properly configured firewalls, etc. Operating systems will be used to enforce access controls to computer resources including, but not limited to, authentication, authorization and event logging. Applications will include access control to limit user access to information and application system functions. All systems will be monitored to detect deviation from access control policies and identify suspicious activity. Subrecipient shall record, review and act upon all events in accordance with incident response policies set forth herein. 9.17.10.2 Subrecipient shall develop, implement and enforce/maintain a password policy which requires users who are authorized to access confidential County Information Assets on electronic media to: create a strong complex password containing at least eight (8) characters, which shall include upper and lower case letters, digits and symbols; and, change his/her password at a minimum every ninety (90) days, etc. 9.17.10.3 Subrecipient shall develop, implement and enforce/maintain a password policy which provides for the following system requirements: when user changes his/her password, the system shall restrict user from re-using any of the last six (6) passwords; the system will lock itself after a minimum of three
Access Control. Genesys will implement appropriate access controls to ensure only authorized users have access to Customer Data within the Genesys PureConnect Cloud Service environment.
Access Control. 10.1 Authentication and authorization controls must be appropriately robust for the risk of the system, data, application, and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.
AutoNDA by SimpleDocs
Access Control. In addition to maintenance of MEAL cards, the Manufacturing and Central Computers and Player Terminals shall record and generate a report on any access including date, time of access, person (by employee number) accessing the computer, and the reason for access.
Access Control. The access of authorized persons is limited to the personal data required for the fulfillment of their tasks. Facilities for data transfer are checked and it is determined, to whom personal data was transferred or provided or to whom personal data can be transferred and provided. Data recipients, to whom personal data is enclosed via facilities for data transfer (e.g. via remote access) can be identified.
Access Control. Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!