Access Control and Identity Management Policies. Prior to access to Dell Data, (a) all data and system access rights are assigned to individuals according to their documented responsibilities and the principle of least privilege; (b) all user and administrator accounts are assigned to individuals and required to have strong passwords, password rotation, failed authentication locks and session timeouts; and (c) issuance of privileged access accounts require management approval and are held to strict security standards.
Appears in 4 contracts
Samples: Data Protection Agreement, Data Protection Agreement, Data Protection Agreement