Common use of Access Control to Data Processing Systems Clause in Contracts

Access Control to Data Processing Systems. Data Importer implements suitable measures to prevent the data processing systems used for the processing of Personal Data from being used or logically accessed by unauthorized persons, in particular: o User identification and user authentication methods are in place to grant controlled access to the processing system. o Access control and authorizations are defined according to a ‘need to have’ principle. o Data Importer’s internal endpoints used to support the software service are protected to prevent unwanted access to the systems and to avoid infiltration of malicious software. This covers technologies as firewalls, antivirus detection, malware detection, intrusion detection and prevention and others. These technologies will be adjusted to new levels based on the overall development in these areas.

Appears in 22 contracts

Samples: Software and Services Subscription Agreement, Fleet Management Framework Agreement, Fleet Management Framework Agreement

AutoNDA by SimpleDocs

Access Control to Data Processing Systems. Data Importer Service Provider implements suitable measures to prevent the data processing systems used for the processing of Personal Data from being used or logically accessed by unauthorized persons, in particular: o User identification and user authentication methods are in place to grant controlled access to the processing system. o Access control and authorizations are defined according to a ‘need to have’ principle. o Data ImporterService Provider’s internal endpoints used to support the software service are protected to prevent unwanted access to the systems and to avoid infiltration of malicious software. This covers technologies as firewalls, antivirus detection, malware detection, intrusion detection and prevention and others. These technologies will be adjusted to new levels based on the overall development in these areas.

Appears in 1 contract

Samples: Services Agreement

Access Control to Data Processing Systems. Data Importer implements suitable measures to prevent the data processing systems used for the processing of Personal Data from fr om being used or logically accessed by unauthorized persons, in particular: o User identification and user authentication methods are in place to grant controlled access to the processing system. o Access control and authorizations are defined according to a ‘need to have’ principle. o Data Importer’s internal endpoints used to support the software service are protected to prevent unwanted access to the systems and to avoid infiltration of malicious software. This covers technologies as firewalls, antivirus detection, malware detection, intrusion detection and prevention and others. These technologies will be adjusted to new levels based on the overall development in these areas.

Appears in 1 contract

Samples: Software and Services Subscription Agreement

Access Control to Data Processing Systems. Data Importer implements suitable measures to prevent the data processing systems used for the processing of Personal Data from being used or logically accessed by unauthorized persons, in particular: o User identification and user authentication methods are in place to grant controlled access to the processing system. o Access control and authorizations are defined according to a ‘need to have’ principle. o Data Importer’s internal endpoints used to support the software service are protected to prevent unwanted access to the systems and to avoid infiltration of malicious software. This covers technologies as firewalls, antivirus detection, malware detection, intrusion detection and prevention and others. These technologies will be adjusted to new levels based on the overall development in these areas.

Appears in 1 contract

Samples: Fleet Management Framework Agreement

AutoNDA by SimpleDocs

Access Control to Data Processing Systems. Data Importer Addressee implements suitable measures to prevent the data processing systems used for the processing of Personal Data from being used or logically accessed by unauthorized persons, in particular: o User identification and user authentication methods are in place to grant controlled access to the processing system. o Access control and authorizations are defined according to a ‘need to have’ principle. o Data Importerx Addressee’s internal endpoints used to support the software service are protected to prevent unwanted access to the systems and to avoid infiltration of malicious software. This covers technologies as firewalls, antivirus detection, malware detection, intrusion detection and prevention and others. These technologies will be adjusted to new levels based on the overall development in these areas.

Appears in 1 contract

Samples: Fleet Management Framework Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!