Common use of Access Control to Data Processing Systems Clause in Contracts

Access Control to Data Processing Systems. Data Importer implements suitable measures to prevent the data processing systems used for the processing of Personal Data from being used or logically accessed by unauthorized persons, in particular: o User identification and user authentication methods are in place to grant controlled access to the processing system. o Access control and authorizations are defined according to a ‘need to have’ principle. o Data Importer’s internal endpoints used to support the software service are protected to prevent unwanted access to the systems and to avoid infiltration of malicious software. This covers technologies as firewalls, antivirus detection, malware detection, intrusion detection and prevention and others. These technologies will be adjusted to new levels based on the overall development in these areas.

Appears in 18 contracts

Samples: Fleet      Management       Framework       Agreement, Software and Services Subscription Agreement, And Services Subscription Agreement

AutoNDA by SimpleDocs

Access Control to Data Processing Systems. Data Importer Addressee implements suitable measures to prevent the data processing systems used for the processing of Personal Data from being used or logically accessed by unauthorized persons, in particular: o User identification and user authentication methods are in place to grant controlled access to the processing system. o Access control and authorizations are defined according to a ‘need to have’ principle. o Data Importerx Addressee’s internal endpoints used to support the software service are protected to prevent unwanted access to the systems and to avoid infiltration of malicious software. This covers technologies as firewalls, antivirus detection, malware detection, intrusion detection and prevention and others. These technologies will be adjusted to new levels based on the overall development in these areas.

Appears in 1 contract

Samples: Data Processing Agreement

Access Control to Data Processing Systems. Data Importer Service Provider implements suitable measures to prevent the data processing systems used for the processing of Personal Data from being used or logically accessed by unauthorized persons, in particular: o User identification and user authentication methods are in place to grant controlled access to the processing system. o Access control and authorizations are defined according to a ‘need to have’ principle. o Data ImporterService Provider’s internal endpoints used to support the software service are protected to prevent unwanted access to the systems and to avoid infiltration of malicious software. This covers technologies as firewalls, antivirus detection, malware detection, intrusion detection and prevention and others. These technologies will be adjusted to new levels based on the overall development in these areas.

Appears in 1 contract

Samples: www.fieldwire.com

Access Control to Data Processing Systems. Data Importer implements suitable measures to prevent the data processing systems used for the processing of Personal Data from being used or logically accessed by unauthorized persons, in particular: o User identification and user authentication methods are in place to grant controlled access to the processing system. o Access control and authorizations are defined according to a ‘need to have’ principle. o Data Importer’s internal endpoints used to support the software service are protected to prevent unwanted access to the systems and to avoid infiltration of malicious software. This covers technologies as firewalls, antivirus detection, malware detection, intrusion detection and prevention and others. These technologies will be adjusted to new levels based on the overall development in these areas.

Appears in 1 contract

Samples: Fleet Management Framework Agreement

AutoNDA by SimpleDocs

Access Control to Data Processing Systems. Data Importer implements suitable measures to prevent the data processing systems used for the processing of Personal Data from fr om being used or logically accessed by unauthorized persons, in particular: o User identification and user authentication methods are in place to grant controlled access to the processing system. o Access control and authorizations are defined according to a ‘need to have’ principle. o Data Importer’s internal endpoints used to support the software service are protected to prevent unwanted access to the systems and to avoid infiltration of malicious software. This covers technologies as firewalls, antivirus detection, malware detection, intrusion detection and prevention and others. These technologies will be adjusted to new levels based on the overall development in these areas.

Appears in 1 contract

Samples: Software and Services Subscription Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.