Access Control to Personal Data Processing Systems Sample Clauses

Access Control to Personal Data Processing Systems. Xxxxxx.xxx has implemented suitable measures to prevent its Personal Data Processing systems from being used by unauthorized persons. This is accomplished by: ● Establishing the identification of the terminal and/or the terminal user to the Xxxxxx.xxx systems; ● Automatic time-out of user terminal if left idle. Identification and password required to reopen; ● Utilizing firewall, router and VPN-based access controls to protect the private service networks and back-end-servers; ● Ad hoc monitoring infrastructure security; ● Regularly examining security risks by internal employees; ● Issuing and safeguarding of identification codes; ● Role-based access control implemented in a manner consistent with principle of least privilege; ● Access to host servers, applications, databases, routers, switches, etc., is logged; ● Making use of commercial and custom tools to collect and examine its Platform and system logs for anomalies.
AutoNDA by SimpleDocs
Access Control to Personal Data Processing Systems. (Logical) UNIZEN has implemented suitable measures to prevent its Personal Data Processing systems from being used by unauthorized persons. This is accomplished by: ● Establishing the identification of the terminal and/or the terminal user to the UNIZEN systems; ● Automatic time-out of user terminal if left idle. Identification and password required to reopen; ● Automatic lock out of the user ID when several erroneous passwords are entered. Events are logged and logs are reviewed on a regular basis; ● Utilizing firewall, router and VPN-based access controls to protect the private service networks and back-end-servers; ● Ad hoc monitoring infrastructure security; ● Regularly examining security risks by internal employees and third party auditors; ● Issuing and safeguarding of identification codes; ● Role-based access control implemented in a manner consistent with principle of least privilege; ● Access to host servers, applications, databases, routers, switches, etc., is logged; ● Making use of commercial and custom tools to collect and examine its Application and system logs for anomalies.

Related to Access Control to Personal Data Processing Systems

  • Processing Personal Data 40.1. The Company is the data controller in the relevant jurisdiction. You hereby acknowledge and agree to the collection and processing of personal data provided by you in connection with the opening of a trading account for the purpose of performing our obligations under these Terms and Conditions and for administering the relationship between you and us.

  • Processing of Customer Personal Data 3.1 UKG will:

  • Personal Data Processing 2.1 The Processor shall process Personal Data only on the basis of corresponding recorded orders from the Controller.

  • Processing of Company Personal Data 2.1 Processor shall:

  • Customer’s Processing of Personal Data Customer shall, in its use of the Services, Process Personal Data in accordance with the requirements of Data Protection Laws and Regulations. For the avoidance of doubt, Customer’s instructions for the Processing of Personal Data shall comply with Data Protection Laws and Regulations. Customer shall have sole responsibility for the means by which Customer acquired Personal Data.

  • Employee Access to Personnel File An employee shall have the right to read and review his/her personnel file on reasonable notice and by written request to the Human Resources Manager. An employee may request and shall receive a copy of any record or document contained in the employee’s personnel file.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • DEPENDENT PERSONAL SERVICES 1. Subject to the provisions of Articles 16, 18 and 19, salaries, wages and other similar remuneration derived by a resident of a Contracting State in respect of an employment shall be taxable only in that State unless the employment is exercised in the other Contracting State. If the employment is so exercised, such remuneration as is derived therefrom may be taxed in that other State.

  • Access to Personal File Upon written request from an employee, he or she and/or his or her Union representative shall have access to his or her official personal file in the presence of an authorized representative of the Corporation. The file should be made available within twenty-four (24) hours following the day of the written request, providing such file is available locally and, in all cases, within five (5) calendar days after the request. Where an employee's file is available for review and/or examination, reports as described in paragraph 10.02(c) are to be removed prior to such review and/or examination.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Time is Money Join Law Insider Premium to draft better contracts faster.