Access Control to Personal Data Processing Systems (Logical Sample Clauses

Access Control to Personal Data Processing Systems (Logical. XXXXxx.xxx has implemented suitable measures to prevent its Personal Data Processing systems from being used by unauthorized persons. This is accomplished by: ● Establishing the identification of the terminal and/or the terminal user to the XXXXxx.xxx systems; ● Automatic time-out of user terminal if left idle. Identification and password required to reopen; ● Automatic lock out of the user ID when several erroneous passwords are entered. Events are logged and logs are reviewed on a regular basis; ● Utilizing firewall, router and VPN-based access controls to protect the private service networks and back-end-servers; ● Ad hoc monitoring infrastructure security; ● Regularly examining security risks by internal employees and third party auditors; ● Issuing and safeguarding of identification codes; ● Role-based access control implemented in a manner consistent with principle of least privilege; ● Access to host servers, applications, databases, routers, switches, etc., is logged; ● Making use of commercial and custom tools to collect and examine its Platform and system logs for anomalies.
AutoNDA by SimpleDocs
Access Control to Personal Data Processing Systems (Logical. Commuty has implemented suitable measures to prevent its Personal Data Processing systems from being used by unauthorized persons. This is accomplished by: • Establishing the identification of the terminal and/or the terminal user to the Commuty systems; • Automatic time-out of user terminal if left idle. Identification and password required to reopen; • Automatic lock out of the user ID when several erroneous passwords are entered. Events are logged and logs are reviewed on a regular basis; • Utilizing firewall, router and VPN-based access controls to protect the private service networks and back-end-servers; • Ad hoc monitoring infrastructure security; • Regularly examining security risks by internal employees and third party auditors; • Issuing and safeguarding of identification codes; • Role-based access control implemented in a manner consistent with principle of least privilege; • Access to authorized functionnalities is logged; • Making use of commercial and custom tools to collect and examine its Platform and system logs for anomalies. • Use of encrypted hardware for every employee of Commuty.
Access Control to Personal Data Processing Systems (Logical. Teamleader has implemented suitable measures to prevent its Personal Data Processing systems from being used by unauthorized persons. This is accomplished by: o Establishing the identification of the terminal and/or the terminal user to the Teamleader systems; o Automatic time-out of user terminal if left idle. Identification and password required to reopen; o Automatic lock out of the user ID when several erroneous passwords are entered. Events are logged and logs are reviewed on a regular basis; o Utilizing firewall, router and VPN-based access controls to protect the private service networks and back-end-servers; o Ad hoc monitoring infrastructure security; o Regularly examining security risks by internal employees and third party auditors; o Issuing and safeguarding of identification codes; o Role-based access control implemented in a manner consistent with principle of least privilege; o Access to host servers, applications, databases, routers, switches, etc., is logged; o Making use of commercial and custom tools to collect and examine its Platform and system logs for anomalies.

Related to Access Control to Personal Data Processing Systems (Logical

  • Processing of Customer Personal Data 3.1 UKG will:

  • Processing Personal Data 40.1. The Company is the data controller in the relevant jurisdiction. You hereby acknowledge and agree to the collection and processing of personal data provided by you in connection with the opening of a trading account for the purpose of performing our obligations under these Terms and Conditions and for administering the relationship between you and us.

  • Personal Data Processing 2.1 The Processor shall process Personal Data only on the basis of corresponding recorded orders from the Controller.

  • Customer’s Processing of Personal Data Customer shall, in its use of the Services, Process Personal Data in accordance with the requirements of Data Protection Laws and Regulations. For the avoidance of doubt, Customer’s instructions for the Processing of Personal Data shall comply with Data Protection Laws and Regulations. Customer shall have sole responsibility for the means by which Customer acquired Personal Data.

  • Employee Access to Personnel File An employee shall have the right to read and review his/her personnel file on reasonable notice and by written request to the Human Resources Manager. An employee may request and shall receive a copy of any record or document contained in the employee’s personnel file.

  • Processing of Company Personal Data 2.1 Processor shall:

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Network Services Local Access Services In lieu of any other rates and discounts, Customer will pay fixed monthly recurring local loop charges ranging from $1,200 to $2,000 for TDM-based DS-3 Network Services Local Access Services at 2 CLLI codes mutually agreed upon by Customer and Company.

  • CUSTOMER SERVICE ACCESS The Competitive Supplier agrees to provide, or cause to be provided, certain customer services to Participating Consumers. Such services shall be reasonably accessible to all Participating Consumers, shall be available during normal working hours, shall allow Participating Consumers to transact business they may have with the Competitive Supplier, and shall serve as a communications liaison among the Competitive Supplier, the Town, and the Local Distributor. A toll-free telephone number will be established by Competitive Supplier and be available for Participating Consumers to contact Competitive Supplier during normal business hours (9:00 A.M. - 5:00 P.M. Eastern Standard Time, Monday through Friday) to resolve concerns, answer questions and transact business with respect to the service received from Competitive Supplier. The Town will post program-related information on the Town’s website which will be available to Participating Consumers for general information, product and service information, and other purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.