Common use of Access control to systems Clause in Contracts

Access control to systems. Access to systems and applications is built-up by numerous directives providing individual and personal user identification and authentication, access control, logging and traceability. Access to the system is carried out by aid of Kerberos session tickets. Remote access to the network resources requires supplementary equipment in terms of ‘tokens’ (onetime pass- word generator). Passwords are automatically checked to contain special characters and other qualities and must be changed regularly. User ID’s/passwords are automatically blocked after a predefined number of erroneous attempts and clients are put to stand-by after a predefined time of inactivity. Portable clients are encrypted as a standard. Stationary clients, servers and disk arrays are encrypted as needed.

Appears in 2 contracts

Samples: Data Management Agreement, Telematic Services Agreement

AutoNDA by SimpleDocs

Access control to systems. Access to systems and applications is built-up by numerous directives providing individual and personal user identification and authentication, access control, logging and traceability. Access to the system is carried out by aid of Kerberos session tickets. Remote access to the network resources requires supplementary equipment in terms of ‘tokens’ (onetime pass- word password generator). Passwords are automatically checked to contain special characters and other qualities and must be changed regularly. User ID’s/passwords are automatically blocked after a predefined number of erroneous attempts and clients are put to stand-by after a predefined time of inactivity. Portable clients are encrypted as a standard. Stationary clients, servers and disk arrays are encrypted as needed.

Appears in 2 contracts

Samples: Framework Agreement for the Provision of Connected Services, Framework Agreement

AutoNDA by SimpleDocs

Access control to systems. Access to systems and applications is built-up by numerous directives di- rectives providing individual and personal user identification and authentication, access control, logging and traceability. Access to the system is carried out by aid of Kerberos session tickets. Remote access to the network resources requires supplementary supplemen- tary equipment in terms of ‘tokens’ (onetime pass- word generatorpassword genera- tor). Passwords are automatically checked to contain special characters and other qualities and must be changed regularly. User ID’s/passwords are automatically blocked after a predefined prede- fined number of erroneous attempts and clients are put to stand-stand- by after a predefined time of inactivity. Portable clients are encrypted en- crypted as a standard. Stationary clients, servers and disk arrays are encrypted as needed.

Appears in 1 contract

Samples: Data Management Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!