Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Appears in 10 contracts
Samples: Cloud Services Agreement, Ibm Cloud Services Agreement, Ibm Cloud Services Agreement
Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Appears in 6 contracts
Samples: Cloud Services Agreement, Ibm Cloud Services Agreement, Ibm Cloud Services Agreement
Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM Emptoris data centers that support this Cloud Servicecenters. Access control logs are audited regularly. Termination and employment change procedures are in place and include return of assets and access right removal.
Appears in 5 contracts
Samples: Cloud Services Agreement, Cloud Services Agreement, Ibm Cloud Services Agreement
Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Appears in 4 contracts
Samples: Cloud Services Agreement, Cloud Services Agreement, Ibm Cloud Services Agreement
Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer There is no usage of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Appears in 2 contracts
Samples: Cloud Services Agreement, Ibm Cloud Services Agreement
Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–-factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Appears in 2 contracts
Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of dutiesand this access is reviewed quarterly. IBM support staff use two–-factor authentication to an intermediate “gateway” management host. All connections are host and encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment Access is logged. There is no usage of WIFI use is prohibited within the IBM data centers that support this Cloud Servicecenters.
Appears in 2 contracts
Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement
Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Appears in 2 contracts
Samples: Ibm Cloud Services Agreement, Cloud Services Agreement
Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Appears in 2 contracts
Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement
Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Appears in 1 contract
Samples: Cloud Services Agreement
Access Control. Access to client data, if required, is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Appears in 1 contract
Samples: Ibm Cloud Services Agreement
Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. WIFI use is prohibited within the IBM data centers that support this Cloud Service.
Appears in 1 contract
Samples: Cloud Services Agreement
Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management host. All connections are use encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM data centers that support this the Cloud Service.
Appears in 1 contract
Samples: Cloud Services Agreement
Access Control. Access to client data, if required, data is allowed only by authorized IBM support Support representatives according to principles of segregation of duties. IBM Support staff use two–-factor authentication to an intermediate “gateway” gateway management host. All connections are encrypted channels when accessing client data. All access to client data and is logged. All transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM SmartCloud data centers that support this Cloud Servicecenters. Access control logs are audited regularly. Termination and employment change procedures are in place and include return of assets and access right removal.
Appears in 1 contract
Samples: Ibm Cloud Services Agreement
Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management man- agement host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM Emptoris data centers that support this Cloud Servicecenters. Access control logs are audited regularly. Termination and employ- ment change procedures are in place and include return of assets and access right removal.
Appears in 1 contract
Samples: Cloud Services Agreement
Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–-factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and is logged. All transfer of data into into, or out of of, the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM data centers that support this Cloud Servicecenters. Access control logs are audited regularly. Termination and employment change procedures are in place and include return of assets and access right removal.
Appears in 1 contract
Samples: Cloud Services Agreement
Access Control. Access to client data, if required, data is allowed only by authorized IBM support representatives according to principles of segregation of duties. IBM support staff use two–factor authentication to an intermediate “gateway” management host. All connections are encrypted channels when accessing client data. All access to client data and transfer of data into or out of the hosting environment is logged. There is no usage of WIFI use is prohibited within the IBM IOC data centers that support this Cloud Servicecenters. Access control logs are audited regularly. Termination and employment change procedures are in place and include return of assets and access right removal.
Appears in 1 contract
Samples: Cloud Services Agreement