Access controls and security Sample Clauses

Access controls and security. All parties will ensure that they have appropriate technical and organisational security measures in place to guard against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. All personal data held by partner organisations electronically will be stored in a secure network area with password protected entry and appropriate back-up functionality. The systems will be auditable so that it is possible for any auditor to establish who has accessed the system. All laptops, computers, and any other portable devices will be encrypted. Any individual no longer required to have access will promptly have such access revoked by the line manager and Human Resources related to the relevant employer. There is an expectation that partner organisations will either be working toward ISO 27001, the International Standard for Information Security Management, or a similar standard of security.
Access controls and security. All parties will ensure that they have appropriate technical and organisational security measures in place to guard against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Access controls and security. All parties will ensure that they have appropriate technical and organisational security measures in place to guard against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. All personal data held by partner organisations electronically will be stored in a secure network area with password protected entry and appropriate back-up functionality. The systems will be auditable so that it is possible for any auditor to establish who has accessed the system. All laptops, computers, and any other portable devices will be encrypted. Any individual no longer required to have access will promptly have such access revoked by the line manager and Human Resources related to the relevant employer. There is an expectation that partner organisations will either be working toward ISO 27001, the International Standard for Information Security Management, or a similar standard of security. At the end of the efficacy part of the LYPS (currently scheduled for the second half of 2024), identifiable data will be held separately on the IFS Data Enclave. The data relating to this project held on the IFS data enclave can only be accessed by Approved Enclave Users who are also required to sign the Data Enclave Access Agreement and have BPSS ( Baseline Personnel Security Standard) clearance. IFS data Enclave: The system (except the server and some cabling) is contained entirely within a physically secured room. The door is locked with an access card reader and a keypad. The Enclave server is contained within a separate secure room which is locked with a key. The access card system is used throughout the IFS to control access to different areas. Access is assigned by IT Services. Ability to enter the Enclave is only given to staff who have been approved to use the Enclave as outlined in Section 2.4 and who have signed the Data Enclave Access Agreement (hereafter referred to as “Approved Person(s)”). As a secondary security measure, Approved Users will also need to obtain the number code to unlock the door from the Head of Data Services, the Head of ICT or the IT Support and Systems Administrator. 2 xxxxx://xxxx.xxxxxxxxx.xxx/en-us/azure/compliance/ Visits to the Enclave are recorded via the Door Access System. Logs are kept for three months. Logs of data access are recorded electronically using the in-built computer auditing tools. Details of any outputs removed from the Enclave will be recorded in a Logboo...
Access controls and security. Landlord shall maintain within the Building, including the Premises and all common areas, a reasonably adequate door access control and electronic surveillance security system and shall provide reasonable access to the same to Tenant at all times.
Access controls and security. Both Parties will ensure that they have appropriate technical and organisational security measures in place to guard against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. All personal data held by the Parties electronically will be stored in a secure network area with password protected entry and appropriate back-up functionality. The systems will be auditable so that it is possible for any auditor to establish who has accessed the system. All laptops, computers, and any other portable devices will be encrypted. Any individual no longer required to have access will promptly have such access revoked by the line manager and Human Resources related to the relevant employer. Both partners are NHS Digital’s Data Security and Protection Toolkit (DSP ) compliant. There is an expectation that partner organisations will either be working toward ISO 27001, the International Standard for Information Security Management, or a similar standard of security such as Cyber Essentials or Cyber Essentials Plus.

Related to Access controls and security

  • Tools and Equipment As established by current practices, the Employer may determine and provide necessary tools, tool allowance, equipment and foul weather gear. The Employer will repair or replace employer-provided tools and equipment if damaged or worn out beyond usefulness in the normal course of business. Employees are accountable for equipment and/or tools assigned to them and will maintain them in a clean and serviceable condition.