Access Controls on Information Systems Sample Clauses

Access Controls on Information Systems. Appropriate procedures and measures to control access to all systems hosting Personal Data and/or providing services on behalf of Media Company (“Systems”) through the use of physical and logical access control systems, grant access only to authorized individuals and, based on the principle of least privileges, prevent unauthorized persons from gaining access to Personal Data, appropriately limit and control the scope of access granted to any authorized person, and log all relevant access events, including:
AutoNDA by SimpleDocs
Access Controls on Information Systems. Appropriate procedures and measures to control access to all systems hosting Raytheon Data and/or providing services on behalf of Raytheon (“Systems”) through the use of physical and logical access control systems that uniquely identify each individual requiring access, grant access only to authorized individuals and, based on the principle of least privileges, prevent unauthorized persons from gaining access to Raytheon Data, appropriately limit and control the scope of access granted to any authorized person, and log and monitor all relevant access events, including:

Related to Access Controls on Information Systems

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Tools and Equipment As established by current practices, the Employer may determine and provide necessary tools, tool allowance, equipment and foul weather gear. The Employer will repair or replace employer-provided tools and equipment if damaged or worn out beyond usefulness in the normal course of business. Employees are accountable for equipment and/or tools assigned to them and will maintain them in a clean and serviceable condition.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Budget Information Funding Source Funding Year of Appropriation Budget List Number Amount EPIC 18-19 301.001F $500,000 EPIC 20-21 301.001H $500,000 R&D Program Area: EDMFO: EDMF TOTAL: $ 1,000,000 Explanation for “Other” selection Reimbursement Contract #: Federal Agreement #:

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8, in accordance with, but only to the extent required by, Applicable Law, Verizon grants to Ymax a non-exclusive license to use Verizon OSS Information.

  • Safeguards Monitoring and Reporting 8. The Borrower shall do the following or cause the Project Executing Agency to do the following:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!