Additional measures for Data Centers Sample Clauses

The "Additional measures for Data Centers" clause sets out specific requirements or safeguards that must be implemented at data centers to enhance data security and compliance. This may include technical controls such as advanced access restrictions, environmental monitoring, or regular security audits, as well as organizational measures like staff training or incident response protocols. By mandating these extra protections, the clause aims to reduce the risk of data breaches and ensure that sensitive information stored or processed at data centers is adequately protected.
Additional measures for Data Centers. All Data Centers adhere to strict security procedures enforced by guards, surveillance cameras, motion detectors, access control mechanisms and other measures to prevent equipment and Data Center facilities from being compromised. Only authorized representatives have access to systems and infrastructure within the Data Center facilities. To protect proper functionality, physical security equipment (e.g., motion sensors, cameras, etc.) undergo maintenance on a regular basis. • SAP and all third-party Data Center providers log the names and times of authorized personnel entering SAP’s private areas within the Data Centers.
Additional measures for Data Centers. All Data Centers adhere to strict security procedures enforced by guards, surveillance cameras, motion detectors, access control mechanisms and other measures to prevent equipment and Data Center facilities from being compromised. Only authorized representatives have access to systems and infrastructure within the Data Center facilities. To protect proper functionality, physical security equipment (e.g., motion sensors, cameras, etc.) undergo maintenance on a regular basis.
Additional measures for Data Centers. All Data Centers adhere to strict security procedures enforced by guards, surveillance cameras, motion detectors, access control mechanisms and other measures to prevent equipment and Data Center facilities from being compromised. Only authorized representatives have access to systems and infrastructure within the Data Center facilities. To protect proper functionality, physical security equipment (e.g., motion sensors, cameras, etc.) undergo maintenance on a regular basis. RELISH and all third-party Data Center providers log the names and times of authorized personnel entering RELISH’s private areas within the Data Centers. System Access Control. Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the RELISH Security Policy. All personnel access RELISH’s systems with a unique identifier (user ID). RELISH has policies designed to provide that no rights are granted without authorization and in case personnel leaves the company their access rights are revoked. RELISH has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. The company network is protected from the public network by firewalls. RELISH uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. Security patch management processes to deploy relevant security updates on a regular and periodic basis. Full remote access to RELISH’s corporate network and critical infrastructure is protected by authentication. Data Access Control. As part of the RELISH Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the RELISH Information Classification standard. Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. RELISH uses authori...
Additional measures for Data Centers. All Data Centers adhere to strict security procedures enforced by guards, surveillance cameras, motion detectors, access control mechanisms and other measures to prevent equipment and Data Center facilities from being compromised. Only authorized representatives have access to systems and infrastructure within the Data Center facilities. To protect proper functionality, physical security equipment (e.g., motion sensors, cameras, etc.) undergo maintenance on a regular basis. RELISH and all third-party Data Center providers log the names and times of authorized personnel entering RELISH’s private areas within the Data Centers. System Access Control. Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.
Additional measures for Data Centers. All Data Centers adhere to strict security procedures enforced by guards, surveillance cameras, motion detectors, access control mechanisms and other measures to prevent equipment and Data Center facilities from being compromised. Only authorized representatives have access to systems and infrastructure within the Data Center facilities. To ensure proper functionality, physical security equipment (e.g., motion sensors, cameras, etc.) undergo maintenance on a regular basis. • Unique and all third-party Data Center providers log the names and times of persons entering Unique’s private areas within the Data Centers. Data processing systems used to provide the Unique Services must be prevented from being used without authorization.