Admission control Sample Clauses

Admission control. Digital access to the storage media of personal data must generally be protected against un- authorized access by means of password-protected access and passwords are randomly generated by an encrypted password manager. Access data and passwords in particular must never be stored locally, but only in a SOC2-certified password management tool. Also, sharing of newly created login credentials or shared access is never done unencrypted via standard communication channels, but exclusively by means of the deployed password management software. In this way, user accesses are centrally managed, documented and their validity regularly checked. As a matter of principle, initial passwords must be changed immediately after they are received and stored in a personal password container in the cer- tified password management tool. E-mails are only sent and read via the TLS-encrypted do- main belonging to the company. In addition, screen workstations are automatically locked after two minutes and must be unlocked by re-authentication.
Admission control. The following implemented measures prevent unauthorized persons from gaining access to the data processing systems: ● Authentication with user and password ● Use of anti-virus software ● Use of firewalls ● Encryption of data carriers ● Encryption of notebooks / tablets ● Use of 2-factor authentication ● Key regulation / key book ● General instruction to manually lock the desktop when leaving the workstation
Admission control. Measures to limit admission of unauthorized persons to systems where personal data is used or processed with electronic data processing devices. • Safeguarding of physical network infrastructure • Firewall for internal networks against external vulnerabilities • Control of use for electronic data processing • Regulations and instructions of admission control • Control and identification of authorized persons • Logging of use for entry rights • Admission only with User-ID and password only • Separation of function principle when granting entry authorization • Identification of terminal or terminal user (e.g.: login with user-ID and password) • Automatic screensaver protection in case of inactivity • Lockable terminals and decentralized IT-systems • Safeguarding of electronic data processing systems correspondent with the requirements • Functional and/or timely limited use of terminals
Admission control. The feasibility of a request satisfaction should be checked before including the request in the system. Based on the requests already presented in the process’s local queue, the admission control should firstly verify if a process request can be locally satisfied. If such is the case, a global admission policy is performed. − −
Admission control. Bynder shall prevent unauthorized persons from gaining access to Bynder premises.
Admission control. The following implemented measures prevent unauthorized persons from accessing the data processing systems: ● Authentication with user and password ● Authentication with biometric data ● Use of anti-virus software ● Use of firewalls ● Use of mobile device management ● Use of VPN technology for remote accesses ● Encryption of data media ● Automatic desktop lock ● Encryption of notebooks / tablets ● Management of user permissions ● Creation of user profiles ● Central password rules ● Use of 2-factor authentication ● Logging of visitors (e.g. visitor book) ● General corporate policy on data protection or security ● Corporate policy for secure passwords ● Corporate "Delete/Destroy" policy ● Corporate "Cleandesk" policy ● General instruction to manually lock desktop when leaving workstation
Admission control. Measures to prevent unauthorised persons from gaining access to the data processing equipment used to process personal data. Y Access control guidelines and regulations Y Security areas are clearly defined Y Appropriate implementation of measures to secure the buildings Y Appropriate implementation of measures to secure Datacenter Access Y Security also outside working hours by alarm system and/or plant security Y Access only for authorized persons (company employees and external persons) Y Regulation for external parties Y Use of security badges Y Key Management Y Implementation of locks Y External staff is accompanied by Prodware staff
Admission control. The Processor shall take measures to prevent unauthorized access to the processing systems (and facilities) with which data is processed. These include: # Technical measures Implemented 1 Use of admission controls (such as chip cards, keys, or comparable access systems) ☒ 2 Security measures at emergency exits and other entrances and exits ☒ 3 Additional security measures in the data center, for example: Cages or lockable racks ☒
Admission control. The processor is obliged to take measures to prevent unauthorised access to the processing systems (and facilities) with which personal data are processed. This includes: # Technical measures Implemented 1 Use of access controls (such as chip cards, keys or comparable access systems) ☒ 2 Safety measures at emergency exits and other entrances and exits ☒ 3 Additional security measures in the data centre, for example: cages or lockable shelves ☒ 4 Monitoring of properties and buildings ☒ 5 Video or camera surveillance system for security zones (data centre) ☒ DISH Digital Solutions GmbH ▇▇▇▇▇-▇▇▇▇▇▇ ▇ +▇▇ (▇▇▇) ▇▇▇ ▇▇▇▇ ▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇▇▇ Managing Directors: Local court: ▇▇. ▇▇▇▇▇▇ ▇▇▇▇▇▇▇ ∙ ▇▇▇▇▇▇▇▇▇ Ziggel Düsseldorf ∙ HRB No. 62421 # Technical measures Implemented 6 Use of an alarm system ☒ # Organisational measures Implemented 1 Existence of building plans and risk-based definition of safety zones in the building ☒ 2 Use of a role- or group-based (physical) access authorisation concept ☒ 3 Procedure for the allocation and use of keys and authentication functions ☒ 4 Procedure for managing access authorisations for external staff (e.g. visitors or cleaning staff) ☒ 5 Specifications for access to the building by external persons ☒ 6 Logging of access to rooms and buildings (if necessary, with the possibility of evalu- ating log files) ☒ 7 Logging of access to security zones (if necessary, with the possibility of evaluating log files) ☒ DISH Digital Solutions GmbH ▇▇▇▇▇-▇▇▇▇▇▇ ▇ +▇▇ (▇▇▇) ▇▇▇ ▇▇▇▇ ▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇▇▇ Managing Directors: Local court: ▇▇. ▇▇▇▇▇▇ ▇▇▇▇▇▇▇ ∙ ▇▇▇▇▇▇▇▇▇ Ziggel Düsseldorf ∙ HRB No. 62421
Admission control. Preventing data processing systems from being used by unauthorized persons authorized to do so.