Asset Classification and Logical Access Control Sample Clauses

Asset Classification and Logical Access Control. Braze maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by Xxxxx. Braze adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. Braze maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Braze’s servers is controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to Braze’s servers or Customer Data is logged and can only be accessed through Braze’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character passwords with IP whitelisting. Xxxxx’s HR onboarding and off-boarding processes handle provisioning and de-provisioning of accounts and access.
AutoNDA by SimpleDocs
Asset Classification and Logical Access Control. Braze maintains an inventory of essential information assets such as servers, databases, and information. All customer data is classified as Confidential by Braze. All Braze servers run Ubuntu LTS and Braze adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. Braze maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Braze’s servers are controlled via revocable SSH keys managed via configuration management and rotated at least annually. All accessing of Braze’s servers or Customer Data is logged and can only be accessed through Braze’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character password. Braze’s HR onboarding and off-boarding processes handle provisioning and de- provisioning of accounts and access.
Asset Classification and Logical Access Control. Inkit maintains an inventory of essential information assets, such as servers, databases, and information. All Customer Data is classified by Inkit as confidential. All Inkit servers run Ubuntu LTS. Inkit adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Inkit’s customer account managers only have access to the regions for which they are directly responsible. Inkit maintains separate development, staging (or sandbox), user acceptance testing, and production environments. Access to each environment and within each environment is strictly
Asset Classification and Logical Access Control. Insider maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by Insider. Insider adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. Insider maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Insider’s servers are controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to Insider’s servers or Customer Data is logged and can only be accessed through Insider’s VPN, which uses multi-factor authentication. Database access is controlled via 24-character passwords with IP whitelisting. Insider’s HR onboarding and off-boarding processes handle provisioning and de-provisioning of accounts and access.
Asset Classification and Logical Access Control. Loopy Loyalty maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by Loopy Loyalty. Loopy Loyalty adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. Loopy Loyalty maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Loopy Loyalty’s servers is controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to Loopy Loyalty’s servers or Customer Data is logged and can only be accessed through Loopy Loyalty’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character passwords with IP whitelisting. Loopy Loyalty’s HR onboarding and off-boarding processes handle provisioning and de- provisioning of accounts and access.
Asset Classification and Logical Access Control. PassKit maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by PassKit. PassKit adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. PassKit maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to PassKit’s servers is controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to PassKit’s servers or Customer Data is logged and can only be accessed through PassKit’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character passwords with IP whitelisting. PassKit’s HR onboarding and off-boarding processes handle provisioning and de-provisioning of accounts and access.

Related to Asset Classification and Logical Access Control

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • Benchmarks for Measuring Accessibility For the purposes of this Agreement, the accessibility of online content and functionality will be measured according to the W3C’s Web Content Accessibility Guidelines (WCAG) 2.0 Level AA and the Web Accessibility Initiative Accessible Rich Internet Applications Suite (WAI-ARIA) 1.0 for web content, which are incorporated by reference. Adherence to these accessible technology standards is one way to ensure compliance with the District’s underlying legal obligations to ensure people with disabilities are able to acquire the same information, engage in the same interactions, and enjoy the same benefits and services within the same timeframe as their nondisabled peers, with substantially equivalent ease of use; that they are not excluded from participation in, denied the benefits of, or otherwise subjected to discrimination in any District programs, services, and activities delivered online, as required by Section 504 and Title II and their implementing regulations; and that they receive effective communication of the District’s programs, services, and activities delivered online. Remedies and Reporting

  • Ownership and Location of Metering Equipment The Metering Equipment to be constructed, the capability of the Metering Equipment to be constructed, and the ownership thereof, are identified on the attached Schedule C to this ISA.

  • Technical and Organizational Measures The following sections define SAP’s current technical and organizational measures. SAP may change these at any time without notice so long as it maintains a comparable or better level of security. Individual measures may be replaced by new measures that serve the same purpose without diminishing the security level protecting Personal Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!