Asset Classification and Logical Access Control Sample Clauses

Asset Classification and Logical Access Control. Braze maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by Xxxxx. Braze adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. Braze maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Braze’s servers is controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to Braze’s servers or Customer Data is logged and can only be accessed through Braze’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character passwords with IP whitelisting. Xxxxx’s HR onboarding and off-boarding processes handle provisioning and de-provisioning of accounts and access.
AutoNDA by SimpleDocs
Asset Classification and Logical Access Control. Braze maintains an inventory of essential information assets such as servers, databases, and information. All customer data is classified as Confidential by Braze. All Braze servers run Ubuntu LTS and Braze adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. Braze maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Braze’s servers are controlled via revocable SSH keys managed via configuration management and rotated at least annually. All accessing of Braze’s servers or Customer Data is logged and can only be accessed through Braze’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character password. Braze’s HR onboarding and off-boarding processes handle provisioning and de- provisioning of accounts and access.
Asset Classification and Logical Access Control. Inkit maintains an inventory of essential information assets, such as servers, databases, and information. All Customer Data is classified by Inkit as confidential. All Inkit servers run Ubuntu LTS. Inkit adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Inkit’s customer account managers only have access to the regions for which they are directly responsible. Inkit maintains separate development, staging (or sandbox), user acceptance testing, and production environments. Access to each environment and within each environment is strictly
Asset Classification and Logical Access Control. PassKit maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by PassKit. PassKit adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. PassKit maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to PassKit’s servers is controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to PassKit’s servers or Customer Data is logged and can only be accessed through PassKit’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character passwords with IP whitelisting. PassKit’s HR onboarding and off-boarding processes handle provisioning and de-provisioning of accounts and access.
Asset Classification and Logical Access Control. Loopy Loyalty maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by Loopy Loyalty. Loopy Loyalty adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. For example, Customer Success Managers only have access to the regions for which they are directly responsible. Loopy Loyalty maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Loopy Loyalty’s servers is controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to Loopy Loyalty’s servers or Customer Data is logged and can only be accessed through Loopy Loyalty’s VPN, which uses multi-factor authentication. Database access is controlled via 32 and 64-character passwords with IP whitelisting. Loopy Loyalty’s HR onboarding and off-boarding processes handle provisioning and de- provisioning of accounts and access.
Asset Classification and Logical Access Control. Insider maintains an inventory of essential information assets such as servers, databases, and information. All Customer Data is classified as Confidential by Insider. Insider adopts the principle of least privilege for all accounts running application or database services, as well as with its own staff. Insider maintains separate development, staging (or sandbox), user acceptance testing, and production environments access to each environment and within each environment is strictly controlled. Access to Insider’s servers are controlled via revocable SSH keys managed via configuration management and rotated at least annually. All access to Insider’s servers or Customer Data is logged and can only be accessed through Insider’s VPN, which uses multi-factor authentication. Database access is controlled via 24-character passwords with IP whitelisting. Insider’s HR onboarding and off-boarding processes handle provisioning and de-provisioning of accounts and access.

Related to Asset Classification and Logical Access Control

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Traffic Measurement and Billing over Interconnection Trunks 6.1 For billing purposes, each Party shall pass Calling Party Number (CPN) information on at least ninety-five percent (95%) of calls carried over the Interconnection Trunks. 6.1.1 As used in this Section 6, “Traffic Rate” means the applicable Reciprocal Compensation Traffic rate, Measured Internet Traffic rate, intrastate Switched Exchange Access Service rate, interstate Switched Exchange Access Service rate, or intrastate/interstate Tandem Transit Traffic rate, as provided in the Pricing Attachment, an applicable Tariff, or, for Measured Internet Traffic, the FCC Internet Order. 6.1.2 If the originating Party passes CPN on ninety-five percent (95%) or more of its calls, the receiving Party shall xxxx the originating Party the Traffic Rate applicable to each relevant minute of traffic for which CPN is passed. For any remaining (up to 5%) calls without CPN information, the receiving Party shall xxxx the originating Party for such traffic at the Traffic Rate applicable to each relevant minute of traffic, in direct proportion to the minutes of use of calls passed with CPN information. 6.1.3 If the originating Party passes CPN on less than ninety-five percent (95%) of its calls and the originating Party chooses to combine Reciprocal Compensation Traffic and Toll Traffic on the same trunk group, the receiving Party shall xxxx the higher of its interstate Switched Exchange Access Service rates or its intrastate Switched Exchange Access Services rates for all traffic that is passed without CPN, unless the Parties agree that other rates should apply to such traffic. 6.2 At such time as a receiving Party has the capability, on an automated basis, to use such CPN to classify traffic delivered over Interconnection Trunks by the other Party by Traffic Rate type (e.g., Reciprocal Compensation Traffic/Measured Internet Traffic, intrastate Switched Exchange Access Service, interstate Switched Exchange Access Service, or intrastate/interstate Tandem Transit Traffic), such receiving Party shall xxxx the originating Party the Traffic Rate applicable to each relevant minute of traffic for which CPN is passed. If the receiving Party lacks the capability, on an automated basis, to use CPN information on an automated basis to classify traffic delivered by the other Party by Traffic Rate type, the originating Party will supply Traffic Factor 1 and Traffic Factor

  • Benchmarks for Measuring Accessibility For the purposes of this Agreement, the accessibility of online content and functionality will be measured according to the W3C’s Web Content Accessibility Guidelines (WCAG) 2.0 Level AA and the Web Accessibility Initiative Accessible Rich Internet Applications Suite (WAI-ARIA) 1.0 for web content, which are incorporated by reference.

  • Ownership and Location of Metering Equipment The Metering Equipment to be constructed, the capability of the Metering Equipment to be constructed, and the ownership thereof, are identified on the attached Schedule C to this ISA.

  • Technical and Organizational Measures The following sections define SAP’s current technical and organizational measures. SAP may change these at any time without notice so long as it maintains a comparable or better level of security. Individual measures may be replaced by new measures that serve the same purpose without diminishing the security level protecting Personal Data.

  • Changes in Equipment, Systems, Etc USBFS reserves the right to make changes from time to time, as it deems advisable, relating to its systems, programs, rules, operating schedules and equipment, so long as such changes do not adversely affect the services provided to the Trust under this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!