Asset Handling a. Acuity classifies Customer Data to help identify it and allow for access to it to be appropriately restricted (e.g. through encryption).
b. Acuity imposes restrictions on printing Customer Data and has procedures for disposing of printed materials that contain Customer Data.
c. Acuity personnel must obtain authorization prior to storing Customer Data on portable devices, remotely accessing Customer Data, or processing Customer Data outside Acuity’s facilities. This includes removing media (e.g., USB sticks and CD ROMs) and documents containing Customer Data from Acuity’s facilities.
Asset Handling i. The Data Importer employees are required to utilize encryption to store data in a secure manner and are required to use two-factor authentication to access Wildbit, LLC’s networks.
ii. The Data Importer imposes restrictions on printing customer data and has procedures for disposing of printed materials that contain customer data.
iii. The Data Importer's personnel must obtain authorization prior to storing customer data on portable devices, remotely accessing customer data, or processing customer data outside the Data Importer's facilities.
Asset Handling. X. Microsoft classifies Customer Data to help identify it and to allow for access to it to be appropriately restricted (e.g., through encryption).
B. Microsoft imposes restrictions on printing Customer Data and has procedures for disposing of printed materials that contain Customer Data.
C. Microsoft personnel must obtain Microsoft authorization prior to storing Customer Data on portable devices, remotely accessing Customer Data, or processing Customer Data outside Microsoft's facilities.
Asset Handling. (i) Provider’s employees are required to utilize encryption to store data in a secure manner and are required to use two-factor authentication to access LiveChat, Inc. network.
Asset Handling. The Data Processor employees are required to utilize encryption to store data in a secure manner and are required to use two-factor authentication to access DGrigg Development. networks. The Data Processor imposes restrictions on printing customer data and has procedures for disposing of printed materials that contain customer data. The Data Processor's personnel must obtain authorization prior to storing customer data on portable devices, remotely accessing customer data, or processing customer data outside the Data Processor's facilities.
Asset Handling i. Provider shall classify Accenture Data so that it is properly identified and access to Accenture Data shall be appropriately restricted.
ii. Provider shall maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed to provide the Provider Services under the Agreement.
iii. Provider shall maintain an appropriate approval process whereby such approval is provided to personnel, contractors, and agents prior to storing Accenture Data on portable devices; remotely accessing Accenture Data; or processing such data outside of Provider facilities. If storing Accenture Data on portable devices is approved and granted, Provider shall enforce the use of current Industry Standard encryption on the portable device. If mobile devices are used to access or store Accenture Data, Provider personnel, contractors and agents shall use a mobile device management (MDM)/mobile application mangement (MAM) solution that enforces encryption, passcode, and remote wipe settings to secure Accenture Data. Provider will prohibit the enrollment of mobile devices that have been “jail broken.”
Asset Handling. A. CloudBlue classifies Personal Data to help identify it and to allow for access to be appropriately restricted (e.g., through encryption).
B. CloudBlue personnel must obtain Customer authorization prior to storing Personal Data on portable devices or CloudBlue facilities. This includes removing media (e.g., USB sticks and disks)
Asset Handling i. The Data Importer employees are required to utilize encryption to store data in a secure manner and are required to use two-factor authentication to access Traxo’s networks.
ii. The Data Importer imposes restrictions on printing customer data and has procedures for disposing of printed materials that contain customer data.
iii. The Data Importer's personnel must obtain authorization prior to storing customer data on portable devices, remotely accessing customer data, or processing customer data outside the Data Importer's facilities.
Asset Handling. The Data Importer provides guidance to Data Importer businesses on: (a) classifying information generated or used by the applicable Data Importer business; and (b) recommended ways to label, store, transmit, and dispose of such information, depending on its classification. This includes paper documents, electronic reports and presentations, as well as transmitted or stored data such as email and Data Exporter transactions.
Asset Handling. (1) SurveyMonkey has procedures for disposing of printed materials that contain Customer Data.
(2) SurveyMonkey maintains an inventory of all hardware on which Customer Data is stored.