Asset Inventory Sample Clauses

Asset Inventory. Assets associated with Personal Data and related processing equipment are identified and an inventory of assets is maintained.
AutoNDA by SimpleDocs
Asset Inventory. HTL maintains a single inventory of information assets, each of which has defined ownership and is classified as; (i) hardware (all computing and information processing equipment, including printers, fax machines, photocopiers, etc.), (ii) software, information/database (e.g. software, software media etc.), intangible, service (which includes designated secure areas), (iii) people (those individuals whose skills, knowledge and experience are considered essential), and
Asset Inventory. Each Subrecipient shall provide information on state and federally funded equipment as described in the 43 TAC §31.50 of this chapter (relating to Recordkeeping and Inventory Requirements).
Asset Inventory iManage maintains inventories of all media on which Customer Data is stored. Access to such inventories is restricted to authorized iManage Personnel.
Asset Inventory. CiteRight maintains inventories of all computing equipment and media used in connection with the Processing of Customer Data. Access to such inventories is restricted to authorized CiteRight Personnel.
Asset Inventory. The Data Importer maintains an inventory of all media on which customer data is stored. Access to the inventories of such media is restricted to authorized personnel.
Asset Inventory. Acuity maintains an inventory of all media on which Customer Data is stored. Access to the inventories of such media is restricted to Acuity personnel authorized in writing to have such access.
AutoNDA by SimpleDocs
Asset Inventory. Supplier will maintain an inventory of all Supplier Information Processing Systems and media containing Confidential Information.
Asset Inventory. Collect sidewalk data to include location, length, width, location in relation to curb and if greenspaces exist between curb and sidewalk, and sidewalk condition to create shapefiles (.shp) for incorporation into the Participant’s GIS system, if applicable.
Asset Inventory i) Jamf will maintain an asset inventory of all media and equipment where Customer Content is stored. Jamf will restrict access to such media and equipment to authorized personnel of Jamf. Jamf will prevent the unauthorized reading, copying modification or removal of data media. ii) Jamf will classify Customer Content so that it is properly identified and will appropriately restrict access to Customer Content. Specifically, Jamf will ensure that no person appointed by Jamf to process Customer Content, will process Customer Content unless that person: 1) has a need to access Customer Content for the purpose of performing Jamf’s obligations under the Agreement; 2) has been authorized by Jamf in a manner consistent with Jamf’s information security policies; 3) has been fully instructed by Jamf in the procedures relevant to the performance of the obligations of Jamf under the Agreement, in particular the limited purpose of processing Customer Content; and 4) is aware that they are prohibited from copying any Customer Content transmitted by Customer to Jamf, provided, however, that Jamf may retain copies of Customer Content provided to it under the Agreement in its servers for backup and archive purposes until completion of the Agreement. iii) Jamf will further maintain measures to ensure that persons appointed by Jamf to process Customer Content will prevent the unauthorized input of Customer Content and the unauthorized inspection, modification, or deletion of stored Customer Content. iv) Jamf will maintain an appropriate approval process whereby approval is provided to personnel, contractors, and agents prior to storing Customer Content on portable devices or remotely accessing Customer Content. All approvals will be subject to measures designed to prevent the unauthorized reading, copying, modification or deletion of Customer Content during transfers of such content or during transportation of data media. If remote access is approved and granted, Jamf personnel, agents, and contractors will use multi-factor authentication. Multi-factor authentication may include techniques such as the use of cryptographic certificates, one-time- password (OTP) tokens, or biometrics.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!