Authentication and Authorization. A documented authentication and authorization policy must cover all applicable systems. That policy must include password provisioning requirements, password complexity requirements, password resets, thresholds for lockout attempts, thresholds for inactivity, and assurance that no shared accounts are
Appears in 3 contracts
Samples: Data Processing Addendum, Data Processing Addendum, Data Processing Addendum
Authentication and Authorization. A documented authentication and authorization policy must cover all applicable systems. That policy must include password provisioning requirements, password complexity requirements, password resets, thresholds for lockout attempts, thresholds for inactivity, and assurance that no shared accounts areare utilized. Authentication credentials must be encrypted, including in transit to and from subprocessors’ environments or when stored by subprocessors.
Appears in 2 contracts
Authentication and Authorization. A documented authentication and authorization policy must cover all applicable systems. That policy must include password provisioning requirements, password complexity requirements, password resets, thresholds for lockout attempts, thresholds for inactivity, and assurance that no shared accounts arefor
Appears in 1 contract