Contractor Systems Security. 4.10.1 The physical location of the application systems shall be within controlled access facilities. Individual users may not have access to the data except through their systems that are specifically credentialed for Contractor business. All access will be controlled by authentication methods to validate the approved users.
Appears in 3 contracts
Samples: bosagenda.sandiegocounty.gov, legistarweb-production.s3.amazonaws.com, legistarweb-production.s3.amazonaws.com
Contractor Systems Security. 4.10.1 4.5.2.1 The physical location of the application systems (servers) shall be within controlled access facilities. Individual users may not have access to the data except through their systems that are specifically credentialed for Contractor business. All access will be controlled by authentication methods to validate the approved users.
Appears in 1 contract
Samples: Subvention Contract