Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.
Control Data <<customer_name>> will send one confirmation record per pack that is received from BellSouth. This confirmation record will indicate <<customer_name>> received the pack and the acceptance or rejection of the pack. Pack Status Code(s) will be populated using standard ATIS EMI error codes for packs that were rejected by <<customer_name>> for reasons stated in the above section.
Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Erosion Control a. The Purchaser shall construct slash and debris erosion barriers, dips, water bars or ditches in skid trails and landings as directed by the Forest Officer. b. The kinds and frequency of erosion control structures shall be adjusted to soil types, topography and climatic conditions as directed by the Forest Officer. c. The Purchaser is required to recontour any excavated skid trails, and provide for effective erosion control in the trail location as directed by the Forest Officer. d. Erosion control work shall commence as soon as skidding is completed on each skid trail or landing, and must be kept current with unit operations. e. Erosion control work shall be completed and approved by the Forest Officer in unfinished units before operations cease for inactive periods including heavy winter snowfall, spring breakup and restricted dates. f. All erosion control work in each unit shall be completed prior to notification pursuant to Section VII.M.7.
Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.
System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.
Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.
Data Integrity Control Personal Data will remain intact, complete and current during processing activities.
Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems.