Controlled Access Based on the. Need to Know Maintain processes and tools to track, control, prevent, and correct secure access to critical or controlled assets (e.g. information, resources, systems) according to the formal determination of which persons, computers, and applications have a need and right to access these critical or controlled assets based on an approved classification.
Appears in 5 contracts
Samples: Data Protection Agreement, Data Protection Agreement, www.teletracnavman.co.uk