Data Usage Control / Data Storage Media Control Sample Clauses

Data Usage Control / Data Storage Media Control. Memory Control Prevention of unauthorized reading, copying, changing or erasure of data storage media (data storage media control). Prevention of unauthorized entry of Personal Information and unauthorized access to it, changing and deleting saved Personal Information (memory control). Ensuring that the parties authorized to use an automated processing system only have access to the Personal Information appropriate for their access authorization (e.g. through authorization concepts, passwords, regulations for leaving the company and for moving employees to other departments) (data usage control). The following technical and organizational measures have been implemented by the Operator for the processing of Personal Information described in this Agreement / Addendum: Roles and authorizations based on a “need to know principle” Number of administrators reduced to only the “essentials” Logging of access to applications, in particular the entry, change and erasure of data Physical erasure of data storage media before reuse Use of shredders or service providers Administration of rights by defined system administrators Password guidelines, incl. password length and changing passwords Secure storage of data storage media Proper destruction of data storage media (DIN 66399) Logging of destruction Miscellaneous:
AutoNDA by SimpleDocs
Data Usage Control / Data Storage Media Control. Memory Control Ensuring that the parties authorised to use an automated processing system only have access to the Personal Information appropriate for their access authorisation. Prevention of unauthorised reading, copying, changing or erasure of data storage media (data storage media control). Prevention of unauthorised entry of Personal Information and unauthorised access to it, changing and deleting saved Personal Information (memory control). The following technical and organisational measures have been implemented by the Operator for the processing of Personal Information described in this Agreement / Addendum: Roles and authorisations based on a “need to know principle” Number of administrators reduced to only the “essentials” Logging of access to applications, in particular the entry, change and erasure of data Physical erasure of data storage media before reuse Use of shredders or service providers Administration of rights by defined system administrators Password guidelines, including password length and changing passwords Secure storage of data storage media Proper destruction of data storage media Logging of destruction
Data Usage Control / Data Storage Media Control. Memory Control Ensuring that the parties authorised to use an automated processing system only have access to the Personal Information appropriate for their access authorisation. Prevention of unauthorised reading, copying, changing or erasure of data storage media (data storage media control). Prevention of unauthorised entry of Personal Information and unauthorised access to it, changing and deleting saved Personal Information (memory control). The following technical and organisational measures have been implemented by the Operator for the processing of Personal Information described in this Agreement / Addendum (applicable fields marked with an “X”): Roles and authorisations based on a “need to know principle” Number of administrators reduced to only the “essentials” Logging of access to applications, in particular the entry, change and erasure of data Physical erasure of data storage media before reuse Use of shredders or service providers Administration of rights by defined system administrators Password guidelines, including password length and changing passwords Secure storage of data storage media Proper destruction of data storage media Logging of destruction

Related to Data Usage Control / Data Storage Media Control

  • Terminating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • ODUF Control Data 6.5.1 Image Access will send one confirmation record per pack that is received from BellSouth. This confirmation record will indicate Image Access’s receipt of the pack and the acceptance or rejection of the pack. Pack Status Code(s) will be populated using standard ATIS EMI error codes for packs that were rejected by Image Access for reasons stated in the above section.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems. Measures: • SAP only allows authorized personnel to access Personal Data as required in the course of their duty. • SAP has implemented a logging system for input, modification and deletion, or blocking of Personal Data by SAP or its subprocessors within the Cloud Service to the extent technically possible.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage. Measures: • As part of the SAP Security Policy, Personal Data requires at least the same protection level as “confidential” information according to the SAP Information Classification standard. • Access to Personal Data is granted on a need-to-know basis. Personnel have access to the information that they require in order to fulfill their duty. SAP uses authorization concepts that document grant processes and assigned roles per account (user ID). All Customer Data is protected in accordance with the SAP Security Policy. • All production servers are operated in the Data Centers or in secure server rooms. Security measures that protect applications processing Personal Data are regularly checked. To this end, SAP conducts internal and external security checks and penetration tests on its IT systems. • SAP does not allow the installation of software that has not been approved by SAP. • An SAP security standard governs how data and data carriers are deleted or destroyed once they are no longer required.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Control Data <<customer_name>> will send one confirmation record per pack that is received from BellSouth. This confirmation record will indicate <<customer_name>> received the pack and the acceptance or rejection of the pack. Pack Status Code(s) will be populated using standard ATIS EMI error codes for packs that were rejected by <<customer_name>> for reasons stated in the above section.

  • Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

Time is Money Join Law Insider Premium to draft better contracts faster.