Electronic Access Control Sample Clauses
The Electronic Access Control clause establishes the rules and requirements for managing and securing electronic access to systems, facilities, or data. It typically outlines who is authorized to access certain electronic resources, the methods for granting and revoking access, and the security measures that must be in place, such as password protocols or multi-factor authentication. By defining these controls, the clause helps prevent unauthorized access, protects sensitive information, and ensures compliance with security policies.
POPULAR SAMPLE Copied 1 times
Electronic Access Control. No unauthorized use of the Data Processing and Data Storage Systems, e.g.: (secure) passwords, automatic blocking/locking mechanisms, two-factor authentication, encryption of data carriers/storage media; The measures of electronic access controls are: • Use of unique IDs for all employees • Password policy defining password complexity requirements • Use of password manager • Enforcement of secure passwords • Multi-factor authentication in identity providers • Automatic blocking (e.g. wrong password, timeout) • Secure deposition of master and administrative passwords of all relevant IT systems • User rights are assigned to unique IDs • Usage of Mobile Device Management • Full-disk encryption of mobile devices and monitored via MDM • Usage of cryptographic methods that are state of the art, e.g., TLSv1.2+ • Data center operations outsourced • Regulation of data organization inclusive logging, reporting of data usage • Usage of data protection bin
Electronic Access Control. No unauthorised use of the Data Processing and Data Storage Systems, ensured by passwords, automatic blocking/locking mechanisms, two-factor authentication, encryption of data storage media.
Electronic Access Control. Zugangskontrolle")
Electronic Access Control. (FOB) System: Each employee shall be required to swipe their "fob" against the electronic access card reader located at main entry point to the school building upon entering and exiting the school building at all times. The reader records their time in the system. In order to prevent unauthorized individuals from access in the buildings, an employee will immediately report any lost or stolen fob to their supervisor. A fob assigned to an individual shall be used solely by the individual it is assigned to. At the time of separation from service, the fob will be returned to the district.
Electronic Access Control. (FOB) System:
Electronic Access Control. No unauthorised use of the Data Processing and Data Storage Systems (secure passwords, firewall, automatic blocking/locking mechanisms, encryption of data carriers/storage media). Internal Access Control (permissions for user rights of access to and amendment of data) No unauthorised Reading, Copying, Changes or Deletions of Data within the system (rights authorisation concept, need-based rights of access, logging of system access events). Isolation Control The isolated Processing of Data, which is collected for differing purposes, e.g. multiple Client support, sandboxing Pseudonymisation (Article 32 Paragraph 1 Point a GDPR; Article 25 Paragraph 1 GDPR) The processing of personal data in such a method/way, that the data cannot be associated with a specific Data Subject without the assistance of additional Information, provided that this additional information is stored separately, and is subject to appropriate technical and organisational measures
Electronic Access Control. 2.1 All accounts are password-protected. Users are provided visual feedback about the complexity of their password, which encourages them to select a stronger password when applicable. Passwords are stored fully encrypted on the KoboToolbox Server, utilizing the default open-source framework provided by Django, which uses the PBKDF2 algorithm with a SHA256 hash.
2.2 All database content is encrypted at rest (database-level encryption).
2.3 Users can choose to enable encryption of their project data (data-level encryption) which renders it inaccessible at all stages of data processing and requires a private key to decrypt it locally.
2.4 Users found to abuse the use of their API keys by overburdening the KoboToolbox Server may be suspended or their account may be restricted.
Electronic Access Control. Codility ensures that the IT systems utilized for the data processing allows authorized users only limited access, specified by their individual authorization rights. Codility must take adequate measures to ensure that personal data cannot be read, copied, modified or deleted in an unauthorized manner. This must especially be ensured by: User accounts for Codility personnel are allocated to all IT systems. User accounts are solely accessible with an access user ID, consisting of username and password. Yes The password associated with an access user ID is the primary means of verifying identity and subsequently allowing access to Codility personnel’s computer and to the information. Identity verification password is kept secret and not shared with anyone else. Yes Identity verification passwords must not be trivial or predictable and must: ● Be at least 8 positions in length ● Contain a mix of alphabetic and non-alphabetic characters (numbers, punctuation or special characters) or a mix of at least two types of non-alphabetic characters ● Not contain the access user ID as part of the password Yes A password protected keyboard / screen lock that is automatically activated by a period of inactivity is set. Yes The access rights of personnel to personal data is restricted to the necessary minimum required for their job functions. Yes Personal data may only be printed in physically secure areas controlled by Codility and only shared with personnel on a need to know basis. N/A Antivirus program is installed and run on the workstation. Yes Hardware firewall program is installed and run on the workstation. Yes Personnel with workstations using Microsoft Windows operating systems will install security patches for their respective version (but only the patches approved by CODILITY’s infrastructure team). Yes Any media that contains personal data is securely stored at Codility’s facilities. N/A (no physical media) In order to access Codility servers from outside of the premises, Codility has established VPN tunnels. VPN access requires an access user ID and associated VPN password, set up under the following requirements: Yes ● Has a length of minimum 8 and maximum 32 characters / digits ● Contains at least 1 uppercase and 1 lowercase character ● Contains at least 1 digit ● Is not identical with identity verification password Codility has established rules for the safe and permanent destruction of data that is no longer required. Yes Codility has established rules for the ...
Electronic Access Control. Those authorized to use a data processing system have exclusive access to those personal data which are covered by their authorization. Detailed Description ▇▇▇▇▇▇▇▇: Availability and Resilience Recoverability It is ensured that systems can be restored in case of a malfunction.
Electronic Access Control. Ensures that those authorized to use a data processing system can only access the data for which they are authorized and that personal data is not subject to unauthorized viewing, copying, modification or deletion when it is processed or used or after it is stored. Central rights management separates system access from application access. Users can not change their own rights. Users can not request a change without approval by their supervisor. Change management of user rights in accordance with changing roles (f.e. at movements within the company) External access is restricted to VPN- or SSH- secured connections. Regularly Security checks of external access are carried out by appropriately specialized companies. Internal Security regulation including need to know principle Workstation computers are secured as follows: Users must log on through a centrally controlled identity management system. Employees are required to lock their computers. Computers are automatically locked after 15 minutes of idle time.
