Endpoint Controls Sample Clauses

Endpoint Controls. Xxxxxx has implemented different security controls on end-user devices and monitors the devices to be in compliance with security standards, some of the security controls implemented are: hard drive encryption, requiring password during login, lock screen, antivirus software, firewall and appropriate patch levels. Xxxxxx will securely sanitize the hard drive prior reuse and will securely destroy the media that will not be used anymore. Xxxxxx logically separates its endpoints and end user environment from the other Xxxxxx environment. Multi-factor authentication is required to access the AWS environment.
AutoNDA by SimpleDocs
Endpoint Controls. For access to the Cloud Environment, Snowflake personnel use Snowflake-issued laptops which utilize security controls that include, but are not limited to, (i) disk encryption, (ii) endpoint detection and response (EDR) tools to monitor and alert for suspicious activities and Malicious Code (as defined below), and (iii) vulnerability management in accordance with Section 4.7.3 (Vulnerability Management).
Endpoint Controls. For access to the Cloud Environment, Apollo personnel use Apollo-issued laptops which utilize security controls that include, but are not limited to, (i) disk encryption, (ii) endpoint detection and response (EDR) tools to monitor and alert for suspicious activities and Malicious Code (as defined below), and (iii) vulnerability management in accordance with Section 7 (Vulnerability Management).
Endpoint Controls. For access to the Cloud Environment, DCC personnel use DCC-issued laptops which utilize security controls that include, but are not limited to, (i) disk encryption, (ii) endpoint detection and response (EDR) tools to monitor and alert for suspicious activities and Vulnerabilities (as defined below), and (iii) Vulnerability management in accordance with Section
Endpoint Controls. For access to the Cloud Environment, eGain personnel use eGain-issued devices with 802.1x certificates which utilize security controls that include, but are not limited to, (i) disk encryption, (ii) endpoint detection and response (EDR) tools to monitor and alert for suspicious activities and Malicious Code (as defined below), and (iii) vulnerability management in accordance with Section 4.7.3 (Vulnerability Management).
Endpoint Controls. Grover has implemented different security controls on end-user devices and monitors the devices to be in compliance with security standards, some of the security controls implemented are: hard drive encryption, requiring password during login, lock screen, antivirus software, firewall and appropriate patch levels. Xxxxxx will securely sanitize the hard drive prior reuse and will securely destroy the media that will not be used anymore. Xxxxxx logically separates its endpoints and end user environment from the other Xxxxxx environment. Multi-factor authentication is required to access the AWS environment.

Related to Endpoint Controls

  • Agreement Controls In the event that any term of any of the Loan Documents other than this Agreement conflicts with any express term of this Agreement, the terms and provisions of this Agreement shall control to the extent of such conflict.

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Disclosure Controls The Company and its subsidiaries maintain an effective system of “disclosure controls and procedures” (as defined in Rule 13a-15(e) of the Exchange Act) that complies with the requirements of the Exchange Act and that has been designed to ensure that information required to be disclosed by the Company in reports that it files or submits under the Exchange Act is recorded, processed, summarized and reported within the time periods specified in the Commission’s rules and forms, including controls and procedures designed to ensure that such information is accumulated and communicated to the Company’s management as appropriate to allow timely decisions regarding required disclosure. The Company and its subsidiaries have carried out evaluations of the effectiveness of their disclosure controls and procedures as required by Rule 13a-15 of the Exchange Act.

  • Plan Document Controls The rights granted under this Agreement are in all respects subject to the provisions set forth in the Plan to the same extent and with the same effect as if set forth fully in this Agreement. If the terms of this Agreement conflict with the terms of the Plan document, the Plan document will control.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Internal Controls The Company shall maintain a system of internal accounting controls sufficient to provide reasonable assurances that: (i) transactions are executed in accordance with management’s general or specific authorization; (ii) transactions are recorded as necessary in order to permit preparation of financial statements in accordance with GAAP and to maintain accountability for assets; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with existing assets at reasonable intervals and appropriate action is taken with respect to any differences.

  • Internal Controls and Procedures The Company has established and maintains disclosure controls and procedures and internal control over financial reporting (as such terms are defined in paragraphs (e) and (f), respectively, of Rule 13a-15 under the Exchange Act) as required by Rule 13a-15 under the Exchange Act. The Company’s disclosure controls and procedures are reasonably designed to ensure that all material information required to be disclosed by the Company in the reports that it files or furnishes under the Exchange Act is recorded, processed, summarized and reported within the time periods specified in the rules and forms of the SEC, and that all such material information is accumulated and communicated to the Company’s management as appropriate to allow timely decisions regarding required disclosure and to make the certifications required pursuant to Sections 302 and 906 of the Xxxxxxxx-Xxxxx Act of 2002 (the “Xxxxxxxx-Xxxxx Act”). The Company’s management has completed an assessment of the effectiveness of the Company’s internal controls over financial reporting in compliance with the requirements of Section 404 of the Xxxxxxxx-Xxxxx Act for the year ended December 31, 2010 and such assessment concluded that such controls were effective. Based on its most recent evaluation of internal controls over financial reporting prior to the date hereof, management of the Company has disclosed to the Company’s auditors and the audit committee of the Company Board (i) any significant deficiencies and material weaknesses in the design or operation of internal controls over financial reporting that are reasonably likely to adversely affect in any material respect the Company’s ability to report financial information and (ii) any fraud, whether or not material, that involves management or other employees who have a significant role in the Company’s internal control over financial reporting, and each such deficiency, weakness and fraud so disclosed to auditors, if any, has been disclosed to Parent prior to the date hereof.

  • Internal Controls and Compliance with the Xxxxxxxx-Xxxxx Act Except as set forth in the General Disclosure Package, the Company, its subsidiaries and the Company’s Board of Directors (the “Board”) are in compliance with all applicable provisions of Xxxxxxxx-Xxxxx and Exchange Rules. The Company maintains a system of internal controls, including, but not limited to, disclosure controls and procedures, internal controls over accounting matters and financial reporting, an internal audit function and legal and regulatory compliance controls (collectively, “Internal Controls”) that comply with the applicable Securities Laws and are sufficient to provide reasonable assurances that (i) transactions are executed in accordance with management’s general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with U.S. Generally Accepted Accounting Principles (“GAAP”) and to maintain accountability for assets, (iii) access to assets is permitted only in accordance with management’s general or specific authorization, and (iv) the recorded accounting for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. The Internal Controls are, or upon consummation of the offering of the Offered Securities will be, overseen by the Audit Committee (the “Audit Committee”) of the Board in accordance with Exchange Rules. The Company has not publicly disclosed or reported to the Audit Committee or the Board, and within the next 135 days the Company does not reasonably expect to publicly disclose or report to the Audit Committee or the Board, a significant deficiency, material weakness, change in Internal Controls or fraud involving management or other employees who have a significant role in Internal Controls, any violation of, or failure to comply with, the Securities Laws, or any matter which, if determined adversely, would result in a Material Adverse Effect.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!