Endpoint Controls. Xxxxxx has implemented different security controls on end-user devices and monitors the devices to be in compliance with security standards, some of the security controls implemented are: hard drive encryption, requiring password during login, lock screen, antivirus software, firewall and appropriate patch levels. Xxxxxx will securely sanitize the hard drive prior reuse and will securely destroy the media that will not be used anymore. Xxxxxx logically separates its endpoints and end user environment from the other Xxxxxx environment. Multi-factor authentication is required to access the AWS environment.
Appears in 5 contracts
Samples: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement