Common use of Entrance Control Clause in Contracts

Entrance Control. Technical or organisational measures regarding access control, especially regarding legitimation of authorised persons: Due to their respective security requirements, business premises and facilities are subdivided into different security zones with different access authorisations. They are monitored by security personnel. Access for employees is only possible with an encoded ID with a photo on it. All other persons have access only after having registered before (e.g. at the main entrance). Access to special security areas for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security requirements for data centres.

Appears in 2 contracts

Samples: Data Processing Agreement, Data Processing Agreement

AutoNDA by SimpleDocs

Entrance Control. Technical or organisational measures regarding access control, especially regarding legitimation of authorised persons: Due to their respective security requirements, business premises and facilities are subdivided into different security zones with different access authorisations. They are Main entrance is monitored by security personnel. Access for employees is only possible with an encoded ID with a photo on it. All other persons have and through security enabled access only after having registered before (e.g. at the main entrance). Access to special security areas for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security requirements for data centresdoor.

Appears in 1 contract

Samples: Data Processing Agreement

AutoNDA by SimpleDocs

Entrance Control. Technical or organisational measures regarding access control, especially regarding legitimation of authorised persons: Due to their respective security requirements, business premises and facilities are subdivided into different security zones with different access authorisations. They are monitored by security personnel. Access for employees is only possible with an encoded ID with a photo on itpre-approved security fob for building access and key lock for server room access. All other persons have access only after having registered before (e.g. at the main entrance)reception. Access to special security areas for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security requirements for data centres.

Appears in 1 contract

Samples: Data Processing Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!