Entrance Control. Technical or organisational measures regarding access control, especially regarding legitimation of authorised persons: Due to their respective security requirements, business premises and facilities are subdivided into different security zones with different access authorisations. They are monitored by security personnel. Access for employees is only possible with an encoded ID with a photo on it. All other persons have access only after having registered before (e.g. at the main entrance). Access to special security areas for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security requirements for data centres.
Appears in 2 contracts
Samples: Data Processing Agreement, Data Processing Agreement
Entrance Control. Technical or organisational measures regarding access control, especially regarding legitimation of authorised persons: Due to their respective security requirements, business premises and facilities are subdivided into different security zones with different access authorisations. They are Main entrance is monitored by security personnel. Access for employees is only possible with an encoded ID with a photo on it. All other persons have and through security enabled access only after having registered before (e.g. at the main entrance). Access to special security areas for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security requirements for data centresdoor.
Appears in 1 contract
Samples: Data Processing Agreement
Entrance Control. Technical or organisational measures regarding access control, especially regarding legitimation of authorised persons: Due to their respective security requirements, business premises and facilities are subdivided into different security zones with different access authorisations. They are monitored by security personnel. Access for employees is only possible with an encoded ID with a photo on itpre-approved security fob for building access and key lock for server room access. All other persons have access only after having registered before (e.g. at the main entrance)reception. Access to special security areas for remote maintenance is additionally protected by a separate access area. The constructional and substantive security standards comply with the security requirements for data centres.
Appears in 1 contract
Samples: Data Processing Agreement