Entry control Sample Clauses

Entry control. Technical and organizational measures to monitor whether Student Data have been entered, changed or removed (deleted), and by whom, from data processing systems, include: ●Logging and reporting systems; and ●Audit trails and documentation.
AutoNDA by SimpleDocs
Entry control. Technical and organizational measures to monitor whether data have been entered, changed or removed (deleted), and by whom, from data processing systems, include: • Logging and reporting systems; • Audit trails and documentation.
Entry control. Control of the entry to the premises of data processing systems (DP system) by unauthorised persons. Entry control must prevent persons who are not authorised from being able to get near a DP system. The DP systems include, in addition to the central unit including the integrated drives, the connected peripheral units such as terminals, PCs, printers, plotter and tape units, etc. Also included are the end devices used for remote access. Entry control to PCs within office spaces is ensured, e.g. by measures that are taken to prevent customers from getting near the PCs or being able to view the screen. Measures to meet the protection objectives Entry regulation for persons outside of the company; the implementation is carried out by the following points: • Regulations for entry by external persons • Logging of the arrival and departure of non-company personsAvailability of central reception area (gatekeeper/reception) • Issuance of visitors ID • Presence of non-company personnel anywhere in the company building only in the presence of employees • Return of access equipment after the authorisation has expired Entry regulation for company personnel; the implementation is carried out by the following points: • Determination of persons authorised to enter, including the scope of the authorisations, for physical access to relevant rooms/security areas • Issuance of entry authorisation cards (e.g. chip card with logging) • Logging of employees’ arrival and departure Determination of persons authorised to enter the computer/server room Measures so that only authorised entry to the computer/server room occurs Provision of lockable cabinets/rolling containers for employees Key control if keys are used, (locked doors; issue keys only to authorised persons; storage and use of a general key) Measures for object protection (e.g. protection of ducts and windows; area monitoring) Secured entrance (e.g. locking system, ID reader) Burglar resistance window
Entry control. The rooms in which personal data are processed or data processing systems are installed may not be freely accessible. They must be locked when employees are away. Entry authorizations must be assigned in a regulated procedure on a need-to-know basis and are generally monitored in terms of whether they are necessary. Rooms in which data processing systems (datacenter, server, network distributor, etc.) are located must have particular entry protections and may be accessible only to employees in IT administration (management, if necessary). Alternately, the devices must be stored in suitable and locked cabinets. Visitors and non-company individuals must be registered in a documented procedure and monitored while visiting the offices.
Entry control. Entry to buildings, rooms, and facilities in which Customer Personal Data is collected, processed or used, will be restricted to authorized persons. To ensure secure entry to company buildings and rooms, and the identification of authorized persons, Entco will deploy and use effective and appropriate access controls such as electronic smart cards, door locking systems, and technical surveillance equipment. Such controls will be at the individual person level as appropriate. Furthermore, appropriate and effective surveillance equipment such as video and alarm systems will be installed.
Entry control. The rooms in which personal data are processed or data processing systems are installed may not be freely accessible. They must be locked when employees are away. Entry authorizations must be assigned in a regulated procedure on a need-to-know basis and are generally monitored in terms of whether they are necessary. Rooms in which data processing systems (datacenter, server, network distributor, etc.) are located must have particular entry protections and may be accessible only to employees in IT administration (management, if necessary). Alternately, the devices must be stored in suitable and locked cabinets. Visitors and non-company individuals must be registered in a documented procedure and monitored while visiting the offices. The company has implemented the requirement as follows: Locked building Locked offices Electronic security locking system Mechanical security locking system Documented key assignment process Visitor registration Area-dependent authorization IDs Locked server rooms with electronic entry control Locked server cabinets Alarm system for building / offices Alarm system for server room Electronic entry control
Entry control. Approx. 20 m2 Installation with private sanitary services, sanitary services for trucker drivers in waiting time, and control and documentation room of access of trucks, private and staff vehicles.
AutoNDA by SimpleDocs
Entry control. Seatti does not have its own physical facilities for storing or processing data. Data processing facilities are utilized by established third party vendors as previously described. No personal data is ever stored on any equipment other than that of the third party vendors. Therefore, physical access to terminal equipment or any other hardware under Seatti's jurisdiction is not relevant to the protection of Personal Data. AWS as a data center offers extensive security measures for compliance with the GDPR. Several standards are implemented, including ISO 27001 for technical measures, ISO 27017 for cloud security, and ISO 27018 for cloud privacy. In the AWS GDPR DPA, AWS provides further assurances: ▪ Data is processed exclusively in the precisely instructed manner ▪ AWS maintains detailed technical and organizational measuresIn the event of security incidents, AWS customers are notified of incidents as soon as they become aware of them Access control to AWS data centers and all other technical and organizational measures implemented by AWS are detailed at xxxxx://xxx.xxxxxx.xxx/de/compliance/data- center/controls/.
Entry control. Unauthorised persons should be denied access to rooms containing data processing equipment. Definition of security areas • Realisation of effective access protection • Logging of access • Determination of persons with access authorisationManagement of personal access authorisations • Accompaniment of external personnel • Monitoring the rooms
Entry control. Seatti does not have its own physical facilities for storing or processing data. Data pro- cessing facilities are utilized by established third party vendors as previously described. No personal data is ever stored on any equipment other than that of the third party vendors. Therefore, physical access to terminal equipment or any other hardware under Seatti's juris- diction is not relevant to the protection of Personal Data. Azure as a data center offers extensive security measures for compliance with the GDPR. Several standards are implemented, including ISO 27001 for technical measures, ISO 27017 for cloud security, and ISO 27018 for cloud privacy. In the Azure GDPR DPA, Azure provides further assurances: ▪ Data is processed exclusively in the precisely instructed manner ▪ Azure maintains detailed technical and organizational measuresIn the event of security incidents, Azure customers are notified of incidents as soon as they become aware of them Access control to Azure data centers and all other technical and organizational measures im- plemented by Azure are detailed at Physical security of Azure datacenters - Microsoft Azure
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!