Common use of Implement Strong Access Control Measures Clause in Contracts

Implement Strong Access Control Measures. 1.1 All credentials such as User names/identifiers/account numbers (user IDs) and user passwords must be kept confidential and must not be disclosed to an unauthorized party. No one from ACRAnet will ever contact you and request your credentials. 1.2 If using third party or proprietary system to access ACRAnet’s systems, ensure that the access must be preceded by authenticating users to the application and/or system (e.g. application based authentication, Active Directory, etc.) utilized for accessing ACRAnet data/systems. 1.3 If the third party or third party software or proprietary system or software, used to access ACRAnet data/systems, is replaced or no longer in use, the passwords should be changed immediately. 1.4 Create a unique user ID for each user to enable individual authentication and accountability for access to ACRAnet’s infrastructure. Each user of the system access software must also have a unique logon password. 1.5 User IDs and passwords shall only be assigned to authorized individuals based on least privilege necessary to perform job responsibilities. 1.6 User IDs and passwords must not be shared, posted, or otherwise divulged in any manner. 1.7 Develop strong passwords that are:  Not easily guessable (i.e. your name or company name, repeating numbers and letters or consecutive numbers and letters)  Contain a minimum of eight (8) alphabetic and numeric characters for standard user accounts  For interactive sessions (i.e. non system-to-system) ensure that passwords/passwords are changed periodically (every 90 days is recommended) 1.8 Passwords (e.g. user/account password) must be changed immediately when:  Any system access software is replaced by another system access software or is no longer used  The hardware on which the software resides is upgraded, changed or disposed  Any suspicion of password being disclosed to an unauthorized party (see section 4.3 for reporting requirements) 1.9 Ensure that passwords are not transmitted, displayed or stored in clear text; protect all end user (e.g. internal and external) passwords using, for example, encryption or a cryptographic hashing algorithm also known as “one-way” encryption. When using encryption, ensure that strong encryption algorithm are utilized (e.g. AES 256 or above). 1.10 Implement password protected screensavers with a maximum fifteen (15) minute timeout to protect unattended workstations. Systems should be manually locked before being left unattended. 1.11 Active logins to credit information systems must be configured with a 30 minute inactive session timeout. 1.12 Ensure that personnel who are authorized access to credit information have a business need to access such information and understand these requirements to access such information are only for the permissible purposes listed in the Permissible Purpose Information section of the membership application. 1.13 Company must NOT install Peer-to-Peer file sharing software on systems used to access, transmit or store Experian data. 1.14 Ensure that Company employees do not access their own credit reports or those reports of any family member(s) or friend(s) unless it is in connection with a credit transaction or for another permissible purpose. 1.15 Implement a process to terminate access rights immediately for users who access Experian credit information when those users are terminated or when they have a change in their job tasks and no longer require access to that credit information. 1.16 Implement a process to perform periodic user account reviews to validate whether access is needed as well as the privileges assigned. 1.17 Implement a process to periodically review user activities and account usage, ensure the user activities are consistent with the individual job responsibility, business need, and in line with contractual obligations. 1.18 Implement physical security controls to prevent unauthorized entry to Company’s facility and access to systems used to obtain credit information. Ensure that access is controlled with badge readers, other systems, or devices including authorized lock and key.

Appears in 8 contracts

Samples: Client Service Agreement, Client Service Agreement, Client Service Agreement

AutoNDA by SimpleDocs

Implement Strong Access Control Measures. 1.1 All credentials such as User names/identifiers/account numbers (user IDs) and user passwords must be kept confidential and must not be disclosed to an unauthorized party. No one from ACRAnet will ever contact you and request your credentials. 1.2 If using third party or proprietary system to access ACRAnet’s systems, ensure that the access must be preceded by authenticating users to the application and/or system (e.g. application based authentication, Active Directory, etc.) utilized for accessing ACRAnet data/systems. 1.3 If the third party or third party software or proprietary system or software, used to access ACRAnet data/systems, is replaced or no longer in use, the passwords should be changed immediately. 1.4 Create a unique user ID for each user to enable individual authentication and accountability for access to ACRAnet’s infrastructure. Each user of the system access software must also have a unique logon password. 1.5 User IDs and passwords shall only be assigned to authorized individuals based on least privilege necessary to perform job responsibilities. 1.6 User IDs and passwords must not be shared, posted, or otherwise divulged in any manner. 1.7 Develop strong passwords that are: Not easily guessable (i.e. your name or company name, repeating numbers and letters or consecutive numbers and letters) Contain a minimum of eight (8) alphabetic and numeric characters for standard user accounts For interactive sessions (i.e. non system-to-system) ensure that passwords/passwords are changed periodically (every 90 days is recommended) 1.8 Passwords (e.g. user/account password) must be changed immediately when: Any system access software is replaced by another system access software or is no longer used The hardware on which the software resides is upgraded, changed or disposed Any suspicion of password being disclosed to an unauthorized party (see section 4.3 for reporting requirements) 1.9 Ensure that passwords are not transmitted, displayed or stored in clear text; protect all end user (e.g. internal and external) passwords using, for example, encryption or a cryptographic hashing algorithm also known as “one-way” encryption. When using encryption, ensure that strong encryption algorithm are utilized (e.g. AES 256 or above). 1.10 Implement password protected screensavers with a maximum fifteen (15) minute timeout to protect unattended workstations. Systems should be manually locked before being left unattended. 1.11 Active logins to credit information systems must be configured with a 30 minute inactive session timeout. 1.12 Ensure that personnel who are authorized access to credit information have a business need to access such information and understand these requirements to access such information are only for the permissible purposes listed in the Permissible Purpose Information section of the membership application. 1.13 Company must NOT install Peer-to-Peer file sharing software on systems used to access, transmit or store Experian data. 1.14 Ensure that Company employees do not access their own credit reports or those reports of any family member(s) or friend(s) unless it is in connection with a credit transaction or for another permissible purpose. 1.15 Implement a process to terminate access rights immediately for users who access Experian credit information when those users are terminated or when they have a change in their job tasks and no longer require access to that credit information. 1.16 Implement a process to perform periodic user account reviews to validate whether access is needed as well as the privileges assigned. 1.17 Implement a process to periodically review user activities and account usage, ensure the user activities are consistent with the individual job responsibility, business need, and in line with contractual obligations. 1.18 Implement physical security controls to prevent unauthorized entry to Company’s facility and access to systems used to obtain credit information. Ensure that access is controlled with badge readers, other systems, or devices including authorized lock and key.

Appears in 4 contracts

Samples: Client Service Agreement, Client Service Agreement, Client Service Agreement

Implement Strong Access Control Measures. 1.1 All credentials such as User names/identifiers/account numbers (user IDs) and user passwords must be kept confidential and must not be disclosed to an unauthorized party. No one from ACRAnet will ever contact you and request your credentials. 1.2 If using third party or proprietary system to access ACRAnet’s CISCO Credit systems, ensure that the access must be preceded by authenticating users to the application and/or system (e.g. application based authentication, Active Directory, etc.) utilized for accessing ACRAnet our data/systems. 1.3 If the third party or third party software or proprietary system or software, used to access ACRAnet CISCO Credit data/systems, is replaced or no longer in use, the passwords should be changed immediately. 1.4 Create a unique user ID for each user to enable individual authentication and accountability for access to ACRAnet’s CISCO Credit infrastructure. Each user of the system access software must also have a unique logon password. 1.5 User IDs and passwords shall only be assigned to authorized individuals based on least privilege necessary to perform job responsibilities. 1.6 User IDs and passwords must not be shared, posted, or otherwise divulged in any manner. 1.7 Develop strong passwords that are:  Not easily guessable (i.e. your name or company name, repeating numbers and letters or consecutive numbers and letters)  Contain a minimum of eight (8) alphabetic and numeric characters for standard user accounts  For interactive sessions (i.e. non system-to-system) ensure that passwords/passwords are changed periodically (every 90 days is recommended) 1.8 Passwords (e.g. user/account password) must be changed immediately when:  Any system access software is replaced by another system access software or is no longer used  The hardware on which the software resides is upgraded, changed or disposed  Any suspicion of password being disclosed to an unauthorized party (see section 4.3 for reporting requirements) 1.9 Ensure that passwords are not transmitted, displayed or stored in clear text; protect all end user (e.g. internal and external) passwords using, for example, encryption or a cryptographic 03/2016 CISCO Credit Public Page 1 of 10 Reseller ASR for End Users hashing algorithm also known as “one-way” encryption. When using encryption, ensure that strong encryption algorithm are utilized (e.g. AES 256 or above). 1.10 Implement password protected screensavers with a maximum fifteen (15) minute timeout to protect unattended workstations. Systems should be manually locked before being left unattended. 1.11 Active logins to credit information systems must be configured with a 30 minute inactive session timeout. 1.12 Ensure that personnel who are authorized access to credit information have a business need to access such information and understand these requirements to access such information are only for the permissible purposes listed in the Permissible Purpose Information section of the membership application. 1.13 Company must NOT install Peer-to-Peer file sharing software on systems used to access, transmit or store Experian data. 1.14 Ensure that Company employees do not access their own credit reports or those reports of any family member(s) or friend(s) unless it is in connection with a credit transaction or for another permissible purpose. 1.15 Implement a process to terminate access rights immediately for users who access Experian credit information when those users are terminated or when they have a change in their job tasks and no longer require access to that credit information. 1.16 Implement a process to perform periodic user account reviews to validate whether access is needed as well as the privileges assigned. 1.17 Implement a process to periodically review user activities and account usage, ensure the user activities are consistent with the individual job responsibility, business need, and in line with contractual obligations. 1.18 Implement physical security controls to prevent unauthorized entry to Company’s facility and access to systems used to obtain credit information. Ensure that access is controlled with badge readers, other systems, or devices including authorized lock and key.

Appears in 1 contract

Samples: Credit Reporting Services Agreement

AutoNDA by SimpleDocs

Implement Strong Access Control Measures. 1.1 All credentials such as Subscriber Code number, Subscriber Code passwords, User names/identifiers/account numbers identifiers (user IDs) and user passwords must be kept confidential and must not be disclosed to an unauthorized party. No one from ACRAnet Experian will ever contact you and request your credentials. 1.2 If using third party or proprietary system to access ACRAnetExperian’s systems, ensure that the access must be preceded by authenticating users to the application and/or system (e.g. application based authentication, Active Directory, etc.) utilized for accessing ACRAnet Experian data/systems. 1.3 If the third party or third party software or proprietary system or software, used to access ACRAnet Experian data/systems, is replaced or no longer in use, the passwords should be changed immediately. 1.4 Create a unique user ID for each user to enable individual authentication and accountability for accountabilityfor access to ACRAnetExperian’s infrastructure. Each user of the system access software must also have a unique logon password. 1.5 User IDs and passwords shall only be assigned to authorized individuals based on least privilege necessary to perform job responsibilities. 1.6 User IDs and passwords must not be shared, posted, or otherwise divulged in any manner. 1.7 Develop strong passwords that are: Not easily guessable (i.e. your name or company name, repeating numbers and letters or consecutive numbers and letters) Contain a minimum of eight (8) alphabetic and numeric characters for standard user accounts For interactive sessions (i.e. non system-to-system) ensure that passwords/passwords are changed periodically (every 90 days is recommended) 1.8 Passwords (e.g. user/account subscriber code passwords, user password) must be changed immediately when: Any system access software is replaced by another system access software or is no longer used The hardware on which the software resides is upgraded, changed or disposed Any suspicion of password being disclosed to an unauthorized party (see section 4.3 for reporting requirements) 1.9 Ensure that passwords are not transmitted, displayed or stored in clear text; protect all end user (e.g. internal and external) passwords using, for example, encryption or a cryptographic hashing algorithm also known as “one-way” encryption. When using encryption, ensure that strong encryption algorithm are utilized (e.g. AES 256 or above). 1.10 Implement password protected screensavers with a maximum fifteen (15) minute timeout to protect unattended workstations. Systems should be manually locked before being left unattended. 1.11 Active logins to credit information systems must be configured with a 30 minute inactive session timeout. 1.12 Ensure that personnel who are authorized access to credit information have a business need to access such information and understand these requirements to access such information are only for the permissible purposes listed in the Permissible Purpose Information section of the membership application. 1.13 Company must NOT install Peer-to-Peer file sharing software on systems used to access, transmit or store Experian data. 1.14 Ensure that Company employees do not access their own credit reports or those reports of any family member(s) or friend(s) unless it is in connection with a credit transaction or for another permissible purpose. 1.15 Implement a process to terminate access rights immediately for users who access Experian credit information when those users are terminated or when they have a change in their job tasks and no longer require access to that credit information. 1.16 Implement a process to perform periodic user account reviews to validate whether access is needed as well as the privileges assigned. 1.17 Implement a process to periodically review user activities and account usage, ensure the user activities are consistent with the individual job responsibility, business need, and in line with contractual obligations. 1.18 Implement physical security controls to prevent unauthorized entry to Company’s facility and access to systems used to obtain credit information. Ensure that access is controlled with badge readers, other systems, or devices including authorized lock and key.

Appears in 1 contract

Samples: Technical Provider Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!