Input Controls. The Contractor shall warrant that it can be subsequently verified and established whether and by whom personal data have been input, modified or removed in data processing systems. This shall be done by: ● central logging and log evaluation systems ● each employee having only the necessary access to the data required within the scope of his or her function/role (principle of minimum rights) ● application-level firewalls and intrusion detection systems being used to prevent and detect attacks
Appears in 4 contracts
Samples: datavirtuality.com, pipes.datavirtuality.com, pipes.datavirtuality.com