Measures for user identification and authorization Sample Clauses

Measures for user identification and authorization. Requiring two-factor authentication for remote access into systems which house Subscriber Data; • Blocking access to user accounts after multiple unsuccessful attempts to gain access; • Implementation of controls such as VPN access requirements, multi-factor authentication requirements, user access provisioning and de-provisioning tools and processes to help prevent a third party from accessing, using or disclosing Subscriber Data except as specifically authorized in the Agreement or as otherwise approved by Subscriber.
AutoNDA by SimpleDocs
Measures for user identification and authorization. 5) Measures for the protection of data during transmission;
Measures for user identification and authorization. ○ Lxxxx has Implemented stringent user identification and authorization procedures. ○ Lixte uses unique user IDs and robust authentication methods to prevent unauthorized access. Clinical Trial Agreement
Measures for user identification and authorization. Internal policies and procedures on user accounts and user access requests. • User access control, user authentication. • Access granted based on a need-to-know. • Logging of user activity and data change.
Measures for user identification and authorization. A. User has procedures in place to authenticate and respond to requests from Data Subjects who have submitted rights requests (e.g., access, portability, erasure), and such procedures comply with Data Protection Laws. B. User has operational and technical controls in place to ensure appropriate system access control with respect to Shared Personal Data and related infrastructure, such that only authorized personnel are granted access based on a “need to know” (and that unauthorized current or former personnel cannot improperly access such systems). 8.
Measures for user identification and authorization. ● Employee identity is controlled by a central team, members of which prescribe role identity to an external Google Suite system; ● Customer identity is managed by the Application with limited access of customer identifying information to the Support, Customer Success, and Technology team. All sensitive information is encrypted within the application.

Related to Measures for user identification and authorization

  • Authority and Authorization Each of the Consultants has full power and authority to enter into this Plan and carry out the obligations hereunder. Execution of this Plan and performance by the Consultants hereunder constitutes a valid and binding obligation of the Consultants and performance hereunder will not violate any other agreement to which any of the Consultants is a party.

  • Organization and Authority The Subscriber is a Delaware limited liability company, validly existing and in good standing under the laws of Delaware and possesses all requisite power and authority necessary to carry out the transactions contemplated by this Agreement. Upon execution and delivery by you, this Agreement is a legal, valid and binding agreement of Subscriber, enforceable against Subscriber in accordance with its terms, except as such enforceability may be limited by applicable bankruptcy, insolvency, fraudulent conveyance or similar laws affecting the enforcement of creditors’ rights generally and subject to general principles of equity (regardless of whether enforcement is sought in a proceeding at law or in equity).

  • Card Information Updates and Authorizations If you have authorized a merchant to xxxx charges to your card on a recurring basis, it is your responsibility to notify the merchant in the event your card is replaced, your card information (such as card number and expiration date) changes, or the account associated with your card is closed. However, if your card is replaced or card information changes, you authorize us, without obligation on our part, to provide the updated card information to the merchant in order to permit the merchant to xxxx recurring charges to the card. You authorize us to apply such recurring charges to the card until you notify us that you have revoked authorization for the charges to your card. Your card is automatically enrolled in an information updating service. Through this service, your updated card information (such as card number and expiration date) may be shared with participating merchants to facilitate continued recurring charges. Updates are not guaranteed before your next payment to a merchant is due. You are responsible for making direct payment until recurring charges resume. To revoke your authorization allowing us to provide updated card information to a merchant, please contact us.

  • Data Ownership and Authorized Access 1. Student Data Property of LEA. All Student Data transmitted to the Provider pursuant to the Service Agreement is and will continue to be the property of and under the control of the LEA. The Provider further acknowledges and agrees that all copies of such Student Data transmitted to the Provider, including any modifications or additions or any portion thereof from any source, are subject to the provisions of this DPA in the same manner as the original Student Data. The Parties agree that as between them, all rights, including all intellectual property rights in and to Student Data contemplated per the Service Agreement, shall remain the exclusive property of the LEA. For the purposes of FERPA, the Provider shall be considered a School Official, under the control and direction of the LEA as it pertains to the use of Student Data, notwithstanding the above.

  • Organization; Power and Authority The Company is a corporation duly organized, validly existing and in good standing under the laws of its jurisdiction of incorporation, and is duly qualified as a foreign corporation and is in good standing in each jurisdiction in which such qualification is required by law, other than those jurisdictions as to which the failure to be so qualified or in good standing could not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. The Company has the corporate power and authority to own or hold under lease the properties it purports to own or hold under lease, to transact the business it transacts and proposes to transact, to execute and deliver this Agreement and the Notes and to perform the provisions hereof and thereof.

  • Consent to Emails and Automated Text Messages By participating as a User, you represent that you are the owner of the email address, mobile phone number, and/or other alias you enrolled, or that you have the delegated legal authority to act on behalf of the owner of such email address, mobile phone number and/or other alias to send or receive money as described in this Agreement. You consent to the receipt of emails or text messages from us, from Zelle, from other Users that are sending you money or requesting money from you, and from other Network Banks or their agents regarding the Services or related transfers between Network Banks and you. You agree that we may, Zelle may or either of our agents may use automatic telephone dialing systems in connection with text messages sent to any mobile phone number you enroll. You further acknowledge and agree:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!