Operating System Access Control. To protect against unauthorized access or misuse of Company Data or Confidential Information residing on Supplier Information Processing Systems, Supplier will: (a) Ensure that access to operating systems is controlled by a secure log-on procedure; (b) Ensure that Supplier Information Processing System users have a unique identifier (user ID); (c) Ensure that the use of utility programs that are capable of overriding system and application controls are highly restricted and tightly controlled. Ensure that inactive sessions are shut down after a defined period of inactivity; and (d) Employ restrictions on connection times to provide additional security for high risk applications.
Appears in 4 contracts
Samples: Global Services Agreement, Global Services Agreement, Global Services Agreement