Physical Access to Facilities i. The Contractor limits access to facilities where systems that process personal data are located to authorized individuals.
ii. Access is controlled through key card and/or appropriate sign-in procedures for facilities with systems processing personal data. Each personnel must be registered and is required to carry an access control pass.
iii. A security alarm system or other appropriate security measures shall be in place in facilities processing Personal Data where practicable, to provide alerts of security intrusions after normal working hours.
Physical Access to Facilities. The Data Importer limits access to facilities where information systems that process customer data are located to identified authorized individuals who require such access for the performance of their job function. Data Importer terminates the physical access of individuals promptly following the date of the termination of their employment or services or their transfer to a role no longer requiring access to customer data.
Physical Access to Facilities. A. Cisco shall limit access to facilities where systems that Process Protected Data are lo- cated to authorized individuals.
B. Security perimeters shall be defined and used to protect areas that contain both sensitive or critical information and information processing facilities.
C. Facilities shall be monitored and access-controlled at all times (24x7).
D. Access shall be controlled through key card and/or appropriate sign-in procedures for fa- cilities with systems Processing Protected Data. Cisco must register personnel and re- quire them to carry appropriate identification badges.
Physical Access to Facilities. Jamf will limit access to facilities where systems that are involved in providing the Services are located to identified personnel, agents, and contractors.
Physical Access to Facilities. Acuity limits access to facilities where information systems that process Customer Data are located to identified and authorized individuals.
Physical Access to Facilities. 4.1. The Supplier shall ensure that Supplier Personnel job descriptions define where they may and may not work within the Suppliers Facilities and/or Company’s Facilities, as relevant. The Supplier shall ensure that it puts in place and operates physical access control mechanisms to prevent Supplier Personnel entering areas within the Supplier’s Facilities or Company’s Facilities, as relevant, that they are not authorised to enter.
4.2. The Supplier shall provide appropriate and adequate physical access control mechanisms to ensure that only properly authorised Supplier Personnel will have physical access to those parts of their Supplier Facilities or Systems Environment that host, support or maintain the Company’s own Systems Environment or Company Information.
4.3. The Supplier will ensure that physical access controls mechanisms within their facilities for communications rooms, server rooms or any rooms providing connectivity or transport for the Company’s Information shall prevent unauthorised Supplier Personnel from entering or accessing Company’s Systems Environment, and/or Company Information by using multiple factor authentication. Multiple Factor Authentication means a system of authentication using three or more unique unrelated elements of identity. This could be a password, a username, another unique identifier such as a biometric e.g. Iris scan, fingerprint.
4.4. The Supplier shall ensure that only Supplier Personnel authorised to service, maintain or support the Company’s Systems Environment and/ or Company Information shall be permitted access to those parts of the Supplier’s Facilities and/or Supplier’s Systems Environment that host the Company’s Systems Environment.
4.5. The Supplier shall ensure that any third party requiring access to provide support or maintenance for any equipment that is directly or indirectly involved in providing the Service shall be logged into and out of the Supplier’s Facilities including the reason for their visit and the responsible member of Supplier Personnel and shall be escorted by the Supplier at all times.
4.6. The Supplier will ensure that written logs will be maintained of access to those parts of the Supplier’s Facilities that host the Company’s Systems Environment and/or Company Information. The Supplier will monitor these logs and any breaches of their physical security shall be immediately notified to the Company.
Physical Access to Facilities. The Contractor limits access to facilities where systems that process personal data are located to authorized individuals.
Physical Access to Facilities. 4.4.1.1. Vertice shall limit access to facilities where systems that process Data are located to authorised individuals.
4.4.1.2. Security perimeters shall be defined and used to protect areas that contain both sensitive or critical information and information processing facilities.
4.4.1.3. Facilities shall be monitored and access-controlled at all times (24x7).
4.4.1.4. Access shall be controlled through key card and/or appropriate sign-in procedures for facilities with systems processing Data. Vertice must register authorised individuals and require them to carry appropriate identification badges.
Physical Access to Facilities. A. Supplier shall limit access to facilities where systems that Process Protected Data are located to authorized individuals.
B. Security perimeters shall be defined and used to protect areas that contain Protected Data and Processing facilities.
C. Facilities shall be monitored and access-controlled at all times (24x7).
D. Access shall be controlled through key card and/or appropriate sign-in procedures for facilities with systems Processing Protected Data. Supplier must register personnel and require them to carry appropriate identification badges.
Physical Access to Facilities a. FM:Systems limits access to facilities where systems that process personal data are located to authorized individuals.
b. Access is controlled through key card and/or appropriate sign-in procedures for facilities with systems processing personal data. Personnel must be registered and are required to carry appropriate identification badges.
c. A security alarm system or other appropriate security measures shall be in place to provide alerts of security intrusions after normal working hours.