Physical and Environmental Security Sample Clauses

Physical and Environmental Security. DST shall: (i) restrict entry to DST’s area(s) where Fund Confidential Information is stored, accessed, or processed solely to DST’s personnel or DST authorized third party service providers for such access; and (ii) implement commercially reasonable practices for infrastructure systems, including fire extinguishing, cooling, and power, emergency systems and employee safety.
AutoNDA by SimpleDocs
Physical and Environmental Security. Controls that provide reasonable assurance that access to physical servers at the production data center or the facility housing Provider’s SFTP Server, if applicable, is limited to properly authorized individuals and that environmental controls are established to detect, prevent and control destruction due to environmental extremes. These controls include: a) Logging and monitoring of unauthorized access attempts to the data center by the data center security personnel; b) Camera surveillance systems at critical internal and external entry points to the data center; c) Systems that monitor and control the air temperature and humidity at appropriate levels for the computing equipment; and d) Uninterruptible Power Supply (UPS) modules and backup generators that provide back-up power in the event of an electrical failure.
Physical and Environmental Security. Dell uses a number of technological and operational approaches in its physical security program in regards to risk mitigation. The security team works closely with each site to determine appropriate measures are in place and continually monitor any changes to the physical infrastructure, business, and known threats. It also monitors best practice measures used by others in the industry and carefully selects approaches that meet both uniqueness’s in business practice and expectations of Dell as a whole. Dell balances its approach towards security by considering elements of control that include architecture, operations, and systems.
Physical and Environmental Security. 9.17.6.1 Subrecipient shall take reasonable measures to ensure the physical security of its operating location(s) that handles County Information Assets. Work areas containing computers or source documents should be secured from public access unless Subrecipient's representative is present. When unoccupied during non-operating hours, Subrecipient's facility(ies) shall be locked.
Physical and Environmental Security. Physical and environmental security measures are in place to prevent illegitimate or accidental access, loss or dissemination of data. The Company's services are provided and hosted in several data centres around the world, which the one storing customers’ personal data is among one of the few certified Tier IV in Italy, that is the maximum guarantee that a data centre can offer. All data centres within the supply chain offer complete redundancy of all electrical, cooling and network circuits. All data centres have perimeter lighting as well as a presence detection system with CCTV cameras; the emergency doors are equipped with an alarm. All alarms are concentrated in control rooms. Physical access is regulated and controlled by authorisation, recognition and registration procedures and is limited, thanks to the access control system, to the areas for which an authorisation exists.
Physical and Environmental Security. Dell uses a number of technological and operational approaches in its physical security program in regards to risk mitigation. The security team works closely with each site to determine appropriate measures are in place and continually monitor any changes to the physical infrastructure, business, and known threats. It also monitors best practice measures used by others in the industry and carefully selects approaches that meet both uniqueness’s in business practice and expectations of Dell as a whole. Dell balances its approach towards security by considering elements of control that include architecture, operations, and systems. Communications and Operations Management The IT organization manages changes to the corporate infrastructure, systems and applications through a centralized change management program, which may include, testing, business impact analysis and management approval, where appropriate. Incident response procedures exist for security and data protection incidents, which may include incident analysis, containment, response, remediation, reporting and the return to normal operations. To protect against malicious use of assets and malicious software, additional controls may be implemented, based on risk. Such controls may include, but are not limited to, information security practices and standards; restricted access; designated development and test environments; virus detection on servers, desktops and notebooks; virus email attachment scanning; system compliance scans; intrusion prevention monitoring and response; logging and alerting on key events; information handling procedures based on data type, e-commerce application and network security; and system and application vulnerability scanning. Access Controls Access to corporate systems is restricted, based on procedures to ensure appropriate approvals. To reduce the risk of misuse, intentional or otherwise, access is provided based on segregation of duties and least privileges. Remote access and wireless computing capabilities are restricted and require that both user and system safeguards are in place. Specific event logs from key devices and systems are centrally collected and reported on an exceptions basis to enable incident response and forensic investigations.
Physical and Environmental Security. Controls that provide reasonable assurance that access to physical servers at the data centers housing Covered Data is limited to properly authorized individuals and that environmental controls are established to detect, prevent and control destruction due to environmental extremes.
AutoNDA by SimpleDocs
Physical and Environmental Security. Access to Braze facilities is controlled by 24-hour security. Additionally, all Braze offices are protected by locked access and are under 24-hour video surveillance. All Braze employee workstations are encrypted and password protected, and all Braze employee user accounts require two-factor authentication. Data centers and servers are managed and controlled by our Cloud hosting providers, Rackspace, Microsoft, and Amazon Web Services. Braze employees have no access to any of these data centers. Details regarding the security practices and controls applicable to these facilities can be found at their websites: AWS: xxxxx://xxx.xxxxxx.xxx/security/ Rackspace: xxxx://xxx.xxxxxxxxx.xxx/security/ Microsoft: xxxxx://xxxxx.xxxxxxxxx.xxx/en-us/overview/security/
Physical and Environmental Security. The Transfer Agent shall: (i) restrict entry to the Transfer Agent’s area(s) where Customer Confidential Information is stored, accessed, or processed solely to the Transfer Agent’s personnel or the Transfer Agent authorized third party service providers for such access; and (ii) implement commercially reasonable practices for infrastructure systems, including fire extinguishing, cooling, and power, emergency systems and employee safety.
Physical and Environmental Security. Contractor facilities that process City Data must provide a physically secure environment from unauthorized access, damage, and interference.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!