Secure Areas. Supplier will secure all areas, including loading docks, holding areas, telecommunications areas, cabling areas and off-site areas that contain Information Processing Systems or media containing Confidential Information by the use of appropriate security controls in order to ensure that only authorized personnel are allowed access and to prevent damage and interference. The following controls will be implemented: (a) Access will be controlled and restricted by use of a defined security perimeter, appropriate security barriers, entry controls and authentication controls. A record of all accesses will be securely maintained; (b) All personnel will be required to wear some form of visible identification to identify them as employees, Suppliers, visitors, et cetera; (c) Visitors to secure areas will be supervised, or cleared for non-escorted accessed via an appropriate background check. Their date and time of entry and departure will be recorded; and (d) Physically secure and maintain control over all paper and electronic media (e.g., computers, electronic media, paper receipts, paper reports, and faxes) that contain Company Data.
Appears in 4 contracts
Samples: Global Services Agreement, Global Services Agreement, Global Services Agreement
Secure Areas. Supplier Provider will secure all areas, including loading docks, holding areas, telecommunications areas, cabling areas and off-site areas that contain Information Processing Systems or media containing Recipient Confidential Information by the use of appropriate security controls in order to ensure that only authorized personnel are allowed access and to prevent damage and interference. The following controls will be implemented:
(a) 7.1.1 Access will be controlled and restricted by use of a defined security perimeter, appropriate security barriers, entry controls and authentication controls. A record Records of all accesses access will be securely maintained;.
(b) 7.1.2 All personnel will be required to wear some form of visible identification to identify them as employees, Supplierscontractors, visitors, et cetera;.
(c) 7.1.3 Visitors to secure areas will be supervised, or cleared for non-escorted accessed via an appropriate background check. Their date and time of entry and departure will be recorded; and.
(d) 7.1.4 Physically secure and maintain control over all paper and electronic media (e.g., computers, electronic media, paper receipts, paper reports, and faxes) that contain Company Recipient Production Data.
Appears in 2 contracts
Samples: Transition Services Agreement, Transition Services Agreement (ADT Corp)