Common use of Secure Log-on Procedures Clause in Contracts

Secure Log-on Procedures. Supplier shall control user access to operating systems with secure log-on procedures that will display general notice warnings that computers may: (i) only be accessed by authorized accounts; (ii) limit the number of unsuccessful log-on attempts; (iii) enforce recording of unsuccessful attempts; (iv) force time delay before further log-on attempts are allowed; (v) reject any further attempts without specific authorization from an administrator; and (vi) not display the password being entered by hiding the password characters and symbols.

Appears in 3 contracts

Samples: Purchase Order Terms, Purchase Order Terms, Participation Agreement

AutoNDA by SimpleDocs

Secure Log-on Procedures. Supplier shall control user access to operating systems with secure log-on procedures that will display general notice warnings that computers may: (i) may only be accessed by authorized accounts; (ii) , limit the number of unsuccessful log-log- on attempts; (iii) attempts , enforce recording of unsuccessful attempts; (iv) , force time delay before further log-on attempts are allowed; (v) allowed or reject any further attempts without specific authorization from an administrator; , and (vi) not display the password being entered by hiding the password characters and symbols.

Appears in 1 contract

Samples: Participation Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!