System Access Controls. Data Processor shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Zendesk takes reasonable measures to prevent Service Data from being used without authorisation.
System Access Controls. Our Sub-processors will take reasonable measures to prevent Service Data from being used without authorisation. These controls shall vary based on the nature of the processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorisation processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Aircall shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factors authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. Q4, as a Data Processor, shall take reasonable measures to prevent Personal Data from being used without authorization. These controls shall vary based on the nature of the Processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.
System Access Controls. Third-party service providers shall take reasonable measures to prevent data processing systems from being used without authorization. These controls shall vary based on the nature of processing undertaken and may include, among other controls, authentication via passwords and/or two-factor authentication, documented authorization processes, documented change management processes, and/or logging of access on several levels.
System Access Controls data importer shall take reasonable measures to prevent personal data from being used without authorization. These controls shall vary based on the nature of the processing undertaken and may include, among other controls, authentication via passwords and/or two- factor authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.
System Access Controls. In order to access personal data, a documented, role-based authorisation concept must be in place that restricts access to the data so that only authorised persons can access the personal data neces- sary for their task (minimum principle). The password regulations from access control must also be implemented as part of access control. Administrative activities must be restricted to a small group of administrators. The activities of the administrators must be monitored and logged within the framework of technically justifiable expenditure.
System Access Controls. 3.1. System access is based on the principle of least privilege, i.e., Submittable restricts access to Personal Information to only those individuals who require such access to perform their job function.
3.2. System access is revoked immediately upon employment termination or other change resulting in an individual no longer needing such access.
3.3. Management conducts quarterly review of accounts, system access, and permission levels.
System Access Controls. Couchbase shall take reasonable measures to prevent unauthorized use of the systems used for processing Customer Data. These controls shall vary based on the nature of the processing undertaken and may include, among other controls, strong authentication, documented authorization processes, documented change management processes and/or, logging of access on several levels.