Technical Security Measures. The HTL ISMS defines rigorous policies in respect to mobile security and requires mobile devices (laptops, mobile computers, PDAs, mobile phones, USB sticks and other similar memory devices) to have: (i) password protection, (ii) where appropriate/possible and to be encrypted, (iii) the most recent operating system and application security-related patches, fixes and updates installed.
Technical Security Measures. 1.1 Delightex carries out regularly - and at least annually - an assessment of whether procedures, policies and records of processing activities must be updated.
Technical Security Measures. 2.2.1 ACCESS ADMINISTRATION. Access to the Connected Operations Product by ServiceNow employees and contractors is protected by authentication and authorization mechanisms. User authentication is required to gain access to the Connected Operations Product. Access privileges are based on job requirements and are revoked upon termination of employment or consulting relationships. Production infrastructure includes appropriate user account and password controls (e.g., complex passwords with expiration dates, and a two-factored authenticated connection) and is accessible for administration.
Technical Security Measures. 2.2.1. ACCESS ADMINISTRATION. Access to the Subscription Service by Kensu employees and contractors is protected by authentication and authorization mechanisms. User authentication is required to gain access to production and sub-production instances. Access privileges are based on job requirements and are revoked upon termination of employment or consulting relationships. Production infrastructure includes appropriate user account and password controls (e.g., the required use of VPN connections, complex passwords with expiration dates, and a two-factored authenticated connection) and is accessible for administration.
Technical Security Measures. Supplier shall throughout its Processing of Everest Group Personal Data:
Technical Security Measures. (a) Access Administration. Access to the Subscription Service by ServiceNow employees and contractors is protected by authentication and authorization mechanisms. User authentication is required to gain access to production and sub-production systems. Access privileges are based on job requirements and are revoked upon termination of employment or consulting relationship. Production infrastructure includes appropriate user account and password controls (for example, the required use of virtual private network connections, complex passwords with expiration dates, and a two-factored authenticated connection) and is accessible for administration.
Technical Security Measures. 11.3.1 That it has implemented safeguards to protect their computer network against accidental, unlawful or unauthorized usage, any interference which will affect data integrity or hinder the functioning or availability of the system, and unauthorized access through an electronic network;
Technical Security Measures. (1) Access controls on information systems – Implementing and maintaining appropriate security measures and procedures to ensure that access to all systems hosting UBS Data and/or being used to provide services to UBS shall be protected through the use of access control systems that uniquely identify each individual requiring access, grant access only to authorized individuals and based on the principle of least privileges, prevent unauthorized persons from gaining access to UBS Data, appropriately limit and control the scope of access granted to any authorized person, and log all relevant access events. These security measures and procedures shall include Supplier implementing and maintaining:
Technical Security Measures. 2.2.1. ACCESS ADMINISTRATION. Pleo will ensure that access by personnel to Customer Data will be conducted in a manner that: (i) is protected by authentication and authorization mechanisms; (ii) requires personnel to be assigned a unique user account; (iii) restricts the sharing of individual user accounts; (iv) requires strong authentication with complex passwords; (v) ensures accounts are lock-out enabled; (vi) enforces security controls that adhere to the zero trust principle; (vii) requires access privileges be based on job requirements limited to that necessary for the applicable personnel to undertake their duties; (viii) ensures access is revoked upon termination of employment or consulting relationships; and (ix) requires access entitlements be reviewed by management quarterly.
Technical Security Measures. Ascension PS shall implement and maintain appropriate and reasonable security measures to protect Personal Information. These include measures relating to the physical security of facilities, measures to control access rights to networks, and processes for testing these measures; and will be consistent with its current Security Policy.