TRADE ALLY’S ACCESS MANAGEMENT PROGRAM Clause Samples

TRADE ALLY’S ACCESS MANAGEMENT PROGRAM. 4.1 The Trade Ally will only grant access to the Trade Ally Electronic Information Assets where Electronic Confidential Information is processed, stored, or transmitted to its personnel who need access in order to perform the work for customers under the Program and will revoke such access promptly once the person no longer requires or is no longer qualified for access. 4.2 The Trade Ally will assign each individual personnel a unique User Account ID for which the Trade Ally will be responsible for all activities performed under that User Account ID. 4.3 The Trade Ally will limit Administrator Account access to Electronic Confidential Information being processed, stored or transmitted using the Trade Ally’s Electronic Information Assets to only those personnel whose job role and responsibilities require such access. 4.4 The Trade Ally will ensure that Administrator Account ID passwords are changed immediately upon an assigned User’s notification of termination or change in job role that no longer requires such access. 4.5 The Trade Ally will prohibit its personnel to share or otherwise allow other persons to use their unique User Account IDs and associated passwords and terminate access to Electronic Confidential Information for its personnel who violate this prohibition. 4.6 The Trade Ally will immediately remove its personnel’s access to any Electronic Confidential Information and its Electronic Information Assets where Electronic Confidential Information is stored when: (i) the individual no longer requires access to a given Electronic information resource or Electronic Information Asset; (ii) the individual is terminated or his or her employment is otherwise ended, (iii) the services being provided by the Trade Ally to customers under the Program are either completed or terminated, or (iv) when the Trade Ally reasonably believes the individual may pose a threat to the safety or security of Electronic Confidential Information. 4.7 Where the Trade Ally allows its personnel to use personal devices to access or transmit Electronic Confidential Information processed, stored, or transmitted in the Trade Ally’s Electronic Information Assets, the Trade Ally will implement an Acceptable Use Policy and Security Controls commensurate with the sensitivity of the Electronic Confidential Information.