User Access Control Sample Clauses

User Access Control. We have implemented and maintain appropriate access controls and the concept of least privilege designed to ensure only authorized users have access to Customer Data within PureCloud. User access is logged for audit purposes. a. Customer User Access b. Our User Access i. User accounts are requested and authorized by our management. ii. User accounts follow the concept of least privilege. iii. Access to the PureCloud Production environment requires multifactor authentication. iv. SSH keys are utilized instead of passwords within PureCloud. v. Dormant or unused accounts are disabled after 90 days of non-use. vi. Session time-outs are systematically enforced. vii. User accounts are promptly disabled upon employee termination or role transfer, eliminating a valid business need for access.
AutoNDA by SimpleDocs
User Access Control. Genesys will implement appropriate access controls to ensure only authorized users have access to Customer Data.
User Access Control. We have implemented and maintain appropriate access controls and the concept of least privilege designed to ensure only authorized users have access to Customer Data within Altocloud. User access is logged for audit purposes. a. Customer User Access b. Our User Access i. User accounts are requested and authorized by our management. ii. User accounts follow the concept of least privilege. iii. Access to the Altocloud Production environment requires multifactor authentication. iv. SSH keys are utilized instead of passwords within the Altocloud server environment. v. User accounts are promptly disabled upon employee termination or role transfer, eliminating a valid business need for access.
User Access Control. We have implemented and maintain appropriate access controls and the concept of least privilege designed to ensure only authorized users have access to Customer Data within Genesys Hub. User access is logged for audit purposes. a. Customer User Access b. Our User Access i. User accounts are requested and authorized by our management. ii. User accounts follow the concept of least privilege. iii. User accounts are promptly disabled upon employee termination or role transfer, eliminating a valid business need for access.
User Access Control. 7.1. In connection with all GoodData Workspaces, only designated GoodData personnel, Your administrators, or partner administrators can manage Customer access and remove from or manage Customer data on the Platform. GoodData personnel can obtain user-level access to Customer data only when explicitly invited by You or a partner administrator for the purposes of technical support or when contractually authorized to provide professional services. The Platform supports role- based access control and user groups to define objects and capabilities within the Platform to which a Customer will have access. 7.2. There are additional measures that You should use to implement Customer-specific access control policies. 7.2.1. IP whitelisting allows You to define trusted IP address ranges from which Customers can access Your domains. 7.2.2. Custom session expiration allows You to specify a period of inactivity after which sessions are terminated and Customers are automatically logged out of the Platform.
User Access Control. Zugriffskontrolle")
User Access Control. 5.1.1 The DATA CONTROLLER will use means that are commercially viable so that REVIEW PRO can only access the confidential Data of the DATA CONTROLLER that are necessary for REVIEW RANK to fulfill its obligations under the Agreement. X
AutoNDA by SimpleDocs
User Access Control. Vendor shall allow Customers, Users, and Vendor staff to Access the CRM System based on security and information Access requirements through a web browser. Notwithstanding anything to the contrary in this Contract, Vendor shall: a. Provide FHKC with a minimum of 12 User licenses that will provide read/write Access to the CRM System Graphical User Interface (GUI); b. Provide a minimum of four FHKC employees with CRM System technical network account and read-only database Access, as well as Access to third-party vendor customer support sites; c. Provide read/write Access to a minimum of 100 CEC staff; d. Provide read-only Access to a minimum of 300 grantees, partners, other Users, as determined by FHKC; e. Create unique Customer and User accounts based on FHKC criteria; f. Establish role-based Access with differing levels of privilege; g. Maintain internal security controls to record the security ID of any User who Accesses an account, as well as a recorded date and time stamp for each transaction; h. Require account authentication or "identity validation;" i. Limit each User to one account with a unique username and password; j. Allow password modification only in the event of a password breach; k. Make electronic signature authority available for electronic transactions with proper security; l. Provide credentialing using two-factor authentication; m. Log and retain all User actions for security auditing; n. Allow for and fully support single sign-on capability with other secure websites (e.g., Insurer member websites) as agreed upon by the Parties and as determined by FHKC. Vendor shall be responsible for hosting and maintaining the single sign-on database and engine; o. Support the current and previous two versions of the following browsers: Internet Explorer, Firefox-Mozilla, Safari, Chrome, and Microsoft Edge. Browser updates will be reviewed by Vendor for compatibility with the CRM System and certified if compatible within 30 Calendar Days of release. If a newly released version cannot be supported within 30 Calendar Days, Vendor shall notify FHKC within 10 Calendar Days of the release, identifying: (i) when the update will be fully supported, (ii) what activities must occur to become fully supported, and (iii) what barriers prevent Vendor from fully supporting the new version within that timeframe. The intent is for the CRM System to be browser agnostic; and p. At no additional cost to FHKC, purchase and/or renew and apply Secure Socket Layer (SSL) C...
User Access Control 

Related to User Access Control

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Physical Access Control Unauthorized persons are prevented from gaining physical access to premises, buildings or rooms where data processing systems that process and/or use Personal Data are located.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • Data Access Access to Contract and State Data The Contractor shall provide to the Client Agency access to any data, as defined in Conn. Gen Stat. Sec. 4e-1, concerning the Contract and the Client Agency that are in the possession or control of the Contractor upon demand and shall provide the data to the Client Agency in a format prescribed by the Client Agency and the State Auditors of Public Accounts at no additional cost.

  • Network Access TENANT may find it necessary to purchase a network interface card, wireless PC card or other hardware in order to connect to the internet service. LANDLORD is not responsible for the purchase of these items and LANDLORD cannot guarantee compatibility with any device TENANT may have. The computer and network card must have software installed that supports the Internet Protocol commonly referred to as TCP/IP. Any conflicts between the software compatibility of the network and the TENANT’S computer operating system or any other feature will be the responsibility of the TENANT to resolve. LANDLORD will not be responsible for software issues related to the user’s personal computer.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!