User control Sample Clauses

User control. The use of automated data processing systems via facilities for data transfer (e.g. via remote access) by unauthorized persons is prevented.
AutoNDA by SimpleDocs
User control. It must be prevented that data processing systems can be used by unauthorised persons using data transmission devices. Administrator accounts are used at the following level in the company: ● Database ● Application Special administrator accounts are used in the company. Userlane GmbH Xxxxxxxxxxx Xxx. 000x 00000 Xxxxxx Registry: HRB 000000 Xxxxxxxx Xxxxx Xxxxxx Board of Directors: Xxxxxxx Xxxx, Xxxxx Xxxxxxx Document Owner: Contact: xxx@xxxxxxxx.xxx Date of last modification: 19th May 2021 Page: 11 of 16 The access to hardware interfaces of relevant terminal devices is blocked in the company.
User control. The Company will use commercially reasonable efforts to ensure that the Property Monitor application: (a) Permits users to disenroll by cancelling or deleting the user account at any time; (b) Enables users to permanently or temporarily disable notifications on any or all notification modalities (i.e., telephone call, text message, email); and (c) Enables users to permanently or temporarily suspend notifications for any particular property.
User control. All employees must attend mandatory basic training on information security and data privacy on an annual basis. Attendance at this training is recorded and its effectiveness is validated by an audit. New employees are familiarized with the essential information security and data protection regulations relevant to them at the start of their employment or assignment. User activities, including logon attempts to data processing systems (IT systems), are logged to the extent required. User accounts that can be used to access personal data as part of commissioned processing must be personalized and may not be shared by more than one person. Central monitoring is carried out to monitor utilization with threshold-based alerting (e.g. CPU, memory) and error monitoring. In addition, event information from IT solutions in use is evaluated. Administrative activities on IT systems (such as changes to system configurations) are logged. Configuration files are historized, backed up and checked regularly and as required.
User control. Measures to ensure that unauthorized persons cannot use automated data processing sys- tems by means of data transmission equipment. ☒Login with username + password ☒Manage user permissions ☐Login with biometric data ☒Creating user profiles ☐Anti-virus software server ☐Central password assignment ☒Anti-virus software clients ☒Secure Password Policy ☒Anti-virus software mobile devices ☒Delete / Destroy" Policy ☒Firewall ☐Clean desk" guideline ☒Intrusion detection systems ☒General Policy Data Protection and /or security ☒Mobile Device Management ☒Mobile Device Policy ☒Use VPN for remote access ☐Manual desktop lock" instructions ☒Encryption smartphones ☐ ☒Housing lock ☐ ☐BIOS protection (separate password) ☐ ☒Locking external interfaces (USB) ☐ ☒Automatic desktop lock ☐ ☒Encryption of notebooks / Tablet ☐ ☐ ☐
User control. Prevention of the use by unauthorised persons of automated processing systems with the aid of facilities for data transmission.
User control. THE CUSTOMER will be responsible for acts and omissions of its USERS as if they were acts and omissions of the CUSTOMER itself. As a general understanding, a credential means setting a username (login) and password. The CUSTOMER shall ensure that persons who cease to be authorized to access SIGNATURE have their credentials revoked and/or blocked. Blockbit will not interfere, operate or register USERS, unless this responsibility is expressly described in the ORDER or additive to this agreement.
AutoNDA by SimpleDocs
User control. The Processor shall implement suitable measures to prevent its data processing systems from being used by unauthorized persons by means of data transmission equipment. In addition, the Processor shall implement suitable measures to prevent unauthorized reading, copying, alteration or removal of the data media, unauthorized input into memory, reading, alteration or deletion of the stored Personal Data. This shall be accomplished by: Authorization concept; Terminal with access user key; Identification of the terminal and / or the terminal user to the system of the Processor; Automatic turn-off of the user ID when several erroneous passwords where entered; Log file of events (monitoring of break-in attempts); Issuing and safeguarding the identification codes; Dedication of individual terminals and/or terminal users; Identification characteristics exclusive to specific functions; Authentication of the authorized personnel; Protective measures for the data input into memory as well as for the reading, blocking and deletion of stored Personal Data; Use of encryption for critical security files; Specific access rules for procedures, control cards, process control methods, program cataloguing authorization; Guidelines for data file organisation; Keeping records of data file use; Separation of production and test environment for libraries and data files; Providing that entries to data processing facilities (rooms, housing, computer hardware and related equipment) are capable of being locked; Automatic log-off of user IDs that have not been used for a substantial period of time; Designating the areas in which data media may / must be located; Designating the persons in such areas for authorized remove of data media; Controlling the removal of data media; Securing the areas in which data media are located; Release of data media only to authorized persons; Control of files, controlled and documented destruction of data media; Policies controlling the production of backup copies.

Related to User control

  • User Content You retain your rights in Your Content, subject to the rights granted below and our rights in Our Property (as defined below). You hereby grant and agree to grant us a worldwide, non-exclusive, perpetual, irrevocable, royalty-free, fully-paid, transferable license, with the right to sublicense through multiple tiers, to copy, edit, modify, adapt, publish, transmit, distribute, prepare derivative works, perform, display and to otherwise use in any manner, Your Content in connection with operation and promotion of the Service and any other purposes reasonably related to the Service or our business. To the extent reasonably necessary or appropriate to effect or support the license granted by you above, you hereby waive and agree to waive (or if not waivable, agree not to assert) any rights of privacy or publicity, or any moral rights or other similar rights, with respect to Your Content. You agree that we are not responsible for any use or disclosure of Your Content by other Users or any third party who gains access to it through the Service (which may include unintended activities by third parties, such as by hackers). You represent and warrant that you own all proprietary rights in Your Content or, with respect to any of Your Content you do not own, that you have the full authority and right to create, upload, store and/or transmit Your Content, and to grant the licenses and rights you have granted in this Agreement, and that your creation, uploading, storage and/or transmission of Your Content, and the exercise by us and other Users of the licenses and rights granted by you herein, shall not infringe any third party intellectual property or proprietary rights, nor violate any rights of privacy or publicity. We do not control User Content, and we are not responsible for its content, accuracy or reliability. We are under no obligation to edit or control User Content, although we reserve the right to review, and take certain actions with respect to, User Content in accordance with this Agreement, including the Privacy Policy (as defined below). In the event that we deem, in our sole discretion, any User Content to be inconsistent with the terms of this Agreement, the Privacy Policy, or any other rules or policies we may publish from time to time, we may remove such User Content from the Service, including incomplete posts, duplicate posts, or any other User Content we deem, in our sole discretion, to be misleading or otherwise inappropriate. On termination of your account, or this Agreement, we have no obligation to return any User Content to you, so you should retain copies of all of Your Content. In addition to and without limiting any other rights herein (including in the Privacy Policy), you also grant us the rights to (i) de-identify Your Content (i.e., to remove your name and other identifying characteristics, consistent with applicable laws and regulations), (ii) use or disclose de-identified data for any purpose, and (iii) share de- identified data with third parties.

  • Traffic Control The Surveyor shall control traffic in and near surveying operations adequately to comply with provisions of the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI which can be found on the State’s internet site. In the event field crew personnel must divert traffic or close traveled lanes, a Traffic Control Plan based upon principles outlined in the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI shall be prepared by the Surveyor and approved by the State prior to commencement of field work. A copy of the approved plan shall be in the possession of field crew personnel on the job site at all times and shall be made available to the State’s personnel for inspection upon request.

  • Weed Control The tenant shall control all noxious weeds on the subject lands and maintain any summerfallow in a reasonably weed free condition.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!