User control Sample Clauses

User control. The use of automated data processing systems via facilities for data transfer (e.g. via remote access) by unauthorized persons is prevented.
User control. It must be prevented that data processing systems can be used by unauthorised persons using data transmission devices. Administrator accounts are used at the following level in the company: ● Database ● Application Special administrator accounts are used in the company. The access to hardware interfaces of relevant terminal devices is blocked in the company.
User control. Measures to ensure that unauthorized persons cannot use automated data processing sys- tems by means of data transmission equipment. ☒Login with username + password ☒Manage user permissions ☐Login with biometric data ☒Creating user profiles ☐Anti-virus software server ☐Central password assignment ☒Anti-virus software clients ☒Secure Password Policy ☒Anti-virus software mobile devices ☒Delete / Destroy" Policy ☒Firewall ☐Clean desk" guideline ☒Intrusion detection systems ☒General Policy Data Protection and /or security ☒Mobile Device Management ☒Mobile Device Policy ☒Use VPN for remote access ☐Manual desktop lock" instructions ☒Encryption smartphones ☐ ☒Housing lock ☐ ☐BIOS protection (separate password) ☐ ☒Locking external interfaces (USB) ☐ ☒Automatic desktop lock ☐ ☒Encryption of notebooks / Tablet ☐ ☐ ☐
User control. All employees must attend mandatory basic training on information security and data privacy on an annual basis. Attendance at this training is recorded and its effectiveness is validated by an audit. New employees are familiarized with the essential information security and data protection regulations relevant to them at the start of their employment or assignment. User activities, including logon attempts to data processing systems (IT systems), are logged to the extent required. User accounts that can be used to access personal data as part of commissioned processing must be personalized and may not be shared by more than one person. Central monitoring is carried out to monitor utilization with threshold-based alerting (e.g. CPU, memory) and error monitoring. In addition, event information from IT solutions in use is evaluated. Administrative activities on IT systems (such as changes to system configurations) are logged. Configuration files are historized, backed up and checked regularly and as required.
User controlThe Processor shall implement suitable measures to prevent its data processing systems from being used by unauthorized persons by means of data transmission equipment. In addition, the Processor shall implement suitable measures to prevent unauthorized reading, copying, alteration or removal of the data media, unauthorized input into memory, reading, alteration or deletion of the stored Personal Data. This shall be accomplished by: Authorization concept; Terminal with access user key; Identification of the terminal and / or the terminal user to the system of the Processor; Automatic turn-off of the user ID when several erroneous passwords where entered; Log file of events (monitoring of break-in attempts); Issuing and safeguarding the identification codes; Dedication of individual terminals and/or terminal users; Identification characteristics exclusive to specific functions; Authentication of the authorized personnel; Protective measures for the data input into memory as well as for the reading, blocking and deletion of stored Personal Data; Use of encryption for critical security files; Specific access rules for procedures, control cards, process control methods, program cataloguing authorization; Guidelines for data file organisation; Keeping records of data file use; Separation of production and test environment for libraries and data files; Providing that entries to data processing facilities (rooms, housing, computer hardware and related equipment) are capable of being locked; Automatic log-off of user IDs that have not been used for a substantial period of time; Designating the areas in which data media may / must be located; Designating the persons in such areas for authorized remove of data media; Controlling the removal of data media; Securing the areas in which data media are located; Release of data media only to authorized persons; Control of files, controlled and documented destruction of data media; Policies controlling the production of backup copies.
User controlThe Company will use commercially reasonable efforts to ensure that the Property Monitor application: (a) Permits users to disenroll by cancelling or deleting the user account at any time; (b) Enables users to permanently or temporarily disable notifications on any or all notification modalities (i.e., telephone call, text message, email); and (c) Enables users to permanently or temporarily suspend notifications for any particular property.
User control. It must be prevented that data processing systems can be used by unauthorised persons using data transmission devices. Administrator accounts are used at the following level in the company: ● Database ● Application Special administrator accounts are used in the company.
User control. Prevention of the use by unauthorised persons of automated processing systems with the aid of facilities for data transmission.
User controlTHE CUSTOMER will be responsible for acts and omissions of its USERS as if they were acts and omissions of the CUSTOMER itself. As a general understanding, a credential means setting a username (login) and password. The CUSTOMER shall ensure that persons who cease to be authorized to access SIGNATURE have their credentials revoked and/or blocked. Blockbit will not interfere, operate or register USERS, unless this responsibility is expressly described in the ORDER or additive to this agreement.

Related to User control

  • Traffic Control The Surveyor shall control traffic in and near surveying operations adequately to comply with provisions of the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI which can be found on the State’s internet site. In the event field crew personnel must divert traffic or close traveled lanes, a Traffic Control Plan based upon principles outlined in the latest edition of the Texas Manual on Uniform Traffic Control Devices – Part VI shall be prepared by the Surveyor and approved by the State prior to commencement of field work. A copy of the approved plan shall be in the possession of field crew personnel on the job site at all times and shall be made available to the State’s personnel for inspection upon request.

  • Job Control Personal Data being processed on commission (i.e., Personal Data processed on a customer’s behalf) is processed solely in accordance with the Agreement and related instructions of the customer.

  • Input Control The possibility to subsequently verify and determine whether, and by whom, personal data was entered into, changed or removed from data processing systems must be ensured. • Definition of entry authorisation • Logging of logins

  • Weed Control The tenant shall control all noxious weeds on the subject lands and maintain any summerfallow in a reasonably weed free condition.

  • Data Input Control It will be possible to retrospectively examine and establish whether and by whom Personal Data have been entered, modified or removed from SAP data processing systems.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Fraud Control BellSouth will provide seven days per week, 24-hours per day, fraud monitoring on Calling Cards, xxxx-to-third and collect calls made to numbers in BellSouth’s LIDB, provided that such information is included in the LIDB query. BellSouth will establish fraud alert thresholds and will notify <<customer_name>> of fraud alerts so that <<customer_name>> may take action it deems appropriate.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.