Logical access definition

Logical access means providing an authorized user the ability to access one or more computer system resources such as a workstation, network, application, or database through automated tools. A logical access control system (LACS) requires validation of an individual’s identity through some mechanism such as a personal identification number (PIN), PIV card, username and password, biometric, or other token. The system has the capability to assign different access privileges to different persons depending on their roles and responsibilities in an organization. 3004.1301-71 Other officials’ responsibilities.
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization.
Logical access means providing an authorized user the ability to access one or more computer system resources such as a workstation, network, application, or database through automated tools. A logical access control system (LACS) requires validation of an individual’s identity

Examples of Logical access in a sentence

  • Logical access control procedures are in place, designed to prevent or mitigate the threats of unauthorized application access and data loss in corporate and production environments.

  • Logical access control procedures are in place, designed to prevent or mitigate the threat of unauthorized application access and data loss in both the corporate and production environment.

  • Logical access restrictions include VLAN data segregation, extensive deny-by- default access control lists, and Multi-Factor authentication required for System Administration.

  • Logical access to the SMS will be managed by a set of programs designed by Ameritech.

  • Logical access usually refers to access to data and associated computer environments such as application software and operating systems.

  • Logical access controls are in place, designed to prevent or mitigate the threat of unauthorized application access and data loss in corporate and production environments.

  • P4) Both physical and Logical access to OT systems should be restricted.

  • APPLICABILITYThis text applies to all DoD sponsored individuals who require CAC eligibility (or login and P/W if acceptable per contract) for: Physical access to DoD facilities or non-DoD facilities on behalf of DoD; Logical access to information systems (whether on site or remotely); or remote access to DoD networks that use only the CAC logon for user authentication, or access to sensitive and protected information.

  • Logical access is therefore limited and enforced through IT access controls.3) Without prejudice to the continuity of the system administration function, the minimum protection measure is a unique user identifier and personalised password.• General access to systems used in the ESCB is protected by unique user identifiers and personalised passwords.

  • Logical access controls are the system-based mechanisms used to designate who or what is to have access to a specific system resource and the type of transactions and functions that are permitted.


More Definitions of Logical access

Logical access means control measures used for identification, authentication, authorization, and accountability in digital systems, programs, processes, and information.
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization. “Personal Identity Verification (PIV) card,” as defined in FIPS PUB 201-2, is a physical artifact (e.g., identity card, “smart” card) issued to an individual that contains a PIV Card Application which stores identity credentials (e.g., photograph, cryptographic keys, digitized fingerprint representation) so that the claimed identity of the cardholder can be verified against the stored credentials by another person (human readable and verifiable) or an automated process (computer readable and verifiable). “Personal Identity Verification-Interoperable (PIV-I) card” similar to a PIV card, is a physical artifact (e.g., identity card, “smart” card) issued to an individual that contains a PIV Card Application which stores identity credentials (e.g., photograph, cryptographic keys, digitized fingerprint representation) so that the claimed identity of the cardholder can be verified against the stored credentials by another person (human readable and verifiable) or an automated process (computer readable and verifiable). PIV-I cards are issued by a non-federal government entity to non-federal government staff. PIV-I cards are issued in a manner that allows federal relying parties to trust the cards. The PIV-I cards uses the same standards of vetting and issuance developed by the U.S. government for its employees
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control
Logical access means the ability for the contractor to interact with Centers for Medicare and Medicaid Services information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization.

Related to Logical access

  • Local Access Transport Area (LATA) is As Defined in the Act.

  • Switched Access Service means an offering of facilities for the purpose of the origination or termination of traffic from or to Exchange Service customer in a given area pursuant to a Switched Access tariff. Switched Access Services include: Feature Group A, Feature Group B, Feature Group D, 800 Series, and 900 access. Switched Access does not include traffic exchanged between LECs for purpose of local exchange interconnection.

  • Service Level means the standard set forth below by which IBM measures the level of service it provides in this SLA.

  • Custom Local Area Signaling Service Features (CLASS Features) means certain Common Channel Signaling based features available to End Users, including: Automatic Call Back; Call Trace; Distinctive Ringing/Call Waiting; Selective Call Forward; and Selective Call Rejection.

  • Critical infrastructure means existing and proposed systems and assets, whether physical or virtual, the incapacity or destruction of which would negatively affect security, economic security, public health or safety, or any combination of those matters.++