Logical access definition

Logical access means providing an authorized user the ability to access one or more computer system resources such as a workstation, network, application, or database through automated tools. A logical access control system (LACS) requires validation of an individual’s identity through some mechanism such as a personal identification number (PIN), PIV card, username and password, biometric, or other token. The system has the capability to assign different access privileges to different persons depending on their roles and responsibilities in an organization. 3004.1301-71 Other officials’ responsibilities.
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization.
Logical access means control measures used for identification, authentication, authorization, and accountability in digital systems, programs, processes, and information.

Examples of Logical access in a sentence

  • Logical access control procedures are in place, designed to prevent or mitigate the threats of unauthorized application access and data loss in corporate and production environments.

  • Logical access restrictions include VLAN data segregation, extensive deny-by- default access control lists, and Multi-Factor authentication required for System Administration.

  • Logical access control procedures are in place, designed to prevent or mitigate the threat of unauthorized application access and data loss in both the corporate and production environment.

  • Logical access to the SMS will be managed by a set of programs designed by Ameritech.

  • Logical access usually refers to access to data and associated computer environments such as application software and operating systems.

  • Logical access controls are in place, designed to prevent or mitigate the threat of unauthorized application access and data loss in corporate and production environments.

  • APPLICABILITYThis text applies to all DoD sponsored individuals who require CAC eligibility (or login and P/W if acceptable per contract) for: Physical access to DoD facilities or non-DoD facilities on behalf of DoD; Logical access to information systems (whether on site or remotely); or remote access to DoD networks that use only the CAC logon for user authentication, or access to sensitive and protected information.

  • Logical access is therefore limited and enforced through IT access controls.3) Without prejudice to the continuity of the system administration function, the minimum protection measure is a unique user identifier and personalised password.• General access to systems used in the ESCB is protected by unique user identifiers and personalised passwords.

  • P4) Both physical and Logical access to OT systems should be restricted.

  • Logical access controls are the system-based mechanisms used to designate who or what is to have access to a specific system resource and the type of transactions and functions that are permitted.


More Definitions of Logical access

Logical access means providing an authorized user the ability to access one or more computer system resources such as a workstation, network, application, or database through automated tools. A logical access control system (LACS) requires validation of an individual’s identity
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization. “Personal Identity Verification (PIV) card,” as defined in FIPS PUB 201-2, is a physical artifact (e.g., identity card, “smart” card) issued to an individual that contains a PIV Card Application which stores identity credentials (e.g., photograph, cryptographic keys, digitized fingerprint representation) so that the claimed identity of the cardholder can be verified against the stored credentials by another person (human readable and verifiable) or an automated process (computer readable and verifiable). “Personal Identity Verification-Interoperable (PIV-I) card” similar to a PIV card, is a physical artifact (e.g., identity card, “smart” card) issued to an individual that contains a PIV Card Application which stores identity credentials (e.g., photograph, cryptographic keys, digitized fingerprint representation) so that the claimed identity of the cardholder can be verified against the stored credentials by another person (human readable and verifiable) or an automated process (computer readable and verifiable). PIV-I cards are issued by a non-federal government entity to non-federal government staff. PIV-I cards are issued in a manner that allows federal relying parties to trust the cards. The PIV-I cards uses the same standards of vetting and issuance developed by the U.S. government for its employees
Logical access means the ability for the contractor to interact with Centers for Medicare and Medicaid Services information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization.
Logical access. Controls: Procedures are in place to prevent unauthorized access to Personal Data that is stored on computer systems (e.g., secure passwords, multifactor authentication, system monitoring). • Physical Access Controls: Procedures are in place to prevent unauthorized access to physical locations where Personal Data is processed (e.g., office entry • Kontrola přístupu k údajům: K osobním údajům mohou přistupovat, používat je, kopírovat, upravovat nebo mazat pouze oprávnění pracovníci pro účely stanovené v příloze B smlouvy (např. zajištění přístupu na základě rolí). • Logická kontrola přístupu: Jsou zavedeny postupy, které zabraňují neoprávněnému přístupu k osobním údajům uloženým v počítačových systémech (např. bezpečná hesla, vícefaktorové ověřování, monitorování systému). • Fyzická kontrola přístupu: Jsou zavedeny postupy, které zabraňují neoprávněnému přístupu k fyzickým místům, kde se osobní údaje zpracovávají
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control

Related to Logical access

  • Local Access and Transport Area or "LATA” has the meaning given to the term in the Act.

  • Downtime means the Total Minutes in the Month during which the Cloud Service (or Servers for Server Provisioning) does not respond to a request from SAP’s Point of Demarcation for the data center providing the Cloud Service (or Server for Server Provisioning), excluding Excluded Downtime.

  • Multiple Exchange Carrier Access Billing or “MECAB” means the document prepared by the Billing Committee of the OBF, which functions under the auspices of the Carrier Liaison Committee (CLC) of the Alliance for Telecommunications Industry Solutions (ATIS). The MECAB document, published by ATIS as ATIS/OBF-MECAB- Issue 6, February 1998, contains the recommended guidelines for the billing of access services provided to an IXC by two (2) or more LECs, or by one LEC in two (2) or more states within a single LATA.