Logical access definition

Logical access means providing an authorized user the ability to access one or more computer system resources such as a workstation, network, application, or database through automated tools. A logical access control system (LACS) requires validation of an individual’s identity through some mechanism such as a personal identification number (PIN), PIV card, username and password, biometric, or other token. The system has the capability to assign different access privileges to different persons depending on their roles and responsibilities in an organization. 3004.1301-71 Other officials’ responsibilities.
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization.
Logical access means control measures used for identification, authentication, authorization, and accountability in digital systems, programs, processes, and information.

Examples of Logical access in a sentence

  • Logical access control procedures are in place, designed to prevent or mitigate the threats of unauthorized application access and data loss in corporate and production environments.

  • Logical access restrictions include VLAN data segregation, extensive deny-by- default access control lists, and Multi-Factor authentication required for System Administration.

  • Logical access control procedures are in place, designed to prevent or mitigate the threat of unauthorized application access and data loss in both the corporate and production environment.

  • Logical access to the SMS will be managed by a set of programs designed by Ameritech.

  • Logical access usually refers to access to data and associated computer environments such as application software and operating systems.

  • Logical access controls are in place, designed to prevent or mitigate the threat of unauthorized application access and data loss in corporate and production environments.

  • APPLICABILITYThis text applies to all DoD sponsored individuals who require CAC eligibility (or login and P/W if acceptable per contract) for: Physical access to DoD facilities or non-DoD facilities on behalf of DoD; Logical access to information systems (whether on site or remotely); or remote access to DoD networks that use only the CAC logon for user authentication, or access to sensitive and protected information.

  • Logical access is therefore limited and enforced through IT access controls.3) Without prejudice to the continuity of the system administration function, the minimum protection measure is a unique user identifier and personalised password.• General access to systems used in the ESCB is protected by unique user identifiers and personalised passwords.

  • P4) Both physical and Logical access to OT systems should be restricted.

  • Logical access controls are the system-based mechanisms used to designate who or what is to have access to a specific system resource and the type of transactions and functions that are permitted.


More Definitions of Logical access

Logical access means providing an authorized user the ability to access one or more computer system resources such as a workstation, network, application, or database through automated tools. A logical access control system (LACS) requires validation of an individual’s identity
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization. “Personal Identity Verification (PIV) card,” as defined in FIPS PUB 201-2, is a physical artifact (e.g., identity card, “smart” card) issued to an individual that contains a PIV Card Application which stores identity credentials (e.g., photograph, cryptographic keys, digitized fingerprint representation) so that the claimed identity of the cardholder can be verified against the stored credentials by another person (human readable and verifiable) or an automated process (computer readable and verifiable). “Personal Identity Verification-Interoperable (PIV-I) card” similar to a PIV card, is a physical artifact (e.g., identity card, “smart” card) issued to an individual that contains a PIV Card Application which stores identity credentials (e.g., photograph, cryptographic keys, digitized fingerprint representation) so that the claimed identity of the cardholder can be verified against the stored credentials by another person (human readable and verifiable) or an automated process (computer readable and verifiable). PIV-I cards are issued by a non-federal government entity to non-federal government staff. PIV-I cards are issued in a manner that allows federal relying parties to trust the cards. The PIV-I cards uses the same standards of vetting and issuance developed by the U.S. government for its employees
Logical access. Controls: Procedures are in place to prevent unauthorized access to Personal Data that is stored on computer systems (e.g., secure passwords, multifactor authentication, system monitoring). • Physical Access Controls: Procedures are in place to prevent unauthorized access to physical locations where Personal Data is processed (e.g., office entry • Kontrola přístupu k údajům: K osobním údajům mohou přistupovat, používat je, kopírovat, upravovat nebo mazat pouze oprávnění pracovníci pro účely stanovené v příloze B smlouvy (např. zajištění přístupu na základě rolí). • Logická kontrola přístupu: Jsou zavedeny postupy, které zabraňují neoprávněnému přístupu k osobním údajům uloženým v počítačových systémech (např. bezpečná hesla, vícefaktorové ověřování, monitorování systému). • Fyzická kontrola přístupu: Jsou zavedeny postupy, které zabraňují neoprávněnému přístupu k fyzickým místům, kde se osobní údaje zpracovávají
Logical access means the ability for the contractor to interact with Centers for Medicare and Medicaid Services information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization.
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control

Related to Logical access

  • Critical access hospital or “CAH” means a hospital licensed as a critical access hospital by the department of inspections and appeals pursuant to rule 481—51.52(135B).

  • Downtime means the Total Minutes in the Month during which the Cloud Service (or Servers for Server Provisioning) does not respond to a request from SAP’s Point of Demarcation for the data center providing the Cloud Service (or Server for Server Provisioning), excluding Excluded Downtime.

  • Service Level means the standard set forth below by which IBM measures the level of service it provides in this SLA.

  • Net Metering Net metering refers to customers who sell electricity they produce, typically through a rooftop solar panel, back to the utility for credit. If you are a net metering customer, you should not enroll with XOOM because your net metering agreement will not transfer to XOOM once you enroll.

  • Broadband Internet access service means a mass-market retail service by wire or radio that provides the capability to transmit data to and receive data from all or substantially all Internet endpoints, including any capabilities that are incidental to and enable the operation of the communications service, but excluding dial-up Internet access service. This term also encompasses any service that the State finds to be providing a functional equivalent of the service described in the previous sentence, or that is used to evade the protections set forth in this section.