Physical and environmental security definition

Physical and environmental security. If we are hosting the Services, we will be hosting our product infrastructure with multi-tenant, outsourced infrastructure providers. According to documentation and attestations from the providers, the physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications.
Physical and environmental security. Lightspeed hosts its product infrastructure with multi-tenant, outsourced infrastructure providers. The physical and environmental security controls are audited for SOC 2 Type II, ISO 27001 and PCI DSS compliance, among other certifications. Authentication: Lightspeed implemented a uniform password policy for its customer products. All users who needs to interact with the products via any interface must authenticate before accessing non-public customer data. Authorization: Customer data is stored in multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of Lightspeed's product is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user's permissions against the attributes associated with each data set.
Physical and environmental security. Soliton OneGate service infrastructure is hosted on Google Cloud Platform and logically and physically secured from Soliton’s internal IT systems.  To maintain the availability of the Soliton OneGate service, the service utilizes a redundancy configuration within the same Google Cloud region so that if one data center is down, the service can continue to be available through another data center. All data is backed up on a daily basis.  Soliton maintains an ISMS certification, and its system is audited by an indipendent auditor. Soliton’s Management review periodic report submitted by its system administrators regarding its Information System Management System. The reports include how the instructions given to the Management in the previous review have been taken care of.  Soliton’s personnel logging on to administrator accounts to access the systems within the Soliton OneGate infrastructure are requirefd to use Multi-Factor Authentication.  Users of the OneGate service are required to use a digital certificate-based Multi-Factor Authentication to use the Soliton OneGate service.  Soliton implements a room entrance management system that is designed to ensure that only personnel who are authenticated can enter the rooms from which the OneGate service is accessible.  The OneGate service system logs are regularly monitored and stored on Google Cloud Platform.  Soliton implements a system that automatically sends alerts regarding certain unusual or suspicious events.  The number of the ports, protocol and services accessible to the Soliton OneGate system are restricted to the minimum required level.  Soliton has established and comply with its security requirements policy for OneGate concerning access to and the retention, processing and disposal of data for the OneGate service (confidential).  Soliton implements and maintains its physical security control rules, which include, among others, the following o No business data must be stored in laptops or portable devices. o If a laptop or a portable device is lost, the administrator immediately disables access from the device to all business data controlled by Soliton. o No data on the OneGate system must be copied or transferred outside of the system.  Soliton requires that any sub-processor it engages to provde the Service on its behalf in connection with this DPA does so solely on the basis of a written contract which imposes on such sub-processor terms no less protective of Personal Data than thos...

Examples of Physical and environmental security in a sentence

  • Physical and environmental security controls are implemented to protect the facility housing system resources, the system resources themselves, and the facilities used to support their operation.

  • Physical and environmental security measures are in place to prevent illegitimate or accidental access, loss or dissemination of data.

  • Physical and environmental security: We host our product infrastructure with multi-tenant, outsourced infrastructure providers.

  • Physical and environmental security: We host our product infrastructure with multi- tenant, outsourced infrastructure providers.

  • Physical and environmental security controls are implemented to protect the facility housing system resources, the system resources themselves, and the facilities used to support their oper- ation.

  • Physical and environmental security controls shall be implemented to protect the facility housing system resources, the system resources themselves, and the facilities used to support their operation.

  • Physical and environmental security measures are in place to prevent illegitimate or accidental access, loss or dissemination of data in the various facilities.

  • Examples: Physical and environmental security controls, network boundary defense security controls, organization policies or procedures, etc.

  • Physical and environmental security controls must be commensurate with the level of risk and must be sufficient to safeguard IT resources against possible loss, theft, destruction, accidental damage, hazardous conditions, fire, malicious actions, and natural disasters.

  • LMGS Security and Surveillance 68 IAC 25-4-1 Physical and environmental security of LMGS equipmentAuthority: IC 4-33-4; IC 4-35-4Affected: IC 4-33; IC 4-35 Sec.


More Definitions of Physical and environmental security

Physical and environmental security. Ably hosts its product infrastructure with multi-tenant, outsourced infrastructure provider Amazon Web Services Inc. The physical and environmental security controls are audited for SOC 2 Type 2II (xxxxx://xxx.xxxxxx.xxx/compliance/soc-faqs/https://xxx.xxxxxx.xxx/compliance/soc-faqs/) and ISO 27001 (xxxxx://xxx.xxxxxx.xxx/compliance/iso-27001-faqs/) compliance, among other certifications. Authentication: Ably has implemented a uniform password policy for its customer products. Customers who interact with the products via the user interface must authenticate before accessing non-public customer data. Authorization: Customer data is stored in multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of Ably’s products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set. Application Programming Interface (API) access: Public product APIs may be accessed using an API key.
Physical and environmental security. Applozic hosts its product infrastructure with multi- tenant, outsourced infrastructure providers. The physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications.
Physical and environmental security. We host our services infrastructure with multi-tenant, outsourced infrastructure providers. The physical and environmental security controls are audited for SOC Type II and ISO 27001 compliance, among other certifications. Authentication: We implement a uniform password policy for our customer services. Customers who interact with the services via the user interface must authenticate before accessing non-public customer data. Authorisation: Customer Data is stored in multi-tenant storage systems accessible to customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorisation model in each of our services is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customisation options. Authorisation to data sets is performed through validating the user's permissions against the attributes associated with each data set. Application programming interface API access: Public service API’s may be accessed using an API key or through Oauth authorisation.

Related to Physical and environmental security

  • Environmental Safeguards means the principles and requirements set forth in Chapter V, Appendix 1, and Appendix 4 (as applicable) of the SPS;

  • Physical abuse means any physical injury, mental injury, or threatened injury, inflicted by a person responsible for the child’s care other than by accidental means; or any physical or mental injury that cannot reasonably be explained by the child’s history of injuries or any aversive or deprivation procedures, or regulated interventions, that have not been authorized by Minn. Stat. § 125A.0942 or § 245.825.

  • Materials of Environmental Concern any gasoline or petroleum (including crude oil or any fraction thereof) or petroleum products or any hazardous or toxic substances, materials or wastes, defined or regulated as such in or under any Environmental Law, including asbestos, polychlorinated biphenyls and urea-formaldehyde insulation.

  • Household Hazardous Waste means any waste material derived from households (including single

  • Environment means ambient air, indoor air, surface water, groundwater, drinking water, soil, surface and subsurface strata, and natural resources such as wetland, flora and fauna.

  • Residual Waste means low-level radioactive waste resulting from processing or decontamination activities that cannot be easily separated into distinct batches attributable to specific waste generators. This waste is attributable to the processor or decontamination facility, as applicable.

  • Hazardous Waste means the substances regulated as such pursuant to any Environmental Law.