Privileged Access definition

Privileged Access means access to an Information System or application functionality that is greater than the access level normally granted to users. The Manufacturer must grant Privileged Access only to those users who have a legitimate business need for such access and only for so long as these users continue to have a legitimate business need for Privileged Access. The Manufacturer must review and update Privileged. Access rights at least once during each calendar quarter.
Privileged Access means an access to network equipment where greater capabilities are granted than a standard user or customer. Any access over the Management Plane, or to management ports of Network Equipment is Privileged Access.
Privileged Access means users that need multiple accounts, some of which enjoy additional rights to perform administrative tasks, for example. “shall“ Indicates a mandatory responsibility not subject to exceptions.

Examples of Privileged Access in a sentence

  • System Authorization Access Request (SAAR-N) The Contractor shall complete/sign Classified and Unclassified User Authorization Agreements as applicable, using OPNAV 5239/14 SAAR-N forms, and Privileged Access Agreements.

  • The minimum investigative requirements are as follows: IT-I (Privileged Access) = Single Scope Background Investigation (SSBI); IT-II (Limited Privileged Access) = National Agency Check with Law and Credit Check (NACLC); IT-III (Non- Privileged Access) = National Agency Check with Inquiries (NACI).

  • Additional information on privileged users can be found in Section 16.3 - Privileged Access and additional information on security clearance, briefing and authorisation requirements can be found in Section 9.2 - Authorisations, Security Clearances and Briefings.

  • Information regarding manual logging of system management activities can be found in Section 16.3 - Privileged Access.

  • Further illustrating recognition of the need for reforms to the code enforcement system are additional efforts now underway.

  • Removal of Privileged Access upon termination of the engagement with Vendor, when Vendor personnel change functions and no longer require access, when Vendor personnel are no longer assigned to the VEIC account or, for any reason, Privileged Access is no longer required.

  • Privileged Access Management (PAM)PAM allocates individual special privileges (including username and password access) to systems, databases, websites and other data sharing platforms.

  • Least Privileged Access is also employed for any privileged data, as determined by assigned responsibilities.

  • You will be held to account (under greater scrutiny) as a competent professional to the highest standards of use and behaviour in line with Law and Best Practice irrespective of any other Policies and Procedures accepting that such Policies and Procedures may not include specific provision for Privileged Access.

  • This policy and the obligations of this policy continue to apply irrespective of having Privileged Access credentials.

Related to Privileged Access

  • Privileged Information means any information, in written, oral, electronic or other tangible or intangible forms, including any communications by or to attorneys (including attorney-client privileged communications), memoranda and other materials prepared by attorneys or under their direction (including attorney work product), as to which a Party or any member of its Group would be entitled to assert or have asserted a privilege, including the attorney-client and attorney work product privileges.

  • Privileged Communications has the meaning specified in Section 12.17.

  • Privileged Person The Depositor and its designees, the Initial Purchasers, the Underwriters, the Mortgage Loan Sellers, the Master Servicer, the Special Servicer, any Excluded Mortgage Loan Special Servicer, the Trustee, the Certificate Administrator, any Additional Servicer designated by the Master Servicer or the Special Servicer, any Directing Holder, any Consulting Party, the Operating Advisor, any Affiliate of the Operating Advisor designated by the Operating Advisor, the Asset Representations Reviewer, any affiliate of the Asset Representations Reviewer designated by the Asset Representations Reviewer, any Companion Loan Holder that delivers an Investor Certification (subject to the next sentence and the proviso to this sentence), any other Person who provides the Certificate Administrator with an Investor Certification (subject to the next sentence and the proviso to this sentence), any Rating Agency, and any other NRSRO that delivers a NRSRO Certification to the Certificate Administrator; provided that in no event shall an Excluded Controlling Class Holder be entitled to Excluded Information with respect to a related Excluded Controlling Class Mortgage Loan with respect to which it is a Borrower Party (but this exclusion shall not apply to any other Mortgage Loan). In no event shall a Borrower Party (other than a Risk Retention Consultation Party if it is a Borrower Party) be considered a Privileged Person; provided that the foregoing shall not be applicable to, nor limit, an Excluded Controlling Class Holder’s right to access information with respect to any Mortgage Loan other than Excluded Information with respect to a related Excluded Controlling Class Mortgage Loan. For the avoidance of doubt, each applicable Directing Holder, Controlling Class Certificateholder and Consulting Party (other than the Risk Retention Consultation Party) and the Special Servicer shall, at any given time, only be considered a Privileged Person with respect to any Mortgage Loans or Serviced Loan Combinations for which it is not then a Borrower Party, and the limitations on access to information set forth in this Agreement will apply only with respect to the related Mortgage Loan for which the applicable party is a Borrower Party and only with respect to the related Excluded Information (in the case of the Directing Holder or a Controlling Class Certificateholder) or the related Excluded Special Servicer Information (in the case of the Special Servicer).

  • the Scottish Infected Blood Support Scheme means the scheme of that name administered by the Common Services Agency (constituted under section 10 of the National Health Service (Scotland) Act 1978(b));

  • Unauthorized Access means the entrance of a person into a restricted area without permission of the operator or the operator’s designated representative.

  • Confidential commercial information means records provided to the govern- ment by a submitter that arguably contain material exempt from release under Exemption 4 of the Freedom of Information Act, 5 U.S.C. 552(b)(4), be- cause disclosure could reasonably be expected to cause substantial competi- tive harm.

  • Program Information is defined in Section 13.8(a)(i).

  • TO Proposal - Technical means the TO Contractor’s technical response to the CATS II TORFP dateddate of TO Proposal – Technical.

  • Controlled-access highway means every street or highway in respect to which owners or occupants of abutting lands and other persons have no legal right of access to or from the same except at such points only and in such manner as may be determined by the public authority having jurisdiction over such street or highway.

  • Restricted access area means a designated and secure area within a Licensed Premises in a Retail Marijuana Store where Retail Marijuana and Retail Marijuana Product are sold, possessed for sale, and displayed for sale, and where no one under the age of 21 is permitted.

  • Switched Access Detail Usage Data means a category 1101xx record as defined in the EMI iconectiv Practice BR 010-200-010.

  • Confidential commercial or financial information means any business information (other than trade secrets) which is exempt from the mandatory disclosure requirement of the Freedom of Information Act, 5 U.S.C. 552. Exemptions from mandatory disclosure which may be applicable to business information contained in proposals include exemption (4), which covers “commercial and financial information obtained from a person and privileged or confidential,” and exemption (9), which covers “geological and geophysical information, including maps, concerning wells.”

  • Client Application means an application developed by Customer that a) utilizes the Runtime Product, b) is installed fully on an end user’s machine, with all report processing local to that machine, and c) adds significant and primary functionality to the Runtime Product.

  • Limited access highway means a highway:

  • Product Information has the meaning specified in Section 10.12(a).

  • Authority's Confidential Information means all Personal Data and any information, however it is conveyed, that relates to the business, affairs, developments, trade secrets, know-how, personnel, and suppliers of the Authority, including all IPRs, together with all information derived from any of the above, and any other information clearly designated as being confidential (whether or not it is marked "confidential") or which ought reasonably be considered to be confidential;

  • DXC Sensitive Information means DXC Confidential Information, Intellectual Property, PHI, DXC Customer data, and Personal Information.

  • Massive Multiauthor Collaboration Site (or “MMC Site”) means any World Wide Web server that publishes copyrightable works and also provides prominent facilities for anybody to edit those works. A public wiki that anybody can edit is an example of such a server. A “Massive Multiauthor Collaboration” (or “MMC”) contained in the site means any set of copyrightable works thus published on the MMC site.

  • Information Technology (IT) System means the combination of hardware components, software, and other equipment to make a system whose core purpose is to accomplish a data processing need such as the automatic acquisition, storage, analysis, evaluation, manipulation, management, movement, control, display, switching, interchange, transmission or reception of data. IT systems include ground systems in support of flight hardware. IT systems do not include—

  • Protected Health Information or PHI means any information, whether oral or recorded in any form or medium: (i) that relates to the past, present or future physical or mental condition of an individual; the provision of health care to an individual; and (ii) that identifies the individual or with respect to which there is a reasonable basis to believe the information can be used to identify the individual, and shall have the meaning given to such term under the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.501. Protected Health Information includes Electronic Protected Health Information [45 C.F.R. Sections 160.103, 164.501].

  • Collaborative law communication means a statement, whether oral or in a record, or verbal or nonverbal, to which both of the following apply:

  • Contractor Commercially Sensitive Information means the information listed in the Contractor Commercial Sensitive Information Annex to the Contract being information notified by the Contractor to the Authority which is acknowledged by the Authority as being commercially sensitive information.

  • Privileged Documents means any documents that are Attorney-Client Privilege Documents and/or Work Product Privilege Documents.

  • Contractor Sensitive Information means any information provided by the Contractor to the Authority (disregarding any protective marking or assertion of confidentiality) which: is specified as Contractor Sensitive Information in Schedule 7 and has not lost its sensitivity according to the justifications and durations set out in that Schedule; and is exempt information pursuant to sections 33(1) or 36, 38 or 39 of FOISA (having regard for that purpose to the public interest there might be in disclosing such information as referred to in section 2(1)(b) of FOISA).