Access Control and Privilege Management. We restrict administrative access to customer production systems to operational personnel. We require such personnel to have unique IDs and associated cryptographic keys. These keys are used to authenticate and identify each Person’s activities on Our systems, including access to Service Data. Upon hire, Our operational personnel are assigned unique keys. Upon termination, these keys are revoked. Access rights and levels are based on Our employees’ job function and role, using the concepts of least-privilege and need-to-know to match access privileges to defined responsibilities.
Appears in 2 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement
Access Control and Privilege Management. We restrict administrative access to customer production systems to operational approved personnel. We require such personnel to have unique IDs and associated cryptographic keys. These keys are used to authenticate and identify each Personperson’s activities on Our systems, including access to Service Data. Upon hire, Our operational approved personnel are assigned unique keys. Upon termination, these keys are revoked. Access rights and levels are based on Our employees’ job function and role, using the concepts of least-privilege and need-to-know to match access privileges to defined responsibilities.
Appears in 1 contract
Sources: Master Subscription Agreement