Access Control Policy Clause Samples

Access Control Policy. Supplier shall establish, document, and, upon UL Solutions’ request, communicate to UL Solutions, a formal access control policy based on business and security requirements for access. Access control rules shall account for and reflect Supplier's policies for information dissemination and authorization, and these rules shall be supported by formal procedures and clearly defined responsibilities. Access control rules and rights for each user or group of users shall be clearly stated. Access controls must be both logical and physical. Users and service providers shall be given a clear statement of the business requirements to be met by access controls. The policy shall be reviewed and updated at least annually.
Access Control Policy. Supplier shall establish, document, and communicate to Buyer a formal access control policy based on business and security requirements for access. Access control rules shall account for and reflect Supplier's policies for information dissemination and authorization, and these rules shall be supported by formal procedures and clearly defined responsibilities. Access control rules and rights for each user or group of users shall be clearly stated. Access controls are both logical and physical. Users and service providers shall be given a clear statement of the business requirements to be met by access controls. The policy shall be reviewed and updated at least annually.
Access Control Policy. Company will ensure an access control policy is established, documented, and reviewed based on business and information security requirements.
Access Control Policy. Access Control systems are in place to protect the interests of all users of the Company computer systems by providing a safe, secure and readily accessible environment in which to work.
Access Control Policy. 21.1. The Data Processor shall have an access control policy which is documented and reviewed periodically based on business and information security requirements.
Access Control Policy. Supplier will maintain an appropriate role-based access control policy and appropriate access control technical measures consistent with Industry Standard Practices to restrict access
Access Control Policy. Iron Mountain maintains access control policies with respect to information processing assets that Iron Mountain formally approves, publishes and implements.
Access Control Policy. Access Control systems are in place to protect the interests of all users of MMO GAMES
Access Control Policy. Supplier will maintain an appropriate role-based access control policy and appropriate access control technical measures consistent with Industry Standard Practices to restrict access to Kyndryl Materials and Supplier assets used to provide the Services only to authorized Supplier Personnel and limit such access to the least level required to provide and support the Services and Deliverables.
Access Control Policy. PURPOSE To protect an Individual’s health information from unauthorized use, the OKSHINE shall verify the identity of Participants and their Authorized Users before access to OKSHINE is granted. Health information available through OKSHINE shall be accessed only by Authorized Users who have been granted access rights.