Access Control. 10.1 Authentication and authorization controls must be appropriately robust for the risk of the system, data, application, and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.
Appears in 6 contracts
Sources: Call Off Contract, Master Subscription Agreement, Data Processing Agreement
Access Control. 10.1 Authentication and authorization controls must be appropriately robust appropriatelyrobust for the risk of the system, data, application, application and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.
Appears in 4 contracts
Sources: Wisconsin Student Data Privacy Agreement, Data Processing Addendum, Data Processing Addendum
Access Control. 10.1 Authentication and authorization controls must be appropriately robust for the risk of the system, data, application, and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.
Appears in 2 contracts