Common use of Access Control Clause in Contracts

Access Control. 10.1 Authentication and authorization controls must be appropriately robust for the risk of the system, data, application, and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.

Appears in 6 contracts

Sources: Call Off Contract, Master Subscription Agreement, Data Processing Agreement

Access Control. 10.1 Authentication and authorization controls must be appropriately robust appropriatelyrobust for the risk of the system, data, application, application and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.

Appears in 4 contracts

Sources: Wisconsin Student Data Privacy Agreement, Data Processing Addendum, Data Processing Addendum

Access Control. 10.1 Authentication and authorization controls must be appropriately robust for the risk of the system, data, application, and platform; access rights must be granted based on the principle of least privilege and monitored to log access and security events, using tools that enable rapid analysis of user activities.

Appears in 2 contracts

Sources: Data Processing Addendum, Data Processing Addendum