Common use of Access Controls Clause in Contracts

Access Controls. Access to corporate systems is restricted, based on procedures to ensure appropriate approvals. To reduce the risk of misuse, intentional or otherwise, access is provided based on segregation of duties and least privileges. Remote access and wireless computing capabilities are restricted and require that both user and system safeguards are in place. Specific event logs from key devices and systems are centrally collected and reported on an exceptions basis to enable incident response and forensic investigations.

Appears in 22 contracts

Sources: Reseller Terms of Sale, Reseller Terms of Sale, Reseller Terms of Sale

Access Controls. 7.1. Access to corporate systems is restricted, based on procedures to ensure appropriate approvals. To reduce the risk of misuse, intentional or otherwise, access is provided based on segregation of duties and least privilegesprivileges.‌ 7.2. Remote access and wireless computing capabilities are restricted and require that both user and system safeguards are in place. 7.3. Specific event logs from key devices and systems are centrally collected and reported on an exceptions basis to enable incident response and forensic investigations.

Appears in 3 contracts

Sources: Master Service Agreement, Master Service Agreement, Master Service Agreement

Access Controls. Access to corporate systems is restricted, based on procedures to ensure appropriate approvals. To reduce the risk of misuse, intentional or otherwise, access is provided based on segregation of duties and least privileges. Remote access and wireless computing capabilities are restricted and require that both user and system safeguards are in place. Specific event logs from key devices and systems are centrally collected and reported on an exceptions basis to enable incident response and forensic investigations.

Appears in 2 contracts

Sources: MSSP Addendum for Saas Solutions, MSSP Addendum for Saas Solutions

Access Controls. 7.1. Access to corporate systems is restricted, based on procedures to ensure appropriate approvals. To reduce the risk of misuse, intentional or otherwise, access is provided based on segregation of duties and least privilegesprivileges.‌ 7.2. Remote access and wireless computing capabilities are restricted and require that both user and system safeguards are in place. 7.3. Specific event logs from key devices and systems are centrally collected and reported on an exceptions basis to enable incident response and forensic investigations.investigations.‌

Appears in 1 contract

Sources: Master Service Agreement