Access Controls. Access to corporate systems is restricted, based on procedures to ensure appropriate approvals. To reduce the risk of misuse, intentional or otherwise, access is provided based on segregation of duties and least privileges. Remote access and wireless computing capabilities are restricted and require that both user and system safeguards are in place. Specific event logs from key devices and systems are centrally collected and reported on an exceptions basis to enable incident response and forensic investigations.
Appears in 22 contracts
Sources: Reseller Terms of Sale, Reseller Terms of Sale, Reseller Terms of Sale
Access Controls. 7.1. Access to corporate systems is restricted, based on procedures to ensure appropriate approvals. To reduce the risk of misuse, intentional or otherwise, access is provided based on segregation of duties and least privilegesprivileges.
7.2. Remote access and wireless computing capabilities are restricted and require that both user and system safeguards are in place.
7.3. Specific event logs from key devices and systems are centrally collected and reported on an exceptions basis to enable incident response and forensic investigations.
Appears in 3 contracts
Sources: Master Service Agreement, Master Service Agreement, Master Service Agreement
Access Controls. Access to corporate systems is restricted, based on procedures to ensure appropriate approvals. To reduce the risk of misuse, intentional or otherwise, access is provided based on segregation of duties and least privileges. Remote access and wireless computing capabilities are restricted and require that both user and system safeguards are in place. Specific event logs from key devices and systems are centrally collected and reported on an exceptions basis to enable incident response and forensic investigations.
Appears in 2 contracts
Sources: MSSP Addendum for Saas Solutions, MSSP Addendum for Saas Solutions
Access Controls. 7.1. Access to corporate systems is restricted, based on procedures to ensure appropriate approvals. To reduce the risk of misuse, intentional or otherwise, access is provided based on segregation of duties and least privilegesprivileges.
7.2. Remote access and wireless computing capabilities are restricted and require that both user and system safeguards are in place.
7.3. Specific event logs from key devices and systems are centrally collected and reported on an exceptions basis to enable incident response and forensic investigations.investigations.
Appears in 1 contract
Sources: Master Service Agreement