Access Policy Clause Samples
An Access Policy clause defines the rules and conditions under which individuals or entities may enter, use, or interact with certain premises, systems, or information. Typically, it outlines who is authorized to access specific areas or resources, the procedures for obtaining access, and any restrictions or security measures that must be followed, such as requiring identification badges or limiting access to certain hours. The core function of this clause is to protect assets and sensitive information by controlling and monitoring access, thereby reducing the risk of unauthorized entry or misuse.
Access Policy. An access control policy is established, documented, and reviewed based on business and information security requirements.
Access Policy. Cisco shall determine appropriate access control rules, rights, and restrictions for each specific user’s roles towards their assets. Cisco shall maintain a record of security privileges of its personnel that have access to Protected Data, networks, and network services. Cisco shall restrict and tightly control the use of utility programs that might be capable of over- riding system and application controls.
Access Policy iManage enforces an access control policy (physical, technical, and administrative) based on least privileges principles.
Access Policy. CiteRight enforces an access control policy (physical, technical and administrative) based on least privileges principles.
Access Policy. Acuity maintains a record of security privileges of individuals having access to Customer Data.
Access Policy. Vertice shall determine appropriate access control rules, rights, and restrictions for each specific user’s roles towards their assets. Vertice shall maintain a record of security privileges of Representatives that have access to Data, networks, and network services. Vertice shall restrict the use of utility programs that might be capable of overriding system and application controls.
Access Policy. Supplier shall determine appropriate access control rules, rights, and re- strictions for each specific user’s roles towards their assets. Supplier shall maintain a record of security privileges of its personnel that have access to Protected Data, networks, and net- work services.
Access Policy. Microsoft maintains a record of security privileges of individuals having access to Customer Data.
Access Policy. Maximl Labs Pvt Ltd’s internal data access processes and policies are designed to protect against unauthorized access, use, disclosure, alteration or destruction of Customer Personal Data. Maximl Labs Pvt Ltd designs its systems to only allow authorized persons to access data they are authorized to access based on principles of “least privileged” and “need to know”, and to prevent others who should not have access from obtaining access. Maximl Labs Pvt Ltd requires the use of unique user IDs, strong passwords, two factor authentication and carefully monitored access lists to minimize the potential for unauthorized account use. The granting or modification of access rights is based on: the authorized personnel’s job responsibilities; job duty requirements necessary to perform authorized tasks; a need to know basis; and must be in accordance with Maximl Labs Pvt Ltd’s internal data access policies and training. Approvals are managed by workflow tools that maintain audit records of all changes. Access to systems is logged to create an audit trail for accountability. Where passwords are employed for authentication (e.g., login to workstations), password policies follow industry standard practices. These standards include password complexity, password expiry, password lockout, restrictions on password reuse and re-prompt for password after a period of inactivity • Data Center and Network Security ▪ Data Centers.
Access Policy. A. Prior to providing access to the Datacenter, it is required that everyone that will enter the space read, fully understand and sign the DLR 11101 -