Access Security Requirements Clause Samples

The Access Security Requirements clause defines the standards and protocols that must be followed to protect access to systems, data, or facilities. It typically outlines measures such as authentication procedures, password policies, and restrictions on user permissions to ensure only authorized individuals can gain entry. By establishing clear security expectations, this clause helps prevent unauthorized access, safeguarding sensitive information and reducing the risk of data breaches.
Access Security Requirements. You agree to be bound by the Access Security Requirements (“ASR”) posted at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇/legal/ and incorporated herein in its entirety by reference. The ASR may be amended from time to time without notice and the terms of the most recent policy version posted online shall be controlling.
Access Security Requirements. The Company agrees that the information, which is received from the Provider, will only be accessed by authorized personnel and any and all electronic and or hard copy files will be kept secure. Further, the Company shall notify ISP when it needs to enable or disable of any access ID’s and/or passwords.
Access Security Requirements. We must work together to protect the privacy of consumers. The following measures are designed to reduce unauthorized access of consumer reports. In accessing the Services under this agreement, you agree to the following security provisions: a. Make all employees aware that your company can access consumer information only for the purpose of screening prospective employees or tenants. You or your employees may not access your own reports, as this does not constitute a permissible purpose. Nor should you or your employees access the report of a family member or friend unless it is for employment or tenant screening purposes. b. You must protect your account number and password so that only key personnel employed by your company know this sensitive information. System access software must have your account number and password “hidden” or embedded and be known only by supervisory personnel. Do not discuss your account number and password by telephone with any unknown caller. Restrict the ability to obtain consumer reports to only personnel that require this information. Place all terminal devices used to obtain consumer reports in a secure location within your facility. c. After normal business hours, be sure to turn off and lock all devices or systems used to obtain consumer reports; secure hard copies and electronic files of consumer reports. d. Shred or destroy all hard copy consumer reports when no longer needed. Erase and overwrite or scramble electronic files containing consumer information when no longer needed and when applicable regulation(s) permit destruction.
Access Security Requirements. We must work together to protect the privacy and information of consumers. The following information security measures are designed to reduce unauthorized access to consumer information. It is your responsibility to implement these controls. If you do not understand these requirements or need assistance, it is your responsibility to employ an outside service provider to assist you. Capitalized terms used herein have the meaning given in the Glossary attached hereto. The credit reporting agency reserves the right to make changes to Access Security Requirements without notification. The information provided herewith provides minimum baselines for information security. In accessing the credit reporting agency’s services, you agree to follow these security requirements:
Access Security Requirements. We must work together to protect the privacy of consumers. The following measures are designed to reduce unauthorized access of the consumer information contained in the Business Owner Profile and Small Business Intelliscore. In signing the Experian Membership Agreement, you agree to follow these measures.
Access Security Requirements. CLIENT and Sapphire Check LLC must work together to protect the privacy and information of consumers. The following information security measures are designed to reduce unauthorized access to consumer information. It is your responsibility to implement these controls. If you do not understand these requirements or need assistance, it is your responsibility to employ an outside service provider to assist you. Sapphire Check LLC reserves the right to make changes to Access Security Requirements without notification. The information provided herewith provides minimum baselines for information security. In accessing Sapphire Check LLC Services, you agree to follow these security requirements:
Access Security Requirements. TRADS Services may only be accessed from within the United States. TRADS reserves the right, in its sole discretion, to determine, at a frequency in its sole discretion, the equipment or software required to access the TRADS Services. By way of example and not limitation, requiring that certain web browsers be used for online access to the TRADS Services. Subscriber shall use TRADS Services and Services Information for Subscriber’s exclusive one-time use. Services Information may not be delivered to, or filed with, third parties. Subscriber must: (i) not disclose its TRADS ID(s) and TRADS password(s) to anyone other than its authorized employees, even if such individuals claim to be employees of TRADS; (ii) secure all devices used to access TRADS Services as well as all hard copies and electronic files of Services Information to prevent unauthorized access; (iii) permanently destroy all hard copies and electronic files of Services Information when no longer needed and when applicable regulation(s) permit destruction; (iv) have their workstations configured to automatically lock after 15 minutes of inactivity, or set online timeout settings for any TRADS Service (including, without limitation, TLOxp®) session to no more than 15 minutes and (v) not access and/or use the TRADS Services via mechanical, programmatic, robotic, scripted or other automated search means, other than through batch or machine-to-machine applications approved by TRADS. Subscriber agrees to designate an account administrator to ensure compliance with this Agreement by all users granted access by Subscriber. Specifically, the account administrator is responsible for (i) allowing only appropriate employees to obtain TRADS Services in compliance with this Agreement; (ii) monitoring appropriate use of TRADS Services by Subscriber and its employees; (iii) maintaining accurate records of all current employees with access to TRADS Services, and all former employees who have ever accessed them; (iv) issuing guidelines for the appropriate use of TRADS Services by its users; (v) ensuring that each of its users is accessing TRADS Services with only his or her own individually-assigned username and password; and (vi) terminating access when a user is no longer employed by Subscriber, is transferred to new duties not requiring access, or is suspected of improper access or use of TRADS Services. Subscriber will employ appropriate policies and procedures to control access and security of usernames, pa...
Access Security Requirements. Justifacts and its clients must work together to protect the privacy of consumers. The following measures are designed to reduce unauthorized access of consumer information. In accessing consumer information products, your company agrees to follow the following measures:

Related to Access Security Requirements

  • Security Requirements 7.1 The Authority will review the Contractor’s Security Plan when submitted by the Contractor in accordance with the Schedule (Security Requirements and Plan) and at least annually thereafter.

  • Data Security Requirements Without limiting Contractor’s obligation of confidentiality as further described in this Contract, Contractor must establish, maintain, and enforce a data privacy program and an information and cyber security program, including safety, physical, and technical security and resiliency policies and procedures, that comply with the requirements set forth in this Contract and, to the extent such programs are consistent with and not less protective than the requirements set forth in this Contract and are at least equal to applicable best industry practices and standards (NIST 800-53).

  • Facility Requirements 1. Maintain wheelchair accessibility to program activities according to governing law, including the Americans With Disabilities Act (ADA), as applicable. 2. Provide service site(s) that will promote attainment of Contractor’s program objectives. Arrange the physical environment to support those activities. 3. Decrease program costs when possible by procuring items at no cost from County surplus stores and by accepting delivery of such items by County.

  • Accessibility Requirements Under Tex. Gov’t Code Chapter 2054, Subchapter M, and implementing rules of the Texas Department of Information Resources, the System Agency must procure Products and services that comply with the Accessibility Standards when those Products are available in the commercial marketplace or when those Products are developed in response to a procurement solicitation. Accordingly, Grantee must provide electronic and information resources and associated Product documentation and technical support that comply with the Accessibility Standards.

  • City Requirements Design, construction, materials, sizing, other specifications, permitting, inspections, testing, documentation and furnishing of as-built drawings, and acceptance of completed infrastructure shall be in accordance with City Requirements. Design and construction shall be by professionals licensed in the state of North Carolina to do the relevant work. City approval of the design of the Improvements shall be required prior to construction, as set forth in City Requirements. If Developer is connecting to the County sewer system, the City may require Developer to furnish the contract providing for such connection.