Access Security. 5.1 Access privileges for all IT Systems is determined on the basis of employee levels of authority within Bitrix24 Company organization structure and the requirements of their job roles. Employees are not granted access to any IT Systems or electronic data which are not reasonably required for the fulfilment of their job roles. 5.2 All IT Systems (and in particular mobile devices including, but not limited to, laptops, tablets, and smartphones) are protected with a secure password or passcode, or such other form of secure log-in system as the IT Department may deem appropriate and approve. 5.3 All passwords are covered with the following security measures: a) Are at least 8 characters long; b) Contain a combination of upper and lower case letters,numbers, symbols; c) Changed at least every 90 days; d) Different from the previous password; e) Not obvious or easily guessed (e.g. birthdays or other memorable dates, memorable names, events, or places etc.); and f) Created by individual Users. 5.4 All IT Systems with displays and user input devices (e.g. mouse, keyboard, touchscreen etc.) are protected with a password protected screensaver that will activate after 5 minutes of inactivity.
Appears in 2 contracts
Sources: Data Processing Agreement, Data Processing Agreement
Access Security. 5.1 Access privileges for all IT Systems is determined on the basis of employee levels of authority within Bitrix24 Company organization structure and the requirements of their job roles. Employees are not granted access to any IT Systems or electronic data which are not reasonably required for the fulfilment of their job roles.
5.2 All IT Systems (and in particular mobile devices including, but not limited to, laptops, tablets, and smartphones) are protected with a secure password or passcode, or such other form of secure log-in system as the IT Department may deem appropriate and approve.
5.3 All passwords are covered with the following security measures:
a) Are at least 8 characters long;
b) Contain a combination of upper and lower case letters,numbers, symbols;
c) Changed at least every 90 days;
d) Different from the previous password;
e) Not obvious or easily guessed (e.g. birthdays or other memorable dates, memorable names, events, or places etc.); and
f) Created by individual Users.
5.4 All IT Systems with displays and user input devices (e.g. mouse, keyboard, touchscreen etc.) are protected with a password protected screensaver that will activate after 5 minutes of inactivity.touchscreen
Appears in 1 contract
Sources: Data Processing Agreement
Access Security. 5.1 Access privileges for all IT Systems is determined on the basis of employee levels of authority within Bitrix24 Company organization structure and the requirements of their job roles. Employees are not granted access to any IT Systems or electronic data which are not reasonably required for the fulfilment of their job roles.
5.2 All IT Systems (and in particular mobile devices including, but not limited to, laptops, tablets, and smartphones) are protected with a secure password or passcode, or such other form of secure log-in system as the IT Department may deem appropriate and approve.
5.3 All passwords are covered with the following security measures:
a) Are at least 8 characters long;
b) Contain a combination of upper and lower case letters,, numbers, symbols;
c) Changed at least every 90 days;
d) Different from the previous password;
e) Not obvious or easily guessed (e.g. birthdays or other memorable dates, memorable names, events, or places etc.); and
f) Created by individual Users.
5.4 All IT Systems with displays and user input devices (e.g. mouse, keyboard, touchscreen etc.) are protected with a password protected screensaver that will activate after 5 minutes of inactivity.
Appears in 1 contract
Sources: Data Processing Agreement