Box Service Access controls Clause Samples

Box Service Access controls. 6.1 (A)(i) Physical Access Controls. Box will implement the following suitable measures in order to prevent unauthorized persons from gaining access to the data processing equipment used to process Content. (a) Access authorization for Box Personnel and third parties (b) Keycards and passes (c) Restrictions on keys (d) Appropriate requirements for third parties (e) Identifying of the persons having authorized access (f) Protection and restriction of entrances and exits (g) Establishing security areas especially for deliveries and handover (h) Securing the building (security alarm system, supervision by guards) 6.1( A)(ii) Technical Access controls. Box will implement the following suitable measures to prevent unauthorized reading, copying alteration or removal of the data media, unauthorized input into memory and reading/alteration/deletion of Content. (a) Access authorization requirements (b) Identification of workstation and/or the users accessing Box systems (c) Automatic disablement of user IDs after multiple erroneous passwords entered (d) Logging of events and activities (including monitoring of break-in attempts) (e) Issuing and safeguarding of identification codes (f) Dedicated workstations for users (g) Authenticating authorized persons (h) Use of encryption where deemed appropriate by Box (i) Separating production and non-production environments (j) Automatic session log-off of users that have been inactive for a period in excess of thirty (30) minutes (k)Designating areas in which data media may/must be located‌
Box Service Access controls. 6.1 (a)(i) Physical Access Controls. Box will implement the following suitable measures in order to prevent unauthorized persons from gaining access to the data processing equipment used to process Content: (a) Access authorizations for Box Personnel and third parties;

Related to Box Service Access controls

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data. b. User Access - DST shall have a process to promptly disable access to Fund Data by any DST personnel who no longer requires such access. DST will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • CUSTOMER SERVICE ACCESS The Competitive Supplier agrees to provide, or cause to be provided, certain customer services to Participating Consumers. Such services shall be reasonably accessible to all Participating Consumers, shall be available during normal working hours, shall allow Participating Consumers to transact business they may have with the Competitive Supplier, and shall serve as a communications liaison among the Competitive Supplier, the Town, and the Local Distributor. A toll-free telephone number will be established by Competitive Supplier and be available for Participating Consumers to contact Competitive Supplier during normal business hours (9:00 A.M. - 5:00 P.M. Eastern Standard Time, Monday through Friday) to resolve concerns, answer questions and transact business with respect to the service received from Competitive Supplier. The Town will post program-related information on the Town’s website which will be available to Participating Consumers for general information, product and service information, and other purposes.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Service Access Access to the clinical parts of our Site is restricted to Users. Users of our Site are provided with unique User IDs by the Clinic with which they are associated and must choose a password of their choice to sign on to our Site. Users must provide personal contact information, and you must ensure that your information is kept up to date at all times. User IDs and passwords constitute an electronic signature and will be used by us to authenticate access to our Site. If a User opts to sign onto ▇▇▇▇▇▇.▇▇▇, the User will be able to take advantage of the non- public sections of our Site. If a User opts not to sign onto our Site, their access to our Site will be restricted to the public sections of our Site only. If you are provided with a User ID, password or any other piece of information as part of our security procedures, you must treat such information as confidential, and you must not disclose it to any third party. We have the right to disable any User ID at any time, if in our opinion, you have failed to comply with any of the provisions of this Agreement. You may only use our Site as set out in this Agreement. Any illegal or unauthorized use of our Site shall constitute a violation of this Agreement. You do not have permission to access our Site in any way that violates this Agreement or breaches any applicable law. You agree to keep your and your Patients’ Data accurate, current and complete. You may print off or download extracts of page(s) from our Site for your use in Patient care or insertion into a Patient’s electronic health records only.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.