END USER DEVICES. a) Laptops and desktops used by Supplier personnel that may come into contact with Juniper Data must meet the following requirements: i. Full-disk encryption must be implemented. b) Smartphones and Tablets must not be allowed to access, process, or store Juniper Data. Juniper Networks Data Protection Agreement 03182020 10
Appears in 2 contracts
Sources: Data Protection Agreement, Data Protection Agreement
END USER DEVICES. a) Laptops and desktops used by Supplier personnel that may come into contact with Juniper Data must meet the following requirements:
i. Full-disk encryption must be implemented.
b) Smartphones and Tablets must not be allowed to access, process, or store Juniper Data. Juniper Networks Data Protection Agreement 03182020 10
Appears in 1 contract
Sources: Data Protection Agreement
END USER DEVICES. a) Laptops and desktops used by Supplier personnel that may come into contact with Juniper Data must meet the following requirements:
i. Full-disk encryption must be implemented.
b) Smartphones and Tablets must not be allowed to access, process, or store Juniper Data.
c) Refer section 2.a.v. Juniper Networks Data Protection Agreement 03182020 10of this document for Third Party Secure Access guidelines.
Appears in 1 contract
Sources: Supplier Data Protection Agreement