Identification and Authentication Sample Clauses
Identification and Authentication. Customer shall assure that any access to any database related to the Cloud Services, whether by Customer or SAP, is automatically disconnected after a period of no-activity and that it has in place a method of handling malfunctions connected with identification authentication, all in accordance with the requirements under Section 9 of the Regulations.
Identification and Authentication. For access to In-Scope Information and for host devices that support it, assign unique credentials (eg. UserIDs, passwords) to authorized individual users, assign individual ownership to system service accounts, and ensure that system service accounts are not shared by administrators.
Identification and Authentication. The purpose of authentication is to provide reliable identification for access to data or information systems. Entity must maintain the identity of active users, linking actions to specific users, and all other identification and authentication requirements. Non-repudiation must be maintained for each user accessing DPS data.
Identification and Authentication. All access to any Customer Information or any West Processing Resources shall be Identified and Authenticated as defined in this Section. “Identification” refers to processes which establish the identity of the person or entity requesting access to Customer Information and/or West Processing Resources. “Authentication” refers to processes which validate the purported identity of the requestor. For access to Customer Information or West Processing Resources, West shall require Authentication by the use of an individual, unique user ID and an individual password and/or other appropriate Authentication technique (e.g. soft token, pin, etc.). West shall obtain written approval from Customer prior to using digital certificates as part of West’s Identification or Authorization processes. West shall maintain procedures to ensure the protection, integrity, and soundness of all passwords created by West and/or used by West in connection with the Agreement.
Identification and Authentication. User ID Requirements. The PSAP Manager shall require a unique logon ID to the Call Handling software system for every dispatcher (but not the PC Windows): Password Requirements. PSAP shall include the following minimum standards for establishing passwords:
Identification and Authentication. All access to any Mercury Information or any Global Processing Resources shall be Identified and Authenticated as defined in this Section. “Identification” refers to processes which establish the identity of the person or entity requesting access to Mercury Information and/or Global Processing Resources. “Authentication” refers to processes which validate the purported identity of the requestor. For access to Mercury Information or Global Processing Resources, each party shall require *****. Each party shall maintain its own procedures to ensure the protection, integrity, and soundness of all passwords created and/or used in connection with the Agreement.
Identification and Authentication. Each user who shares data as part of the eHealth Exchange shall be uniquely identified and their identity verified prior to granting access to a Participant’s system.
Identification and Authentication. The data importer shall take the measures that ensures the identification and authentication of the users. The data importer shall establish a mechanism that permits the identification of any user who tries to access the information system and the verification of his authorization. The data importer’s documentation shall establish the frequency, which under no circumstances shall be less than yearly, with which the passwords shall be changed. While in force, passwords shall be stored in an unintelligible way.
Identification and Authentication. 12.1 In relation to access to ▇▇▇▇▇▇▇ Data, either in electronic or hard copy, by the Supplier’s team, the Supplier shall:
(a) Require Strong Authentication (i.e. Multi-factor authentication) for any remote access use of non-public Information Resources
(b) Ensure that access to systems that process ▇▇▇▇▇▇▇ Data is enforced through a centralized identity provider that conforms to industry best practise.
(c) Use a secure method for the conveyance of authentication credentials (i.e. passwords) and authentication mechanisms (i.e. tokens or smart cards)
(d) Where appropriate adopt a risk-based authentication mechanism such that authentication methods are tiered and proportionate to the sensitivity of the ▇▇▇▇▇▇▇ Data to be accessed (i.e. the use of stronger form of authentication for accessing ▇▇▇▇▇▇▇ Personal Information)
(e) Have and use a documented User ID lifecycle management process including procedures for approved account creation, account removal immediately on termination or within 24 hours on role change, and account modification (i.e. changes to privileges, span of access, functions/roles) for all Information Resources and across all environments (e.g., production, test, development, etc.). Such process shall include review of access privileges and account validity to be performed at least quarterly.
Identification and Authentication. The controller will establish a mechanism that allows the unequivocal and personalized identification of all those users who try to access the information system and the verification that they are authorized. When the authentication mechanism is based on the existence of passwords, these must meet minimum complexity requirements and must be changed at least every 6 months. The controller will establish a mechanism that limits the possibility of repeatedly attempting unauthorized access to the information system.