Logical Controls Clause Samples

Logical Controls. All systems containing Intel Confidential information will have strong access control mechanisms in place. Each system user must have a unique identifier and password combination. There must be control methods for securely granting and revoking access to these systems.
Logical Controls. All systems containing Intel Confidential information will have strong access control mechanisms in place. Each system user must have a unique identifier and strong password combination. A strong password must be per industry standard, but at least 6 digits in length and comprised of alphanumeric and special characters. There must be control methods for securely granting and revoking access to these systems. An audit trail sufficient to support an investigation must be maintained for changes to the security configuration and for system use (e.g. system security logs, user activity logs). Information classified as Intel confidential must be encrypted in network transit. Information above Intel confidential will require additional security controls as specified in the Enhanced Data Security Addendum.
Logical Controls. To the extent You Access Protected Information using Your systems, You will: (i) establish and enforce access control policies and measures to ensure that only individuals who have a legitimate need to Access Protected Information will have such access, including multi-factor authentication; (ii) promptly terminate an individual’s access to Protected Information when such access is no longer required for performance under the Agreement; (iii) maintain reasonable and up-to-date anti-malware, anti-spam, and similar controls on Your networks, systems, and devices; (iv) log the appropriate details of access to Protected Information on Your systems and equipment, plus alarms for attempted access violations, and retain such records for no less than 90 days; (v) maintain controls and processes designed to ensure that all operating system and application security patches are installed within the timeframe recommended or required by the issuer of the patch; and (vi) implement reasonable user account management procedures to securely create, amend, and delete user accounts on networks, systems, and devices through which You Access Protected Information, including monitoring redundant accounts and ensuring that information owners properly authorize all user account requests.

Related to Logical Controls

  • Personal Controls a. Employee Training. All workforce members who assist in the performance of functions or activities on behalf of COUNTY in connection with Agreement, or access or disclose PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, must complete information privacy and security training, at least annually, at CONTRACTOR’s expense. Each workforce member who receives information privacy and security training must sign a certification, indicating the member’s name and the date on which the training was completed. These certifications must be retained for a period of six (6) years following the termination of Agreement.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data. b. User Access - DST shall have a process to promptly disable access to Fund Data by any DST personnel who no longer requires such access. DST will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • ▇▇▇▇▇▇▇▇-▇▇▇▇▇; Disclosure Controls The Company is in compliance in all material respects with all of the provisions of the ▇▇▇▇▇▇▇▇-▇▇▇▇▇ Act of 2002 which are applicable to it. The Company maintains disclosure controls and procedures (as such term is defined in Rule 13a-15(e) and 15d-15(e) under the Exchange Act), and such disclosure controls and procedures are effective.

  • Internal Controls The Company shall maintain a system of internal accounting controls sufficient to provide reasonable assurances that: (i) transactions are executed in accordance with management’s general or specific authorization; (ii) transactions are recorded as necessary in order to permit preparation of financial statements in accordance with GAAP and to maintain accountability for assets; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with existing assets at reasonable intervals and appropriate action is taken with respect to any differences.

  • Personnel Controls The County agrees to advise Contractor Staff, who have access to PII, of the confidentiality of the information, the safeguards required to protect the information, and the civil and criminal sanctions for non-compliance contained in applicable federal and state laws. For that purpose, the Contractor shall implement the following personnel controls: