Common use of Preventing Unauthorized Product Access Clause in Contracts

Preventing Unauthorized Product Access. Outsourced processing: We host our Service with outsourced cloud infrastructure providers. Additionally, we maintain contractual relationships with vendors in order to provide the Service in accordance with our DPA. We rely on contractual agreements, privacy policies, and vendor compliance programs in order to protect data processed or stored by these vendors. Physical and environmental security: We host our product infrastructure with multi- tenant, outsourced infrastructure providers. We do not own or maintain hardware located at the outsourced infrastructure providers’ data centers. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems. The physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications. Authentication: We implement a uniform password policy for our customer products. Customers who interact with the products via the user interface must authenticate before accessing non-public customer data. Authorization: Customer Data is stored in multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of our products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set. Application Programming Interface (API) access: Public product APIs may be accessed using an API key or through Oauth authorization.

Appears in 9 contracts

Sources: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement

Preventing Unauthorized Product Access. Outsourced Third party data hosting and processing: We host our Service with outsourced third party cloud infrastructure providers. Additionally, we maintain contractual relationships with vendors in order to provide the Service in accordance with our DPA. We rely on contractual agreements, privacy policies, and vendor compliance programs in order to protect data processed or stored by these vendors. Physical and environmental security: We host our product infrastructure with multi- multi-tenant, outsourced infrastructure providers. We do not own or maintain hardware located at the outsourced infrastructure providers’ data centers. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems. The Their physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications. Authentication: We implement a uniform password policy for our customer products. Customers who interact with the products via the user interface must are required to authenticate before accessing they are able to access their non-public data. We support two-factor authentication and highly recommend that each customer dataenable two-factor authentication on their Zapier account. ▇▇▇▇▇▇ also supports Single-Sign On for Team and Company accounts. Authorization: Customer Data User Content (data originated by customers that a customer transmits through Zapier online service) is stored in multi-tenant storage systems which are only accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of our products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set. Application Programming Interface (API) access: Public product APIs may be accessed using an API key or through Oauth OAuth authorization. Authorization credentials are stored encrypted.

Appears in 2 contracts

Sources: Data Processing Addendum, Data Processing Addendum

Preventing Unauthorized Product Access. Outsourced processing: We host our Flowlu, provided by Cloud22 LLC, hosts its Service with outsourced cloud infrastructure providers. Additionally, we maintain Flowlu, provided by Cloud22 LLC, maintains contractual relationships with vendors in order to provide the Service in accordance with our DPAData Processing Agreement. We rely Flowlu, provided by Cloud22 LLC, relies on contractual agreements, privacy policies, and vendor compliance programs in order to protect data processed or stored by these vendors. Physical and environmental security: We host our Flowlu, provided by Cloud22 LLC, hosts its product infrastructure with multi- multi-tenant, outsourced infrastructure providers. We do not own or maintain hardware located at the outsourced infrastructure providers’ data centers. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems. The physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications. Authentication: We implement Flowlu, provided by Cloud22 LLC, implemented a uniform password policy for our customer productsits Service. Customers who interact with the products via the user interface Service must authenticate before accessing non-public customer data. Authorization: Customer Data data is stored in multi-tenant storage systems accessible to Customers customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of our Cloud22 LLC’s products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set. Application Programming Interface (API) access: Public product APIs may be accessed using an API key or through Oauth authorization.

Appears in 1 contract

Sources: Data Processing Agreement

Preventing Unauthorized Product Access. Outsourced processing: We host our Service with on an outsourced cloud infrastructure providersprovider, according to a shared responsibility model. Additionally, we maintain contractual relationships with vendors in order to provide the Service Services in accordance with our DPA. We rely on contractual agreements, privacy policies, and vendor compliance programs in order to protect data processed or stored by these vendors. Physical and environmental security: We host our product infrastructure with multi- multi-tenant, outsourced infrastructure providers. We do not own or maintain hardware located at the outsourced infrastructure providers’ data centers. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems. The physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications2. Authentication: We implement a uniform password policy for our customer products. Customers who interact with the products via the user interface must authenticate before accessing non-public customer dataCustomer Data. Authorization: Customer Data is stored in multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of our products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set. Application Programming Interface (API) access: Public product APIs may can be accessed using an API key or through Oauth authorization.

Appears in 1 contract

Sources: Data Processing Agreement

Preventing Unauthorized Product Access. Outsourced processing: We host our Service with outsourced cloud infrastructure providers. Additionally, we maintain contractual relationships with vendors in order to provide the Service in accordance with our DPA. We rely on contractual agreements, privacy policies, and vendor compliance programs in order to protect data processed or stored by these vendors. Physical and environmental security: We host our product infrastructure with multi- tenant, outsourced infrastructure providers. We do not own or maintain hardware located at the outsourced infrastructure providers’ data centers. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems. The infrastructure providers’ physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications. Authentication: We implement a uniform password policy for our customer products. Customers who interact with the products via the user interface must authenticate before accessing non-public customer data. Authorization: Customer Data is stored in multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of our products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set. Application Programming Interface (API) access: Public product APIs may be accessed using an API key Oauth authorization or through Oauth authorization.private app tokens. DocuSign Envelope ID: 6B0F8A46-FCB7-428F-B693-75ECDA54B8D2

Appears in 1 contract

Sources: Data Processing Agreement

Preventing Unauthorized Product Access. Outsourced processing: We host our Service with on an outsourced cloud infrastructure providersprovider, according to a shared responsibility model. Additionally, we maintain contractual relationships with vendors in order to provide the Service Services in accordance with our DPA. We rely on contractual agreements, privacy policies, and vendor compliance programs in order to protect data processed or stored by these vendors. Physical and environmental security: We host our product infrastructure with multi- multi-tenant, outsourced infrastructure providers. We do not own or maintain hardware located at the outsourced infrastructure providers’ data centers. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems. The physical and environmental security controls are audited for SOC 2 Type II 1. We are working on SOC 2 Type 2 and ISO 27001 compliance, among other certificationswill update this DPA accordingly. Authentication: We implement a uniform password policy for our customer products. Customers who interact with the products via the user interface must authenticate before accessing non-public customer dataCustomer Data. Authorization: Customer Data is stored in multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of our products is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set. Application Programming Interface (API) access: Public product APIs may can be accessed using an API key or through Oauth authorization.

Appears in 1 contract

Sources: Data Processing Agreement

Preventing Unauthorized Product Access. Outsourced processing: We host our Acalvio hosts Acalvio’s Service with outsourced cloud infrastructure providers. Additionally, we maintain Acalvio maintains contractual relationships with vendors in order to provide the Service in accordance with our Acalvio’s DPA. We rely Acalvio relies on contractual agreements, privacy policies, and vendor compliance programs in order to protect data processed or stored by these vendors. Physical and environmental security: We host our Acalvio hosts Acalvio’s product infrastructure with multi- tenant or single-tenant, outsourced infrastructure providers. We do not own or maintain hardware located at the outsourced infrastructure providers’ data centers. Production servers and client-facing applications are logically and physically secured from our internal corporate information systems. The physical and environmental security controls are audited for SOC 2 Type II and ISO 27001 compliance, among other certifications. Authentication: We implement Acalvio implements a uniform password policy for our customer productsAcalvio’s ShadowPlex deployment. Customers who interact with the products ShadowPlex via the user interface must authenticate before accessing non-public customer data. Authorization: Customer Data is stored in single-tenant or multi-tenant storage systems accessible to Customers via only application user interfaces and application programming interfaces. Customers are not allowed direct access to the underlying application infrastructure. The authorization model in each of our products the ShadowPlex deployment is designed to ensure that only the appropriately assigned individuals can access relevant features, views, and customization options. Authorization to data sets is performed through validating the user’s permissions against the attributes associated with each data set. Application Programming Interface (API) access: Public product APIs may be accessed using an API key or through Oauth authorization.

Appears in 1 contract

Sources: Data Processing Agreement