Privileged Access Clause Samples

The Privileged Access clause defines the conditions under which certain individuals or entities are granted special rights to access specific information, systems, or areas that are otherwise restricted. Typically, this clause outlines who qualifies for privileged access, the scope of their permissions, and any obligations or limitations associated with such access, such as confidentiality requirements or audit rights. Its core practical function is to control and monitor sensitive access, thereby protecting confidential information and reducing the risk of unauthorized disclosure or misuse.
POPULAR SAMPLE Copied 2 times
Privileged Access. Management of privileged user accounts (e.g., those accounts that have the ability to override system controls), to include service accounts, must follow a documented processes and be restricted. A periodic review and governance process must be maintained to ensure appropriate provisioning of privileged access.
Privileged Access. Computershare shall ensure that:
Privileged Access. Computershare shall ensure that: i. Privileged user access accounts are not provided for use in day-to-day operations. ii. Users provided with privileged user access have such access terminated within two days following the relevant user leaving Computershare’s employment.
Privileged Access. Compliance with this section of the VISR is required for the entire duration of the engagement if Vendor (i) manages IT systems (hardware or software) for VEIC or (ii) is responsible for any aspect of Identity and Access Management (IAM) related to VEIC systems, including Privileged Access controls. For purposes of clarity, this Section 7 will apply only if Vendor is providing services pursuant to Sections 4, 5 or 6 above. “Privileged Access” is defined as access that provides a capability to alter the properties, behavior, or control of an information resource, change system control parameters, alter other usersaccess to data, or bypass or change system and security controls. In these situations, Vendor shall: a) Maintain and disseminate to Vendor employees a written access control policy based on reputable industry standards and the least privileged access principle. b) Include formal instructions for the following in Vendor’s IAM procedures: 1. Approval for, creation of and providing entitlements for privileged accounts; and 2. Removal of Privileged Access upon termination of the engagement with Vendor, when Vendor personnel change functions and no longer require access, when Vendor personnel are no longer assigned to the VEIC account or, for any reason, Privileged Access is no longer required. c) Maintain a recertification cycle (validation of permissions granted) for privileged accounts that includes: 1. Maintaining a list of Vendor personnel with Privileged Access to VEIC Systems or other IT resources that support VEIC Systems or operations; 2. Reviewing Vendor personnel’s access rights at regular intervals (at least quarterly) and after any changes, such as promotion, demotion, or termination of employment; 3. Taking immediate action to correct any discrepancies discovered during this review; and 4. Upon request by Company, providing reporting related to this review. d) Monitor and adequately log creation of and changes to privileged accounts for systems used by, accessed by, or in-place to support Company and, upon discovery of anomalies, notify Company; e) Monitor and adequately log all actions performed by Vendor personnel with Privileged Access to systems used by, accessed by or in-place to support Company, report any anomalies to Company and, upon request, provide a history of all system management actions performed by Vendor personnel that could impact the confidentiality, integrity or availability of services or systems; f) Implement proced...
Privileged Access. Executive shall have no authority, on behalf of the Company or its affiliates, to enter into any agreement with any entity controlling, controlled by or affiliated with Privileged Access L.P. (“PA”) However, as the sole equity owner of PA, Executive shall have sole authority to determine the accounting and tax policies of PA, which authority shall include, without limitation, complete control of the preparation and filing of PA’s tax returns and related forms and the engagement of PA’s financial and tax advisors.
Privileged Access. For a period of thirty-six (36) months after the Effective Date, ABCO will provide Evolent with “privileged” access to senior executives (including Chief Executive Officers (“CEOs”) and other C-suite executives) of ABCO’s members by facilitating and enabling Evolent’s participation in targeted breakout sessions during the national CEO meeting series that are organized and/or sponsored by ABCO from time to time in order to promote the Evolent platform, in each case in ABCO’s reasonable discretion.
Privileged Access. 17.1 The Reseller will ensure that: 17.1.1 Privileged User Access accounts are not provided for use in day-to-day operations; and 17.1.2 Privileged User Access to production systems by developers must be used only for planned and appropriately authorised changes.
Privileged Access 

Related to Privileged Access

  • Third Party Access Client is prohibited from disclosing data from the Data Set to any third party without obtaining written permission from Oracle.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.