User control Clause Samples
The User Control clause defines the rights and mechanisms by which users can manage their personal information or account settings within a system or service. Typically, this clause outlines the options available to users, such as updating contact details, changing privacy preferences, or deactivating their accounts through accessible interfaces or support channels. Its core practical function is to empower users with autonomy over their data and interactions, thereby enhancing transparency and trust while ensuring compliance with privacy regulations.
User control. The use of automated data processing systems via facilities for data transfer (e.g. via remote access) by unauthorized persons is prevented.
User control. It must be prevented that data processing systems can be used by unauthorised persons using data transmission devices. Administrator accounts are used at the following level in the company: ● Database ● Application Special administrator accounts are used in the company. The access to hardware interfaces of relevant terminal devices is blocked in the company.
User control. It must be prevented that data processing systems can be used by unauthorised persons using data transmission devices. Administrator accounts are used at the following level in the company: ● Database ● Application Special administrator accounts are used in the company. Userlane GmbH ▇▇▇▇▇▇▇▇▇▇▇ ▇▇▇. ▇▇▇▇ ▇▇▇▇▇ ▇▇▇▇▇▇ Registry: HRB ▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇▇ ▇▇▇▇▇▇ Board of Directors: ▇▇▇▇▇▇▇ ▇▇▇▇, ▇▇▇▇▇ ▇▇▇▇▇▇▇ Document Owner: Contact: ▇▇▇@▇▇▇▇▇▇▇▇.▇▇▇ Date of last modification: 19th May 2021 Page: 11 of 16 The access to hardware interfaces of relevant terminal devices is blocked in the company.
User control. Measures to ensure that unauthorized persons cannot use automated data processing sys- tems by means of data transmission equipment. ☒Login with username + password ☒Manage user permissions ☐Login with biometric data ☒Creating user profiles ☐Anti-virus software server ☐Central password assignment ☒Anti-virus software clients ☒Secure Password Policy ☒Anti-virus software mobile devices ☒Delete / Destroy" Policy ☒Firewall ☐Clean desk" guideline ☒Intrusion detection systems ☒General Policy Data Protection and /or security ☒Mobile Device Management ☒Mobile Device Policy ☒Use VPN for remote access ☐Manual desktop lock" instructions ☒Encryption smartphones ☐ ☒Housing lock ☐ ☐BIOS protection (separate password) ☐ ☒Locking external interfaces (USB) ☐ ☒Automatic desktop lock ☐ ☒Encryption of notebooks / Tablet ☐ ☐ ☐
User control. You acknowledge and agree that you are solely responsible for all Content you input, create, manage, and store within the Application. This includes, but is not limited to, ensuring the legality, accuracy, and appropriateness of your Content.
User control. All employees must attend mandatory basic training on information security and data privacy on an annual basis. Attendance at this training is recorded and its effectiveness is validated by an audit. New employees are familiarized with the essential information security and data protection regulations relevant to them at the start of their employment or assignment. User activities, including logon attempts to data processing systems (IT systems), are logged to the extent required. User accounts that can be used to access personal data as part of commissioned processing must be personalized and may not be shared by more than one person. Central monitoring is carried out to monitor utilization with threshold-based alerting (e.g. CPU, memory) and error monitoring. In addition, event information from IT solutions in use is evaluated. Administrative activities on IT systems (such as changes to system configurations) are logged. Configuration files are historized, backed up and checked regularly and as required.
User control. Prevention of the use by unauthorised persons of automated processing systems with the aid of facilities for data transmission.
User control. THE CUSTOMER will be responsible for acts and omissions of its USERS as if they were acts and omissions of the CUSTOMER itself. As a general understanding, a credential means setting a username (login) and password. The CUSTOMER shall ensure that persons who cease to be authorized to access SIGNATURE have their credentials revoked and/or blocked. Blockbit will not interfere, operate or register USERS, unless this responsibility is expressly described in the ORDER or additive to this agreement.
User control. The Processor shall implement suitable measures to prevent its data processing systems from being used by unauthorized persons by means of data transmission equipment. In addition, the Processor shall implement suitable measures to prevent unauthorized reading, copying, alteration or removal of the data media, unauthorized input into memory, reading, alteration or deletion of the stored Personal Data. This shall be accomplished by: Authorization concept; Terminal with access user key; Identification of the terminal and / or the terminal user to the system of the Processor; Automatic turn-off of the user ID when several erroneous passwords where entered; Log file of events (monitoring of break-in attempts); Issuing and safeguarding the identification codes; Dedication of individual terminals and/or terminal users; Identification characteristics exclusive to specific functions; Authentication of the authorized personnel; Protective measures for the data input into memory as well as for the reading, blocking and deletion of stored Personal Data; Use of encryption for critical security files; Specific access rules for procedures, control cards, process control methods, program cataloguing authorization; Guidelines for data file organisation; Keeping records of data file use; Separation of production and test environment for libraries and data files; Providing that entries to data processing facilities (rooms, housing, computer hardware and related equipment) are capable of being locked; Automatic log-off of user IDs that have not been used for a substantial period of time; Designating the areas in which data media may / must be located; Designating the persons in such areas for authorized remove of data media; Controlling the removal of data media; Securing the areas in which data media are located; Release of data media only to authorized persons; Control of files, controlled and documented destruction of data media; Policies controlling the production of backup copies.
User control. The Company will use commercially reasonable efforts to ensure that the Property Monitor application:
(a) Permits users to disenroll by cancelling or deleting the user account at any time;
(b) Enables users to permanently or temporarily disable notifications on any or all notification modalities (i.e., telephone call, text message, email); and
(c) Enables users to permanently or temporarily suspend notifications for any particular property.