Logical access definition
Logical access means providing an authorized user the ability to access one or more computer system resources such as a workstation, network, application, or database through automated tools. A logical access control system (LACS) requires validation of an individual’s identity through some mechanism such as a personal identification number (PIN), PIV card, username and password, biometric, or other token. The system has the capability to assign different access privileges to different persons depending on their roles and responsibilities in an organization.
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization.
Logical access means providing an authorized user the ability to access one or more computer system resources such as a workstation, network, application, or database through automated tools. A logical access control system (LACS) requires validation of an individual’s identity
Examples of Logical access in a sentence
Logical access to the production environment by GoodData employees is limited to authorized operational engineers only, protected by multi-factor authentication and allowed only when justified by a business need.
More Definitions of Logical access
Logical access means control measures used for identification, authentication, authorization, and accountability in digital systems, programs, processes, and information.
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization. “Personal Identity Verification (PIV) card,” as defined in FIPS PUB 201-2, is a physical artifact (e.g., identity card, “smart” card) issued to an individual that contains a PIV Card Application which stores identity credentials (e.g., photograph, cryptographic keys, digitized fingerprint representation) so that the claimed identity of the cardholder can be verified against the stored credentials by another person (human readable and verifiable) or an automated process (computer readable and verifiable). “Personal Identity Verification-Interoperable (PIV-I) card” similar to a PIV card, is a physical artifact (e.g., identity card, “smart” card) issued to an individual that contains a PIV Card Application which stores identity credentials (e.g., photograph, cryptographic keys, digitized fingerprint representation) so that the claimed identity of the cardholder can be verified against the stored credentials by another person (human readable and verifiable) or an automated process (computer readable and verifiable). PIV-I cards are issued by a non-federal government entity to non-federal government staff. PIV-I cards are issued in a manner that allows federal relying parties to trust the cards. The PIV-I cards uses the same standards of vetting and issuance developed by the U.S. government for its employees
Logical access means the ability for the Contractor to interact with CMS information systems, databases, digital infrastructure, or data via access control
Logical access means the ability for the contractor to interact with Centers for Medicare and Medicaid Services information systems, databases, digital infrastructure, or data via access control procedures such as identification, authentication, and authorization.
Logical access. Controls: Procedures are in place to prevent unauthorized access to Personal Data that is stored on computer systems (e.g., secure passwords, multifactor authentication, system monitoring). • Physical Access Controls: Procedures are in place to prevent unauthorized access to physical locations where Personal Data is processed (e.g., office entry • Kontrola přístupu k údajům: K osobním údajům mohou přistupovat, používat je, kopírovat, upravovat nebo mazat pouze oprávnění pracovníci pro účely stanovené v příloze B smlouvy (např. zajištění přístupu na základě rolí). • Logická kontrola přístupu: Jsou zavedeny postupy, které zabraňují neoprávněnému přístupu k osobním údajům uloženým v počítačových systémech (např. bezpečná hesla, vícefaktorové ověřování, monitorování systému). • Fyzická kontrola přístupu: Jsou zavedeny postupy, které zabraňují neoprávněnému přístupu k fyzickým místům, kde se osobní údaje zpracovávají