{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

What Is Access Control?

Remote and hybrid work models are driving new security demands

Photo by FlyD on Unsplash

ISO
Tue, 12/10/2024 - 12:03
  • Comment
  • RSS

Social Sharing block

  • Print
Body

A customer calls asking for details about how they are registered in your company’s database so they can make sure their information is updated. You get a phone call from a business partner who needs to contact your colleague and asks you to check her calendar to see when she’s free. Although in essence quite different, both of these scenarios are requests to access personal data.

ADVERTISEMENT

But what if the person requesting access to personal data isn’t who he or she claims to be? In general, there are two things you must consider when asked to give out somebody’s personal information: the identity of the person asking for the data, and whether they have the right to access that data. The technical term for this is “access control.” Various access control examples can be found in security systems in password-coded doors, fob-controlled gates, badges, biometric systems, motion detectors, and so forth.

 …

Want to continue?
Log in or create a FREE account.
Enter your username or email address
Enter the password that accompanies your username.
By logging in you agree to receive communication from Quality Digest. Privacy Policy.
Create a FREE account
Forgot My Password

Add new comment

Image CAPTCHA
Enter the characters shown in the image.
Please login to comment.
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us