(1) The ability to physically or logically enter or make use of an IT system or area (secured or unsecured.) The process of interacting with a system. (2) The controlled ability or right to obtain, retrieve, alter, destroy, duplicate, copy, scan, photograph, use, examine, print, read, enter, exit, communicate with, and/or view systems or information stored in any media including but not limited to paper, x-ray, film, a computer’s memory, and electronic media such as an internal or external hard drive, a backup tape, or a USB (Universal Serial Bus) stick. For assessments, this term may refer directly to scoped target data or systems. This term includes virtual, digital, and physical access. Source: FFIEC IT Examination Handbook, Information Security. 2021. https://ithandbook.ffiec.gov/glossary.aspx
Access (See also Conditional Access)
- Home
- About Shared Assessments
- About Us New
- Advisory Board
- Assessment Firms
- Awards
- Blog
- Cart
- Certification
- Checkout
- Code of Ethics
- Committee Form
- Committees
- Contact Form
- Controls Evaluation in TPRM: Governance and Information Protection
- Controls Evaluation in TPRM: Technology Management and Operational Risk
- Controls Evealuation in TPRM
- Cookie Notice
- CPE Notice New
- Create an Account
- CTPRA Certification
- Ctpra Course Introduction
- CTPRA Examination Preparation
- CTPRA Job Guide
- CTPRA Practice Test
- CTPRA Practice Test II
- CTPRA Program Requirements
- CTPRA Study Guide
- CTPRP Certification
- CTPRP Examination Preparation Testing Process
- CTPRP Job Guide
- CTPRP Learning Course Introduction
- CTPRP Practice Test
- CTPRP Practice Test II
- CTPRP Program Requirements
- CTPRP Study Guide
- Data Governance Tools
- Directory
- Diversity, Equity and Inclusion
- Download Error
- Earning CPE Hours
- Education
- ESG SIG
- Framework
- Glossary
- Home
- In The Know
- Inherent Risk Rating
- Interagency Guidance Gap Analysis
- Iron Mountain Member Case Study
- Job
- Job Board
- Leadership Team
- Learn
- Licensees
- Licensees
- Login
- Member Benefits
- Members and Subscribers
- Membership New
- My Account
- News
- On Demand Event Video
- Online On-Demand TPRM Certification
- Partner Prospect
- Partnership
- Performing Risk-Based Due Diligence
- Portal
- Privacy Policy
- Product Support Center
- Products
- Quick SIG Demo
- Regulatory Hub
- Reset Password
- SCA
- Setup 2FA
- Shared Assessments Membership Inquiry
- Shared Assessments Product Inquiry
- SIG
- SIG FAQ
- SIG Fundamentals
- Speaker Interest
- Steering Committee
- Subject Matter Experts
- Summit Interest
- Sweepstakes Terms
- Terms And Conditions
- Terms of Use
- The Shared Assessments Third Party Risk Summit
- The Shared Assessments Third Party Risk UK Summit
- Third Party Risk Management Foundation
- Third-Party Risk Program Management
- Tools Support
- TOS Agreement Form
- TPRM Fundamentals
- TPRM Fundamentals – Details
- TPRM Program Design and Structure
- TPRM Program Operations and Implementation
- VRMMM
- Website Terms
- What is the SIG?
- What Is TPRM? A Guide To Third-Party Risk Management
- Workshops
- Best Practices
- Education
- Framework, Industry Guidance, and Regulations
- Risk Landscape
- Shared Assessments
- Tools and Products