ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.
ACCESS TO SECURITY LOGS AND REPORTS. CONTRACTOR PERFORMANCE AUDIT PERSONNEL
ACCESS TO SECURITY LOGS AND REPORTS. CONTRACTOR PERFORMANCE AUDIT PERSONNEL BUSINESS CONTINUITY/DISASTER RECOVERY (BC/DR) OPERATIONS
ACCESS TO SECURITY LOGS AND REPORTS. The Contractor shall provide reports on a schedule specified in the SLA to the Purchasing Entity in a format as specified in the SLA agreed to by both the Contractor and the Purchasing Entity. Reports shall include latency statistics, user access, user access IP address, user access history and security logs for all public jurisdiction files related to this Master Agreement and applicable Participating Addendum.
ACCESS TO SECURITY LOGS AND REPORTS a. The Contractor shall provide reports on a schedule specified in the SLA to the Contractor directly related to the infrastructure that the Contractor controls upon which the Purchasing Entity’s account resides. Unless otherwise agreed to in the SLA, the Contractor shall provide the public jurisdiction a history or all API calls for the Purchasing Entity account that includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters and the response elements returned by the Contractor. The report will be sufficient to enable the Purchasing Entity to perform security analysis, resource change tracking and compliance auditing
b. The Contractor and the Purchasing Entity recognize that security responsibilities are shared. The Contractor is responsible for providing a secure infrastructure. The Purchasing Entity is responsible for its secure guest operating system, firewalls and other logs captured within the guest operating system. Specific shared responsibilities are identified within the SLA.
ACCESS TO SECURITY LOGS AND REPORTS a. The Contractor shall provide reports on a schedule specified in the SLA to the Purchasing Entity in a format as specified in the SLA and agreed to by both the Contractor and the Purchasing Entity. Reports will include latency statistics, user access, user access IP address, user access history and security logs for all Purchasing Entity files related to the Master Agreement, Participating Addendum, or SLA.
b. The Contractor and the Purchasing Entity recognize that security responsibilities are shared. The Contractor is responsible for providing a secure infrastructure. The Purchasing Entity is responsible for its secure guest operating system, firewalls and other logs captured within the guest operating system. Specific shared responsibilities are identified within the SLA.
ACCESS TO SECURITY LOGS AND REPORTS. The contractor shall provide to the State reports on a schedule and in a format specified in the Service Level Agreement as agreed to by both the contractor and the State. Reports shall include latency statistics, user access, user access IP address, user access history, and security logs for all Data. The State’s audit requirements shall, if applicable, be defined in the Statement of Work.
ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Consultant shall provide reports to NYSDOT in a format as specified in the Contract.
ACCESS TO SECURITY LOGS AND REPORTS. The Contractor shall provide reports to the City in a format as agreed to by both the Contractor and the City. Reports shall include latency statistics, user access, user access IP address, API calls for the City’s account including the source IP address of the API caller, the request parameters and the response elements returned, user access history and security logs for all City Data and digital content related to this Agreement. The reports shall be sufficient to enable the City to perform security analysis, resource change tracking and compliance auditing.
ACCESS TO SECURITY LOGS AND REPORTS. Vendor shall provide security logs and reports to OCIO in a mutually agreeable format upon request. Such reports shall include at least latency statistics, user access summaries, user access IP address summaries, user access history and security logs for all State files related to the underlying agreement.