ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.
Appears in 95 contracts
Samples: Contract for the Acquisition of Information Technology Commodities and/or Services, Contract for the Acquisition of Information Technology Commodities and/or Services, Contract for the Acquisition of Information Technology Commodities and/or Services
ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.
Appears in 55 contracts
Samples: Contract for the Acquisition of Information Technology Commodities and/or Services, Contract for the Acquisition of Information Technology Commodities and/or Services, Contract for the Acquisition of Information Technology Commodities and/or Services
ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User AgreementAgreement or Purchase Order.
Appears in 3 contracts
Samples: Contract for the Acquisition of Electronic Poll Book Systems, Contract for the Acquisition of Electronic Poll Book Systems, Contract for the Acquisition of Electronic Poll Book Systems
ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User AgreementPurchase Order.
Appears in 1 contract
Samples: Centralized Contract for the Acquisition of Voting Systems and Related Services and Accessories