Activity Logging. Where technically available, IBM maintains logs of access to systems and applications in order to detect and prevent unauthorized activity.
Appears in 2 contracts
Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement
Activity Logging. Where technically available, for systems, applications, and network infrastructure devices, IBM maintains logs of access to systems and applications in order to detect and prevent unauthorized its activity.
Appears in 2 contracts
Samples: Ibm Cloud Services Agreement, Ibm Cloud Services Agreement