Audit Trail Responsibilities Clause Samples

The Audit Trail Responsibilities clause defines the obligations of parties to maintain accurate and comprehensive records of transactions and activities related to the agreement. Typically, this involves keeping logs, documentation, or electronic records that detail actions taken, changes made, or data accessed, and may require parties to make these records available for inspection or review upon request. The core function of this clause is to ensure transparency and accountability, enabling verification of compliance and facilitating the detection and investigation of errors or unauthorized activities.
Audit Trail Responsibilities. CBP maintains an audit trail and employs intrusion detection measures to maintain security and system integrity.
Audit Trail Responsibilities. Both Parties are responsible for auditing and monitoring their own application processes and user activities involving these interconnection activities that will be recorded, including event type, date and time of event, user identification, workstation identification, success or failure of access attempts, and security actions taken by system administrators or security officers. Audit logs will be retained for a minimum of three (3) years. Material Changes to System Configuration. Planned technical changes to system architecture that directly impact one or more of the applications or system resources used to interface with the other Party will be reported to technical staff. The initiating Party will endeavor to notify the other Party no later than thirty (30) days before such changes are implemented. If applicable, the initiating Party agrees to conduct a risk assessment based on the new system architecture. If applicable, the Parties will amend the terms of this ISA within thirty (30) days of implementation.
Audit Trail Responsibilities. Both parties are responsible for auditing application processes and user activities involving the interconnection with enough granularity to allow successful investigation of any breaches and security incidents. Activities that will be recorded include event type, date and time of event, user identification, workstation identification, success or failure of access attempts, and security actions taken by system administrators or security officers. Audit logs will be retained for a minimum of one (1) year or as documented in the National Archives and Records Administration (NARA) retention periods, HIPAA legislation or whichever is greater. Audit logs which describe a security breach must be maintained for six (6) years. Those responsible for maintaining audit logs must ensure that audit logs are successfully stored for the required duration.
Audit Trail Responsibilities. All parties are responsible for auditing application processes and user activities involving the interconnection. Activities that shall be recorded include: event type, date and time of event, user identification, workstation identification, success or failure of access attempts, and security actions taken by system administrators or security officers. Members must maintain traffic logs of all authorized network traffic between Members and the Network for a minimum of thirty (30) days.