Common use of Circumstantial information Clause in Contracts

Circumstantial information. This is information logged for security auditing purposes such as the IP address from which Users connect or which records were created, accessed or changed. The Provider screens and anal- yses these logs solely for the purpose of securing the deployment and protecting the information therein. The Provider deletes logs after 90 days.

Appears in 3 contracts

Samples: assets.applytosupply.digitalmarketplace.service.gov.uk, store.xleap.net, store.meetingsphere.com

AutoNDA by SimpleDocs

Circumstantial information. This is information logged for security auditing purposes such as the IP address from which Users connect or which records were created, accessed accessed, or changed. The Provider screens and anal- yses analyses these logs solely for the purpose of securing the deployment and protecting the information therein. The Provider deletes logs after 90 days.

Appears in 2 contracts

Samples: store.xleap.net, store.meetingsphere.com

Circumstantial information. This is information logged for security auditing purposes such as the IP address ad- dress from which Users connect or which records were created, accessed accessed, or changed. The Provider screens and anal- yses analyses these logs solely for the purpose of securing the deployment and protecting the information therein. The Provider deletes logs after 90 days.

Appears in 2 contracts

Samples: store.xleap.net, store.meetingsphere.com

Circumstantial information. This is information logged for security auditing purposes such as the IP address from which Users connect or which records were created, accessed accessed, or changed. The Provider screens and anal- yses these logs solely for the purpose of securing the deployment and protecting the information therein. The Provider deletes logs after 90 days.

Appears in 2 contracts

Samples: These Terms, These Terms

AutoNDA by SimpleDocs

Circumstantial information. This is information logged for security auditing purposes such as the IP address from which Users connect or which records were created, accessed accessed, or changed. The Provider screens and anal- yses analyzes these logs solely for the purpose of securing the deployment and protecting the information therein. The Provider deletes logs after 90 days.

Appears in 1 contract

Samples: store.meetingsphere.com

Time is Money Join Law Insider Premium to draft better contracts faster.