Joint Security Requirements. 6.2.1.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
Appears in 10 contracts
Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement
Joint Security Requirements. 6.2.1.1 33.11.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
Appears in 7 contracts
Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement
Joint Security Requirements. 6.2.1.1 9.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
Appears in 6 contracts
Samples: Resale Agreement, Interconnection Agreement, apps.psc.wi.gov
Joint Security Requirements. 6.2.1.1 9.3.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
Appears in 6 contracts
Samples: Agreement, Wholesale Agreement, Agreement
Joint Security Requirements. 6.2.1.1 7.3.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
Appears in 5 contracts
Samples: Agreement, Agreement, Wholesale Agreement
Joint Security Requirements. 6.2.1.1 11.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
Appears in 2 contracts
Samples: MFN Agreement, Interconnection Agreement β Nevada
Joint Security Requirements. 6.2.1.1 8.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
Appears in 1 contract
Samples: PCS Interconnection Agreement