Common use of Joint Security Requirements Clause in Contracts

Joint Security Requirements. 6.2.1.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 10 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

AutoNDA by SimpleDocs

Joint Security Requirements. 6.2.1.1 33.11.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 7 contracts

Samples: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

Joint Security Requirements. 6.2.1.1 9.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 6 contracts

Samples: Resale Agreement, Interconnection Agreement, apps.psc.wi.gov

Joint Security Requirements. 6.2.1.1 9.3.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 6 contracts

Samples: Agreement, Wholesale Agreement, Agreement

Joint Security Requirements. 6.2.1.1 7.3.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 5 contracts

Samples: Agreement, Agreement, Wholesale Agreement

AutoNDA by SimpleDocs

Joint Security Requirements. 6.2.1.1 11.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 2 contracts

Samples: MFN Agreement, Interconnection Agreement – Nevada

Joint Security Requirements. 6.2.1.1 8.2.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 1 contract

Samples: PCS Interconnection Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.