Common use of Joint Security Requirements Clause in Contracts

Joint Security Requirements. 7.3.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 6 contracts

Samples: Telecommunications, Telecommunications, Telecommunications

AutoNDA by SimpleDocs

Joint Security Requirements. 7.3.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 3 contracts

Samples: Telecommunications, Peering Agreement, Wholesale Agreement

Joint Security Requirements. 7.3.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.). 7.3.2 Both Parties shall maintain accurate and complete records detailing the individual data connections and systems to which they have granted the other Party access or interface privileges. These records will include, but are not limited to, user ID assignment, user request records, system configuration, time limits of user access or system interfaces. These records

Appears in 2 contracts

Samples: Two Way CMRS Interconnection Agreement, Two Way CMRS Interconnection Agreement

AutoNDA by SimpleDocs

Joint Security Requirements. 7.3.1 9.3.1 Both Parties will maintain accurate and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 1 contract

Samples: Telecommunications

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!