Log Files. As is true of most websites, we gather certain information automatically and store it in log files. This information includes IP addresses, browser type, (ISP, referring/exit pages, operating system, date/time stamp, and clickstream data. We use this information to analyze trends, to administer the Website, to track users' movements around the Website and to improve our Website usability.
Log Files. Upon written request by Primus, Distributor shall transmit to Primus a current, complete and correct copy of the log file for each server on which the Software is installed; provided, however, that unless review of a log file has indicated additional fees are due to Primus, Primus may not request a copy of any one log file more frequently than once a year.
Log Files. Upon written request by Primus, Distributor shall, to the extent provided by the Software License Agreement, and except as restricted by applicable local law, transmit to Primus a current, complete and correct copy of the log file for each server of Distributor, its sub-distributors and of Authorized End-Users on which the Software is installed; provided, however, that unless review of a log file has indicated additional fees are due to Primus, Primus (i) may not request a copy of the log file more frequently than once a quarter, and (ii) shall pay Distributor's reasonable expenses incurred with respect to such transmission.
Log Files. As is true of most websites, we gather certain information automatically and store it in log files. This information includes internet protocol (IP) addresses, browser type, internet service provider (ISP), referring/exit pages, operating system, date/time stamp, and clickstream data. We use this information, which does not identify individual users, to analyze trends, to administer the Website, to track users' movements around the Website and to improve our Website usability. We do not link this automatically-collected data to personally identifiable information, other than your IP address should it be determined to be personally identifiable information as required by law.
Log Files. Our log tracking collects visitors’ IP addresses to analyze trends, administer our website, track visitor movement, and gather broad demographic information to help determine the type of information visitors are interested in seeing on our website. This tracking only collects IP addresses and not personally identifiable information. Visitors are not personally identifiable within our log files. Comcell only uses this information for internal purposes and does not share this information with non-affiliated companies or institutions.
Log Files. 11.4.1. We collect statistical information about you from page hits. Every page, image or CGI program requested by your browser from our servers is logged in a log file, which also collects the following information: your remote IP address, the referring HTML page and the type of browser and computer that you are using. We use IP addresses to analyze trends, administer our site, track your movements, and gather broad demographic information for aggregate use. The statistical
Log Files. 15.1. BiP uses IP addresses to analyse trends, administer the Service, track Users’ movement and activity, and gather broad demographic information for aggregate use.
15.2. For the purposes of systems administration, detecting usage patterns, troubleshooting and support of audits, our web servers automatically log standard access information and certain User activities. Activity log information may be shared within the originating organisation. A Suppliers’ activity log may also be shared for audit purposes with a Buyer’s organisation where the Supplier’s activity is related to a Procurement Exercise. BiP does not share this information with any third parties outside the originating organisation or outside the relevant Buyer organisation.
Log Files. Log files of access to Acquirer’s Confidential Information must be maintained for up to one year and must contain the date, time, requestor, and the nature of the access (i.e., read-only or modify).
Log Files. 17.1. The Portal automatically collects information through log files as a standard procedure for hosting services. Log files track user actions on the site, gather data including internet protocol (IP) addresses, browser type, Internet Service Provider (ISP), date/time stamps, referring/exit pages, and possibly the number of clicks. This information is used for analyzing trends, administering the site, tracking users' movement on the website, and gathering demographic information. The data collected is not linked to any information that is personally identifiable.
17.2. The primary use of log files is for site management, user movement tracking, and demographic insight gathering. Log files provide critical information that helps enhance user experience, website security, and performance analytics. They enable the Portal to identify and resolve technical issues, understand user preferences, and improve overall service quality.
17.3. The Portal is committed to ensuring the security of log file data. Access to log files is restricted to authorized personnel only, and measures are in place to prevent unauthorized access, disclosure, alteration, or destruction of data. The Portal adheres to strict data protection policies to safeguard user privacy and information security.
17.4. Log file data is retained for a period that is reasonably necessary for analysis, administrative purposes, and security assessments. Once the retention period expires, data is securely deleted or anonymized in accordance with the Portal's data protection standards.
17.5. Users have rights concerning their personal information, as outlined in the Privacy Policy. This includes the right to access, rectify, or delete personal data collected by the Portal, subject to certain exceptions.
Log Files. You acknowledge that correspondence and log files generated in conjunction with a request for support services may contain sensitive, confidential or personal information. You are solely responsible for taking the steps necessary to protect such data, including obfuscating the logs or otherwise guarding such information prior to sending it to VMware