Logging Sample Clauses

Logging. The ISP will require the maintenance of network and application logs as part of BNY Mellon’s security information and event management processes. Logs are retained in accordance with law applicable to BNY Mellon’s provision of the services as well as BNY Mellon’s applicable policies. BNY Mellon uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.
AutoNDA by SimpleDocs
Logging. (a) compressed schedules consisting of 10 hours per day, 4 days per week (b) non-continuous schedules such as 10 days on 4 days off
Logging. The ISP will require the maintenance of network and application logs as part of BNYM’s security information and event management processes. Logs are retained in accordance with law applicable to BNYM’s provision of the Services as well as BNYM’s applicable policies. BNYM uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.
Logging. Al network traffic and all server logs are monitored and logged. The following activities are logged in systems, databases and networks: • All access attempts • All searches and • Activities carried out by system administrators and others with special rightsSecurity incidents including (i) deactivation of logging, (ii) changes to system rights and (iii) failed log-on attempts The Supplier does not work with shared log-ins. Therefore, it will always be possible to identify which employee performed a specific activity. The relevant log files are stored and protected against manipulation and technical errors. The log files are continuously reviewed to ensure normal operation and to examine unintended incidents. All external access to systems and databases where processing of personal data takes places, is filtered through a secure firewall with a restrictive protocol. A port and IP address filtration has been implemented to ensure limited access to ports and specific IP addresses. Anti-virus software and Intrusion Prevention System (IPS) have been installed on all systems and databases where processing of personal data take place, to protect against hostile attacks. The anti- virus software is continuously updated. Protection against XSS and SQL injections is implemented in all services. The internal network of the Supplier can only be accessed by authorized persons.
Logging. 4.4.1 All User – and particularly privileged (admin) user activity – carried out by our staff on systems and servers is logged. 4.4.2 All User activity within the admin interface and Censornet Unified Security Service portal is also logged. Log data is held for thirty (30) days and then deleted.
Logging. 13.1. The PEPPOL SMP Provider shall log all registration, editing or deleting of entries in the PEPPOL SMP. Such log shall be kept for at least 3 months or for the period prescribed by law. 13.2. The PEPPOL SMP Provider shall on request from the implicated users (PEPPOL SML, PEPPOL AP and/or PEPPOL Participant) or from the PEPPOL Authority reveal or give access to relevant data from the logs provided that the data is not subject to a duty of confidentiality in which case the prior written consent of the data subject should be retrieved.
Logging. (a) Buyer shall notify, in writing, the Forest Manager one week (1) prior to start of haul road construction or improvement and prior to start of logging operations so that Forest Manager may arrange to be present on each occasion. (b) The Forest Manager shall approve the plan and method of logging operations on each cutting block. (c) Rubber tired skidder and crawler tractor combination shall be used in order to keep skid road construction to a minimum. Skidder shall operate only on skid road system. (d) Logging operations, including cleanup, must be completed to the satisfaction of Forest Manager on one cutting block before logging operations may be started on another cutting block unless modified in writing by the Forest Manager. Buyer shall not start logging operations on a new cutting block until permission in writing has been received from Forest Manager. Insofar as practicable, all phases of logging shall keep pace with one another and proceed with reasonable diligence. (e) All trees bent or held down by felled trees shall be released promptly by Buyer. Broken trees (snags) shall be felled by Buyer before leaving the cutting block at issue. (f) No trees shall be left lodged in the process of felling. Unmarked trees which must be cut in order to release lodged trees must not be felled before they have been marked with paint, by the Forest Manager. (g) No xxxxx shall exceed 12 inches in height, measured on the side next to the highest ground. (h) Each tree shall be felled away from live or dry drainage channels when such is practicable. (i) All limbs and stubs shall be removed from all trees and logs prior to skidding. Tops of felled trees shall be cut to within four feet of ground. (j) No Forest boundary line tree, witness tree, corner tree or corner markers shall be removed, altered, mutilated or destroyed. (k) Skidding on or across improved Forest roads or public highways is prohibited. (l) Hauling, skidding, placing fills or other obstructions in live or intermittent streams is prohibited. Skidding across live or intermittent streams is prohibited except over bridges or culverts that are approved by the Forest Manager. Hauling across live or intermittent streams is permissible over bridges or culverts that are approved by the Forest Manager. (m) Buyer shall not haul or skid on or across any right-of-way located on University land without the written approval of owner or lessee of right-of-way. Buyer shall, in advance of such hauling or skidding, f...
AutoNDA by SimpleDocs
Logging. The data processor logs user activities in its systems, databases and networks used to process and transmit the personal data. The logs are monitored.
Logging. All employee logins are logged within the Supplier’s Microsoft Azure Active Directory tenant.
Logging. Logging facilitates bushmeat hunting by the construction of roads that connect isolated forests to urban centers, by creating new demand for bushmeat by workers and dependents, and by providing new transport opportunities in company vehicles. Measures: • Extend partnerships between protected areas and logging companies working in buffer zones; • Provide strict control of access routes to prevent commercial bushmeat hunting; • Provide alternative sources of protein to work force and dependents. • Include obligation to enforce wildlife protection laws in regional certification schemes for sustainable logging; • Conduct further research on impact of logging on apes over medium-long time span.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!