Logging Sample Clauses
Logging. The ISP will require the maintenance of network and application logs as part of BNY Mellon’s security information and event management processes. Logs are retained in accordance with law applicable to BNY Mellon’s provision of the services as well as BNY Mellon’s applicable policies. BNY Mellon uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.
Logging. (a) compressed schedules consisting of 10 hours per day, 4 days per week
(b) non-continuous schedules such as 10 days on 4 days off
Logging. The ISP will require the maintenance of network and application logs as part of BNYM’s security information and event management processes. Logs are retained in accordance with law applicable to BNYM’s provision of the Services as well as BNYM’s applicable policies. BNYM uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.
Logging. Al network traffic and all server logs are monitored and logged. The following activities are logged in systems, databases and networks: • All access attempts • All searches and • Activities carried out by system administrators and others with special rights • Security incidents including (i) deactivation of logging, (ii) changes to system rights and (iii) failed log-on attempts The Supplier does not work with shared log-ins. Therefore, it will always be possible to identify which employee performed a specific activity. The relevant log files are stored and protected against manipulation and technical errors. The log files are continuously reviewed to ensure normal operation and to examine unintended incidents. All external access to systems and databases where processing of personal data takes places, is filtered through a secure firewall with a restrictive protocol. A port and IP address filtration has been implemented to ensure limited access to ports and specific IP addresses. Anti-virus software and Intrusion Prevention System (IPS) have been installed on all systems and databases where processing of personal data take place, to protect against hostile attacks. The anti- virus software is continuously updated. Protection against XSS and SQL injections is implemented in all services. The internal network of the Supplier can only be accessed by authorized persons.
Logging. 4.4.1 All User – and particularly privileged (admin) user activity – carried out by our staff on systems and servers is logged.
4.4.2 All User activity within the admin interface and Censornet Unified Security Service portal is also logged. Log data is held for thirty (30) days and then deleted.
Logging. 13.1. The PEPPOL SMP Provider shall log all registration, editing or deleting of entries in the PEPPOL SMP. Such log shall be kept for at least 3 months or for the period prescribed by law.
13.2. The PEPPOL SMP Provider shall on request from the implicated users (PEPPOL SML, PEPPOL AP and/or PEPPOL Participant) or from the PEPPOL Authority reveal or give access to relevant data from the logs provided that the data is not subject to a duty of confidentiality in which case the prior written consent of the data subject should be retrieved.
Logging. (a) Buyer shall notify District Forester several days prior to start of haul road construction or improvement, prior to setting up sawmill, and prior to start of logging operations so that the District Forester may arrange to be present on each occasion.
(b) The plan and method of logging operations on each cutting block shall be approved by District Forester.
(c) The order of cutting the blocks is optional with Buyer. with the exception of the haul road which must be completed first.
(d) Logging operations, including cleanup, must be completed to the satisfaction of the District Forester on one block before logging operations may be started on another block unless modified in writing by District Forester. Buyer shall not start logging operations on a new cutting block until permission in writing has been received from District Forester. Insofar as practicable, all phases of logging shall keep pace with one another and proceed with reasonable diligence.
(e) All trees bent or held down by felled trees shall be released promptly when practicable, as determined by District Forester.
(f) No trees shall be left lodged in the process of felling. Unmarked trees which must be cut in order to release lodged trees must not be felled before they have been marked with red paint by District Forester.
(g) No xxxxx shall exceed 12 inches in height, measured on the side next to the highest ground, or the diameter of xxxxx whichever is smaller, except when in the opinion of the District Forester said height is impracticable. Buyer will be notified in writing by the District Forester concerning high stumps and Buyer must reduce the height of said stumps to comply with t he above specifications.
(h) Each tree shall be felled away from live or dry drainage channels, when in the judgment of District Forester such is practicable.
(i) All limbs and stubs shall be removed from all trees and logs prior to skidding.
(j) No State Forest boundary line tree, witness tree or corner tree shall be removed, altered, mutilated or destroyed.
(k) Felling and skidding on or across State Forest roads or public highways without the written consent of the District Forester, is prohibited.
(l) Hauling or skidding or placing fills or other obstructions in live or intermittent streams is prohibited. Skidding across live or intermittent streams is prohibited except over bridges or culverts that are approved by the District Forester. Hauling across live or intermittent streams is permissible over bri...
Logging. The data processor logs user activities in its systems, databases and networks used to process and transmit the personal data. The logs are monitored.
Logging. All employee logins are logged within the Supplier’s Microsoft Azure Active Directory tenant.
Logging. We log activity on our system. Some of these logs are available to you in the Tapestry Control Panel. We retain more detailed logs to help diagnose and fix faults. We employ independent firms to check that our systems are secure by attempting to hack or penetrate them. These firms are accredited by the relevant industry bodies. The penetration tests cover both the web and the app versions of Tapestry. The penetration tests include authenticated tests, where the testers are provided with login details to Tapestry accounts to check whether they can exploit those to see or extract data that should not be visible. If you have a legitimate interest in Tapestry (e.g., you are the account owner, a prospective customer or a parent) we are happy to provide a summary of what the independent testers found – please contact us at xxxxxxxx.xxxxxxx@xxxx.xxxx. Please also get in touch if you want to find out when the last test took place or the next test is scheduled. We also regularly run automated security tests and carry out internal security reviews.