Logging and Monitoring Sample Clauses

Logging and Monitoring. The production infrastructure log activities are centrally collected and are secured in an effort to prevent tampering and are monitored for anomalies by a trained security team.
AutoNDA by SimpleDocs
Logging and Monitoring. Log files are activated for each system/application used for the processing of personal data. They include all types of access to data (view, modification, deletion).
Logging and Monitoring. Genesys will log security events from the operating perspective for all servers providing the Genesys PureConnect Cloud Service to Customer. Genesys will monitor and investigate events that may indicate a security incident or problem. Event records will be retained for ninety (90) days.
Logging and Monitoring. Cisco shall maintain logs of administrator and operator activity and data recovery events related to Protected Data.
Logging and Monitoring. Unless prohibited by applicable law, Contractor shall, and shall require subcontractors to, continuously monitor its networks and personnel for malicious activity and other activity that may cause damage or vulnerability to City Data. Contractor shall maintain logs of administrator and operator activity and data recovery events related to City Data.
Logging and Monitoring. Logging mechanisms will be in place sufficient to identify security incidents, establish individual accountability, and reconstruct events. Audit logs will be retained in a protected state (i.e., encrypted, or locked) with a process for periodic review.
Logging and Monitoring. Copper will log and monitor access to Customer Personal Information on networks, systems and devices operated by Copper.
AutoNDA by SimpleDocs
Logging and Monitoring. NetDocuments will employ logging mechanisms within the Service to permit Customer to review document-level events and administrative changes for the previous 90 days. Details about the Consolidated Activity Log and Administrative Activity Log can be found on the NetDocuments support website. NetDocuments also logs comprehensive information regarding the functionality of the ND Network. NetDocuments maintains its log information for at least 1 year.
Logging and Monitoring. Logging and monitoring of security logs via a Security Incident Event Management (“SIEM”) system and alerting to a dedicated Incident Response team upon the detection of suspicious system and/or user behaviors;
Logging and Monitoring. The production infrastructure log activities are centrally collected, are secured in an effort to prevent tampering, and are monitored for anomalies by a trained security team. Supplier shall provide a logging capability in the platform that captures login and actions taken by users in the Supplier application. Buyer has full access to application audit logs within its instance(s), including successful and failed access attempts to Xxxxx’s instance(s). Buyer is responsible for exporting application audit logs to Buyer’s syslog server through available built-in platform features.
Time is Money Join Law Insider Premium to draft better contracts faster.