Logging and Monitoring Sample Clauses

Logging and Monitoring. The production infrastructure log activities are centrally collected and are secured in an effort to prevent tampering and are monitored for anomalies by a trained security team.
Logging and Monitoring. Log files are activated for each system/application used for the processing of personal data. They include all types of access to data (view, modification, deletion).
Logging and Monitoring. Genesys will log security events from the operating perspective for all infrastructure providing the Cloud Services to Customer. Genesys will monitor and investigate events that may indicate a Security Incident or problem. Event records will be retained at least one year. Limited audit data is accessible to customers via the User Interface (UI) and Application Programming Interface (API).
Logging and Monitoring. Cisco shall maintain logs of administrator and operator activity and data recovery events related to Protected Data.
Logging and Monitoring. Logging mechanisms will be in place sufficient to identify security incidents, establish individual accountability, and reconstruct events. Audit logs will be retained in a protected state (i.e., encrypted, or locked) with a process for periodic review.
Logging and Monitoring. Unless prohibited by applicable law, Contractor shall, and shall require subcontractors to, continuously monitor its networks and personnel for malicious activity and other activity that may cause damage or vulnerability to City Data. Contractor shall maintain logs of administrator and operator activity and data recovery events related to City Data.
Logging and Monitoring. Logging and monitoring of security logs via a Security Incident Event Management (“SIEM”) system and alerting to a dedicated Incident Response team upon the detection of suspicious system and/or user behaviors.
Logging and Monitoring. SS&C will log and monitor all access to systems that contain such information to the extent that such logging and monitoring is within SS&Cs authority and capability to perform and is operationally feasible.
Logging and Monitoring. Copper will log and monitor access to Customer Personal Information on networks, systems and devices operated by Copper.
Logging and Monitoring. Supplier shall maintain logs of administrator and operator activity and data recovery events related to Protected Data.