Protection of Log Information. Supplier shall protect logging systems and log information against tampering and unauthorized access. Access to system audit tools and audit trails shall be limited to those with a job-related need.
Appears in 4 contracts
Samples: Purchase Order Terms, Purchase Order Terms, Participation Agreement