Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.
Internet Connection In order to ensure the proper functioning of the Production Monitor and the Consumption Monitor, if possible, you must provide the Solar System with continuous access to a functioning broadband internet connection with one (1) wired Ethernet port and standard electrical outlet, at your cost. If you are unable to provide the Solar System with an internet connection in accordance with the foregoing sentence, the Home must be located in an area with cellular service that is acceptable to us in our discretion.
System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.