Security Event Logs. Security event-related logs must be preserved and be available online for a minimum of two (2) years and available offline for ten (10) years. This requirement applies to the data sources that are capable of logging data that can be used to enforce accountability, detect a violation of security policy, detect an attempt to exploit vulnerabilities, and/or detect compromises resulting in losses of integrity, confidentiality and availability of Confidential Information, environments, services, systems, and applications. Customer reserves the right to monitor event logs accordingly.
Appears in 5 contracts
Samples: Master Purchase Agreement for Services, Master Purchase Agreement for Services, Master Purchase Agreement for Services