SECURITY GUIDELINES. 37.2.1 Both Parties will maintain accurate records, subject to audit, that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
Appears in 2 contracts
Samples: Interconnection Agreement, Interconnection Agreement
SECURITY GUIDELINES. 37.2.1 40.2.1 Both Parties will maintain accurate records, subject to audit, that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
Appears in 1 contract
Samples: Interconnection Agreement
SECURITY GUIDELINES. 37.2.1 (1) Both Parties will maintain accurate records, subject to audit, and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).
Appears in 1 contract
Samples: Interconnection Agreement