Security Log Management Sample Clauses

Security Log Management. 3.7.12.1 EPX Best Practices are applied.
AutoNDA by SimpleDocs
Security Log Management. 3.7.12.1 EPX Best Practices are applied. 3.7.12.2 Security logs will only be provided at the written request for the IT Contact or Director of the Customer.
Security Log Management. Configure log sources to capture and retain information without creating excessive logging. • Limit user access to log files. • Avoid logging sensitive or protected information. • Secure the processes that generate logs. • Identify and resolve logging errors. • Analyze log entries, prioritize entries, and respond to those requiring action. Security Incident Event Management (SIEM) Services supported by SOC. • Deployment of SIEM monitoring probes to monitor all critical network devices including; domain controller, firewalls, network switches, and routers. When meeting compliance requirements, deployment will include all Windows devices as well. • Reporting for compliance requirements - generate daily reports and threat analysis outlines for three regulatory standards: HIPAA, PCI and NIST-800. • SOC expertise and assistance. Provider will assist Client in the hours immediately following a data breach to identify the likely source of the breach and to begin formulating an appropriate response to the breach. However, any assistance with data breach-remediation efforts past the first twenty-four (24) hours following a breach – including but not limited to breach-notification planning, in-depth forensic examinations of the source of a breach, and significant, post-breach systems reconfiguration – are not within the scope of this Service Attachment. If Client requests Provider’s assistance with such activities, Provider will prepare a separate Service Attachment for Project Services that will specify what the charges will be for such assistance.

Related to Security Log Management

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.

  • SITE MANAGEMENT We reserve the right, but not the obligation, to: (1) monitor the Site for violations of these Terms of Use; (2) take appropriate legal action against anyone who, in our sole discretion, violates the law or these Terms of Use, including without limitation, reporting such user to law enforcement authorities; (3) in our sole discretion and without limitation, refuse, restrict access to, limit the availability of, or disable (to the extent technologically feasible) any of your Contributions or any portion thereof; (4) in our sole discretion and without limitation, notice, or liability, to remove from the Site or otherwise disable all files and content that are excessive in size or are in any way burdensome to our systems; and (5) otherwise manage the Site in a manner designed to protect our rights and property and to facilitate the proper functioning of the Site.

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement. 60.2 The Parties will employ characteristics and methods of operation that will not interfere with or impair the Parties’ networks, or the network of any third parties or Affiliated companies, connected with or involved directly in the network or facilities of CenturyLink. 60.3 CLEC shall not interfere with or impair service over any circuits, facilities or equipment of CenturyLink, its Affiliated companies, or its connecting and concurring carriers. 60.4 If CLEC causes any impairment or interference, CenturyLink shall promptly notify CLEC of the nature and location of the problem and that, unless promptly rectified, a temporary discontinuance of the use of any circuit, facility or equipment may be required. The Parties agree to work together to attempt to promptly resolve the impairment or interference. If CLEC is unable to promptly remedy, then CenturyLink may, at its option, temporarily discontinue the use of the affected circuit, facility or equipment until the impairment is remedied. 60.5 Any violation of Applicable Law or regulation regarding the invasion of privacy of any communications carried over CenturyLink’s facilities, or that creates hazards to the employees of CenturyLink or to the public, is also considered an impairment of service. 60.6 CenturyLink shall give advanced notice to CLEC of all non-scheduled maintenance or other planned network activities to be performed by CenturyLink on any Network Element, including any hardware, equipment, software, or system, providing service functionality of which CLEC has advised CenturyLink may potentially impact CLEC End Users. 60.7 The Parties shall provide notice of network changes and upgrades in accordance with 47 C.F.R. §§51.325 through 51.335. CenturyLink may discontinue any Interconnection arrangement, Telecommunications Service, or Network Element provided or required hereunder due to network changes or upgrades after providing CLEC notice as required by this Section. CenturyLink agrees to cooperate with CLEC and/or the appropriate regulatory body in any transition resulting from such discontinuation of service and to minimize the impact to customers which may result from such discontinuance of service.

  • Security Systems The Service may not be compatible with security systems. You may be required to maintain a telephone connection through your local exchange carrier in order to use any alarm monitoring functions for any security system installed in your home or business. You are responsible for contacting the alarm monitoring company to test the compatibility of any alarm monitoring or security system with the Service.

  • Traffic Management 9.2.1 During the Operating Period, Developer shall be responsible for the general management of traffic on the Project. Developer shall manage traffic so as to preserve and protect safety of traffic on the Project and Related Transportation Facilities and, to the maximum extent practicable, to avoid disruption, interruption or other adverse effects on traffic flow, throughput or level of service on the Project and Related Transportation Facilities. Developer shall conduct traffic management in accordance with all applicable Technical Provisions, Technical Documents, Laws and Governmental Approvals, and in accordance with the Traffic Management Plan. 9.2.2 Developer shall prepare and submit to TxDOT and the Independent Engineer for TxDOT approval a Traffic Management Plan for managing traffic on the Project and Related Transportation Facilities after the commencement of traffic operations on any portion of the Project, addressing (a) orderly and safe movement and diversion of traffic on Related Transportation Facilities during Project construction, (b) orderly and safe movement of traffic on the Project and (c) orderly and safe diversion of traffic on the Project and Related Transportation Facilities necessary in connection with field maintenance and repair work or Renewal Work or in response to Incidents, Emergencies and lane closures. Developer shall prepare the Traffic Management Plan according to the schedule set forth in the Technical Provisions. The Traffic Management Plan shall comply with the Technical Provisions and Technical Documents concerning traffic management and traffic operations. Developer shall carry out all traffic management during the Term in accordance with the approved Traffic Management Plan. 9.2.3 Developer shall implement the Traffic Management Plan to promote safe and efficient operation of the Project and Related Transportation Facilities at all times during the course of any construction or operation of the Project and during the Utility Adjustment Work. 9.2.4 TxDOT shall have at all times, without obligation or liability to Developer, the right 9.2.4.1 Issue Directive Letters to Developer regarding traffic management 9.2.4.2 Provide on the Project, via message signs or other means consistent with Good Industry Practice, non-Discriminatory traveler and driver information, and other public information (e.g. amber alerts), provided that the means to disseminate such information does not materially interfere with the functioning of the ETCS.

  • Account Management 15.1 The Contractor is required to provide a dedicated Strategic Account Manager who will be the main point of contact for the Authority. The Strategic Account Manager will:  Attend quarterly, or as otherwise agreed, review meetings with the Authority, in person at the Authority’s premises or other locations as determined by the Authority  Attend regular catch-up meetings with the Authority, in person or by telephone/videoconference  Resolve any on-going operational issues which have not been resolved by the Contractor or Account Manager(s) and therefore require escalation  Ensure that the costs involved in delivering the Framework are as low as possible, whilst always meeting the required standards of service and quality. 15.2 The Contractor is also required to provide a dedicated Account Manager for every Framework Public Body using the Framework, if required by the Framework Public Body. The service to be provided will be agreed with each Framework Public Body and may include:  regular review meetings, which may be in person at the Framework Public Bodies’ premises, by video-conference, webinar or telephone  Regular catch-up meetings/telephone calls to discuss current and on-going issues  Work with the Framework Public Bodies Contract Manager to resolve any on-going operational issues  Work with the Framework Public Body ’s Contract Manager to pro-actively introduce initiatives to:  Create efficiencies in processes  Improve the environmental performance of the contract. 15.3 It is expected that end users will contact the Contractor in the first instance to resolve any operational issues. The Account Manager will act as a point of escalation to be contacted either by end users or by the Framework Public Body’s Contract Manager should there be issues that the Contractor needs to resolve. 15.4 Further details of the roles and responsibilities of the Contractor, Authority and Framework Public Bodies are provided in Schedule 4 – Management Arrangements

  • Financial Management System Subrecipient shall establish and maintain a sound financial management system, based upon generally accepted accounting principles. Contractor’s system shall provide fiscal control and accounting procedures that will include the following: i. Information pertaining to tuition rates, payments, and educational assistance payments; and

  • Asset Management Services (i) Real Estate and Related Services: (a) Investigate, select and, on behalf of the Company, engage and conduct business with (including enter contracts with) such Persons as the Advisor deems necessary to the proper performance of its obligations as set forth in this Agreement, including but not limited to consultants, accountants, lenders, technical advisors, attorneys, brokers, underwriters, corporate fiduciaries, escrow agents, depositaries, custodians, agents for collection, insurers, insurance agents, developers, construction companies, Property Managers and any and all Persons acting in any other capacity deemed by the Advisor necessary or desirable for the performance of any of the foregoing services; (b) Negotiate and service the Company’s debt facilities and other financings; (c) Monitor applicable markets and obtain reports (which may be prepared by the Advisor or its Affiliates) where appropriate, concerning the value of investments of the Company; (d) Monitor and evaluate the performance of each asset of the Company and the Company’s overall portfolio of assets, provide daily management services to the Company and perform and supervise the various management and operational functions related to the Company’s investments; (e) Formulate and oversee the implementation of strategies for the administration, promotion, management, operation, maintenance, improvement, financing and refinancing, marketing, leasing and disposition of Properties, Loans and other Permitted Investments on an overall portfolio basis; (f) Consult with the Company’s officers and the Board and assist the Board in the formulation and implementation of the Company’s financial policies, and, as necessary, furnish the Board with advice and recommendations with respect to the making of investments consistent with the investment objectives and policies of the Company and in connection with any borrowings proposed to be undertaken by the Company; (g) Oversee the performance by the Property Managers of their duties, including collection and proper deposits of rental payments and payment of Property expenses and maintenance; (h) Conduct periodic on-site property visits to some or all (as the Advisor deems reasonably necessary) of the Properties to inspect the physical condition of the Properties and to evaluate the performance of the Property Managers; (i) Review, analyze and comment upon the operating budgets, capital budgets and leasing plans prepared and submitted by each Property Manager and aggregate these property budgets into the Company’s overall budget; (j) Coordinate and manage relationships between the Company and any co-venturers or partners; and (k) Consult with the Company’s officers and the Board and provide assistance with the evaluation and approval of potential asset dispositions, sales and refinancings. (ii) Accounting and Other Administrative Services: (a) Provide the day-to-day management of the Company and perform and supervise the various administrative functions reasonably necessary for the management of the Company; (b) From time to time, or at any time reasonably requested by the Board, make reports to the Board on the Advisor’s performance of services to the Company under this Agreement; (c) Make reports to the Conflicts Committee each quarter of the investments that have been made by other programs sponsored by the Advisor or any of its Affiliates, including KBS Realty Advisors LLC, as well as any investments that have been made by the Advisor or any of its Affiliates directly; (d) Provide or arrange for any administrative services and items, legal and other services, office space, office furnishings, personnel and other overhead items necessary and incidental to the Company’s business and operations; (e) Provide financial and operational planning services; (f) Maintain accounting and other record-keeping functions at the Company and investment levels, including information concerning the activities of the Company as shall be required to prepare and to file all periodic financial reports, tax returns and any other information required to be filed with the SEC, the Internal Revenue Service and any other regulatory agency; (g) Maintain and preserve all appropriate books and records of the Company; (h) Provide tax and compliance services and coordinate with appropriate third parties, including the Company’s independent auditors and other consultants, on related tax matters; (i) Provide the Company with all necessary cash management services; (j) Manage and coordinate with the transfer agent the dividend process and payments to Stockholders; (k) Consult with the Company’s officers and the Board and assist the Board in evaluating and obtaining adequate insurance coverage based upon risk management determinations; (l) Provide the Company’s officers and the Board with timely updates related to the overall regulatory environment affecting the Company, as well as managing compliance with such matters, including but not limited to compliance with the Xxxxxxxx-Xxxxx Act of 2002; (m) Consult with the Company’s officers and the Board relating to the corporate governance structure and appropriate policies and procedures related thereto; (n) Perform all reporting, record keeping, internal controls and similar matters in a manner to allow the Company to comply with applicable law, including federal and state securities laws and the Xxxxxxxx-Xxxxx Act of 2002; (o) Notify the Board of all proposed material transactions before they are completed; and (p) Do all things necessary to assure its ability to render the services described in this Agreement.

  • Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!