Security Logs Sample Clauses

Security Logs. All Braze systems used in the provision of the Braze Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized syslog server (for network systems) in order to enable security reviews and analysis. Braze has automated alerts and searches on these logs.
AutoNDA by SimpleDocs
Security Logs. FF shall ensure that all FF or Sub-processor systems used to store Customer Data, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralised syslog server (for network systems).
Security Logs. As it relates to any Cloud Services, the CSP and Vendor Contractors shall provide security logs and reports to a Governmental Entity or its Authorized Contractors in a mutually agreeable format upon request. Such reports shall include at least latency statistics, user access summaries, user access IP address summaries, user access history and security logs for all Customer Data.
Security Logs. All Loopy Loyalty systems used in the provision of the Loopy Loyalty Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized logging service (for cloud systems) in order to enable security reviews and analysis. Loopy Loyalty has automated alerts and searches on these logs.
Security Logs. All xxxxxxxxxx.xxx systems used in the provision of the ET Services, including firewalls, routers, network switches and operating systems, log information to their re- spective system log facility or a centralized syslog server (for network systems) in order to enable security audits. Production data centers used to provide the ET Services have access control systems. These systems permit only authorized personnel to have access to secure are- as. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions, are secured by around-the-clock guards, two-factor card key and biometric access screening and escort-controlled access, and are also supported by on-site back-up generators in the event of a power failure.
Security Logs. Company shall ensure that all Company or Sub-processor systems used to store Customer Data, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralised syslog server (for network systems).
Security Logs. All Insider systems used in the provision of the Insider Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility in order to enable security reviews and analysis.
AutoNDA by SimpleDocs
Security Logs. Logs are generated for security-relevant activities on operating systems. Systems are configured to log default security activities, access to information or programs, system events such as alerts, console messages, and system errors. Oracle reviews logs for forensic purposes and incidents; identified anomalous activities feed into the incident management process. Security logs are stored within the Security Information and Event Management system (or equivalent system) in a native, unaltered format and retained in accordance with Oracle's internal policies. Such logs are retained online for a minimum of 1 year, or as otherwise required by an applicable regulatory framework. These logs are retained and used by Oracle for our internal security operations for Cloud Services.
Security Logs. 3.1. All Thunderhead systems used in the provision of the Services, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralized syslog server (for network systems) in order to facilitate security reviews and analysis.
Security Logs. All PassKit systems used in the provision of the PassKit Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized logging service (for cloud systems) in order to enable security reviews and analysis. PassKit has automated alerts and searches on these logs.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!