Security Logs Sample Clauses
Security Logs. All Braze systems used in the provision of the Braze Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized syslog server (for network systems) in order to enable security reviews and analysis. Braze has automated alerts and searches on these logs.
Security Logs. FF shall ensure that all FF or Sub-processor systems used to store Customer Data, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralised syslog server (for network systems).
Security Logs. As it relates to any Cloud Services, the CSP and Vendor Contractors shall provide security logs and reports to a Governmental Entity or its Authorized Contractors in a mutually agreeable format upon request. Such reports shall include at least latency statistics, user access summaries, user access IP address summaries, user access history and security logs for all Customer Data.
Security Logs. Maximl Labs Pvt Ltd’s systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into, Maximl Labs Pvt Ltd’s systems.
Security Logs. Company’s systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into, Company’s systems.
Security Logs. Third Party shall employ procedures that all systems, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralized logging system in order to enable the security audits referred to below. Additionally, Third Party shall employ the following procedures:
a. Logs shall be retained for at least one (1) year.
b. Logs shall not contain Confidential Information.
c. Logs shall be protected from unauthorized modification or erasure.
d. Logs shall be backed up on a daily basis.
e. Logs shall be monitored for risk and functional anomalies.
Security Logs. TeleSign’s systems have logging enabled to their respective system log facility in order to support the security audits, and monitor and detect actual and attempted attacks on, or intrusions into, TeleSign’s systems.
Security Logs. Company shall ensure that all Company or Sub-processor systems used to store Customer Data, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralised syslog server (for network systems).
Security Logs. All Inkit systems used in the provision of the Services, including firewalls, routers, network switches, and operating systems, log information to their respective system log facility or a centralized syslog server (for network systems) in order to enable security reviews and analysis. Inkit has automated alerts and searches for such logs.
Security Logs. All Loopy Loyalty systems used in the provision of the Loopy Loyalty Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized logging service (for cloud systems) in order to enable security reviews and analysis. Loopy Loyalty has automated alerts and searches on these logs.