Security Logs and Reports. The Seller shall allow the State access to system security logs that affect this engagement, its data, and/or processes. This includes the ability to request a report of the activities that a specific user or administrator accessed over a specified period of time as well as the ability for a Purchaser to request reports of activities of a specific user associated with that Purchaser.
Security Logs and Reports. Contractor shall allow Agency access to system security logs that affect the Services, Agency Data, or processes. This includes the ability for Agency to request a report of the records that a specific user accessed over a specified period of time.
Security Logs and Reports. The Service Provider shall allow the State of Delaware access to system security logs that affect this engagement, its data and or processes. This includes the ability for the State of Delaware to request a report of the records that a specific user accessed over a specified period of time.
Security Logs and Reports. The State will be provided with security data and reports as required in the Agreement.
Security Logs and Reports. The Contractor shall allow the County access to system security logs that affect this engagement, its data and or processes. This includes the ability for the County to request a report of the records that a specific user accessed over a specified period of time.
Security Logs and Reports. The Vendor shall allow the City access to system security logs that affect the engagement under the Agreement, its data and or processes when a specific request is made. This includes the ability for the City to request a report of the records that a specific user accessed over a specified period of time.