Security Monitoring and Logging Sample Clauses

Security Monitoring and Logging a) A documented policy and procedures exist to monitor networks, systems, and applications for potential security events.
AutoNDA by SimpleDocs

Related to Security Monitoring and Logging

  • Monitoring and Recording COMMUNICATIONS - We may monitor and record communications between you and us, including telephone conversations, electronic messages, electronic records, or other data transmissions that affect your accounts or other products and services. Except as otherwise prohibited by applicable law, you agree we may monitor and record such communications without your approval or further notice to you.

  • Monitoring and Management Information C10.1 The Contractor shall comply with the monitoring arrangements set out in the Monitoring Schedule including, but not limited to, providing such data and information as the Contractor may be required to produce under the Contract.

  • Program Monitoring and Evaluation (c) The Recipient shall prepare, or cause to be prepared, and furnish to the Association not later than six months after the Closing Date, a report of such scope and in such detail as the Association shall reasonably request, on the execution of the Program, the performance by the Recipient and the Association of their respective obligations under the Legal Agreements and the accomplishment of the purposes of the Financing.”

  • Telephone Monitoring and Recording You consent to and authorize us and any of our affiliates, agents and marketing associates to monitor and/or record any of your telephone conversations with any of our or their representatives for quality control, training and other lawful purposes.

  • Monitoring and Oversight 9 To permit the SCSB as the Authorizer hereunder to fulfill its monitoring and oversight functions under the Act, U.C.A. §53G-5-202(1)(c), and ensure that the School is in compliance with all applicable laws, regulations, rules, and the terms and conditions of this Agreement10, the Charter School agrees to fully support SCSB’s oversight and monitoring responsibilities including responding to all timely requests for reports,11 audits,12 formal and informal investigations, formal and informal visits and inspections of books and records of the Charter School.13 SCSB will use best efforts in exercising its oversight function to secure and review information or records that have been previously submitted by the Charter Schools to relieve administrative cost associated with duplicate requests.

  • Reporting and Monitoring Please provide a brief description of the mechanisms proposed for this project for reporting to the UNDP and partners, including a reporting schedule.

  • Service Monitoring Customer gives express consent for Vodafone to monitor Customer’s use of the Service (and disclose and otherwise use the information obtained) only to: (a) the extent allowed by Applicable Law; (b) comply with Applicable Law; (c) protect the Network from misuse; (d) protect the integrity of the public internet and/or Vodafone’s systems and Networks; (e) the extent necessary to determine if Customer has breached any conditions or restrictions on use of the Service; (f) provide the Service; and/or (g) take other actions agreed or requested by Customer.

  • Monitoring and Evaluation a. The AGENCY shall expeditiously provide to the COUNTY upon request, all data needed for the purpose of monitoring, evaluating and/or auditing the program(s). This data shall include, but not be limited to, clients served, services provided, outcomes achieved, information on materials and services delivered, and any other data required, in the sole discretion of the COUNTY, that may be required to adequately monitor and evaluate the services provided under this Contract. Monitoring shall be performed in accordance with COUNTY’S established Noncompliance Standards, a copy of which is attached hereto and incorporated by reference as Attachment “C”.

  • Quality Monitoring 4.2.1. To prepare a Quality Assurance (QA) Plan

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!