Common use of System Logging Clause in Contracts

System Logging. The system must maintain an automated audit trail which can identify the 27 user or system process which initiates a request for COUNTY PCI, or which alters COUNTY PCI. The 28 audit trail must be date and time stamped, must log both successful and failed accesses, must be read 30 levels including, but not limited to, systems administrators. If COUNTY PCI is stored in a database, 31 database logging functionality must be enabled. Audit trail data must be archived for at least three (3) 32 years after occurrence.

Appears in 4 contracts

Samples: 1 Agreement, Agreement, 1 Agreement

AutoNDA by SimpleDocs

System Logging. The system must maintain an automated audit trail which can identify the 27 30 user or system process which initiates a request for COUNTY PCI, or which alters COUNTY PCI. The 28 31 audit trail must be date and time stamped, must log both successful and failed accesses, must be read 30 33 levels including, but not limited to, systems administrators. If COUNTY PCI is stored in a database, 31 34 database logging functionality must be enabled. Audit trail data must be archived for at least three (3) 32 35 years after occurrence.

Appears in 4 contracts

Samples: Agreement, cams.ocgov.com, Agreement

System Logging. The system must maintain an automated audit trail which can identify the 27 30 user or system process which initiates a request for COUNTY PCI, or which alters COUNTY PCI. The 28 31 audit trail must be date and time stamped, must log both successful and failed accesses, must be read 30 only, 32 and must be restricted to authorized users. This logging must be included for all user privilege levels 33 including, but not limited to, systems administrators. If COUNTY PCI is stored in a database, 31 database 34 logging functionality must be enabled. Audit trail data must be archived for at least three (3) 32 years after 35 occurrence.

Appears in 2 contracts

Samples: 1 Agreement, 1 Agreement

System Logging. The system must maintain an automated audit trail which can identify the 27 32 user or system process which initiates a request for COUNTY PCI, or which alters COUNTY PCI. The 28 33 audit trail must be date and time stamped, must log both successful and failed accesses, must be read 30 only, 34 and must be restricted to authorized users. This logging must be included for all user privilege levels 35 including, but not limited to, systems administrators. If COUNTY PCI is stored in a database, 31 database 36 logging functionality must be enabled. Audit trail data must be archived for at least three (3) 32 years after 37 occurrence.

Appears in 1 contract

Samples: Agreement

AutoNDA by SimpleDocs

System Logging. The system must maintain an automated audit trail which can identify the 27 32 user or system process which initiates a request for COUNTY PCI, or which alters COUNTY PCI. The 28 33 audit trail must be date and time stamped, must log both successful and failed accesses, must be read 30 35 levels including, but not limited to, systems administrators. If COUNTY PCI is stored in a database, 31 36 database logging functionality must be enabled. Audit trail data must be archived for at least three (3) 32 37 years after occurrence.

Appears in 1 contract

Samples: Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!