Tenancy Security Event Logs definition

Tenancy Security Event Logs means Security Event Logs that relate to Tenancy, including: log-on/log-off information about Province user activities, and application logs, web server log, file server logs, database logs of applications, web servers, file servers or database servers or any other logs that directly store, access or contain Protected Information. The Contractor must comply with Appendix G1 if attached.
Tenancy Security Event Logs means Security Event Logs that relate to Tenancy, including:

Examples of Tenancy Security Event Logs in a sentence

  • The Contractor must ensure that Protected Information and Tenancy Security Event Logs on magnetic media are securely wiped by overwriting using procedures and adequate media wiping solutions, degaussing, or other method in line with security best practices for disposal of media.

  • The Contractor must retain Tenancy Security Event Logs online for a minimum of 90 days and either: such additional period of time as the Province may instruct; or ensure that the Tenancy offers the technical capability for the Province to retain the Tenancy Security Event Logs, to enable the Province to comply with an information schedule approved under the Information Management Act or other retention period required by law.

  • At any time after the Issue Date of this Debenture but not after the date which is 180 days after the date of the Purchase Agreement, the Company may, at the option of the Company, redeem all of the outstanding aggregate principal amount of this Debenture at a redemption price (plus accrued and unpaid interest and penalties thereon) equal to 125% of the aggregate principal amount of this Debenture (the "Redemption Price").

  • The Contractor must securely erase: records that contain Protected Information and Tenancy Security Event Logs when instructed in writing by the Province; and any backup, transitory and extra copies of records that contain Protected Information or Tenancy Security Event Logs when no longer needed in relation to this Agreement.

  • The Contractor must retain Tenancy Security Event Logs online for a minimum of 90 days and either: such additional period of time as the Purchaser may instruct; or ensure that the Tenancy offers the technical capability for the Purchaser to retain the Tenancy Security Event Logs, to enable the Purchaser to comply with an information schedule approved under the Information Management Act or other retention period required by law.

  • The Contractor must securely erase: records that contain Protected Information and Tenancy Security Event Logs when instructed in writing by the Purchaser; and any backup, transitory and extra copies of records that contain Protected Information or Tenancy Security Event Logs when no longer needed in relation to this Order.

  • Upon the Purchaser’s request, the Contractor must ensure that the Tenancy offers the technical capability for the Purchaser to enable or configure the forwarding, extraction, backup of Tenancy Security Event Logs from the Tenancy to the Purchaser’s security information and event management system or to an external log storage and retention system.

Related to Tenancy Security Event Logs

  • Security Event means an immediately reportable subset of security incidents which incident would include: a. A suspected penetration of Contractor’s information system of which the Contractor becomes aware of but for which it is not able to verify immediately upon becoming aware of the suspected incident that PHI was not accessed, stolen, used, disclosed, modified, or destroyed; b. Any indication, evidence, or other security documentation that the Contractor’s network resources, including, but not limited to, software, network routers, firewalls, database and application servers, intrusion detection systems or other security appliances, may have been damaged, modified, taken over by proxy, or otherwise compromised, for which Contractor cannot refute the indication of the time the Contractor became aware of such indication; c. A breach of the security of the Contractor’s information system(s) by unauthorized acquisition, including, but not limited to, access to or use, disclosure, modification or destruction, of unencrypted computerized data and which incident materially compromises the security, confidentiality, or integrity of the PHI; and or, d. The unauthorized acquisition, including but not limited to access to or use, disclosure, modification or destruction, of unencrypted PHI or other confidential information of the County by an employee or authorized user of Contractor’s system(s) which materially compromises the security, confidentiality, or integrity of PHI or other confidential information of the County. If data acquired (including but not limited to access to or use, disclosure, modification or destruction of such data) is in encrypted format but the decryption key which would allow the decoding of the data is also taken, the parties shall treat the acquisition as a breach for purposes of determining appropriate response.