Common use of Activity Logging Clause in Contracts

Activity Logging. Where technically available, for systems, applications, data repositories, middleware and network infrastructure devices, IBM’s team maintains logs of its activity. To minimize the possibility of tampering and to enable central analysis, alerting and reporting, activity logging is done in real-time to central log repositories. Data is signed to prevent tampering. Logs are analyzed in real-time and via periodic analysis reports to look for anomalous behavior. Operations staff is alerted to anomalies and contacts a 24x7 on-call security specialist when needed.

Appears in 2 contracts

Sources: Cloud Services Agreement, Ibm Cloud Services Agreement