Data Logging Sample Clauses

Data Logging. OneNeck shall collect current and historical Performance/Health statistical data as applicable within the monitoring tool. Statistical data will include utilization, errors, and latency.
AutoNDA by SimpleDocs
Data Logging. There are effectively two different types of devices that work with the Universal Software. The first type is an Interval-based device, which sends out a message every two seconds, no matter what state it is in. The second type is an Event- based device, which will send a message with a status and a background reading once every five minutes, and a full message whenever an alarm, failure, or scan occurs. For the Interval Types (Models 375 and 2100), the data is logged on two different intervals, depending on the status of the device. The normal log interval is used when the device is not alarming or failing. The alarm log interval is used when the area monitor is alarming or failing. Typically the alarm log interval is set to log data at a faster rate to collect more information during an alarm. The Model 720 is similar to an Event device in that it sends a heartbeat (typically at five-minute intervals), but when it detects radiation, it will gather data for about 30 seconds before sending an alarm message.
Data Logging. When you access Internet Banking to conduct transactions, the information you enter may be recorded. By using Internet Banking, you consent to such recording.
Data Logging. Each Party shall ensure that the EDI messages, which it stores in the data log, can be readily accessible and can be retrieved in an understandable language, and can be printed out, should it be necessary.
Data Logging. The NMS shall provide fault logs and compile statistics to determine the service level of individual network elements. They will be used to determine weak devices in the telecommunications network that require attention. All configuration changes shall be logged, including hardware and software updates. Unauthorized or faulty configuration changes shall be flagged and an alert shall be provided to the network administrators. Security-related information shall be gathered and analyzed regularly by the NMS. These include network attacks, intrusions and attacks on the NMS itself.
Data Logging. Grid Tied String Inverter will log the inverter performance data and transmit the same to the data logger. It shall also monitor basic parameters like power generated, etc. The performance and generation data shall be recorded using a data logger. Data logger shall gather information and monitor the performance of the inverter. It shall also support measurements from the external sensors. Data Logger shall also monitor the Solar Insolation and Temp of Array Yard.

Related to Data Logging

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Logging The ISP will require the maintenance of network and application logs as part of BNY Mellon’s security information and event management processes. Logs are retained in accordance with law applicable to BNY Mellon’s provision of the services as well as BNY Mellon’s applicable policies. BNY Mellon uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Data Processing In this clause:

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • System and Data Access Services a.System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Details of Data Processing (a) Subject matter: The subject matter of the data processing under this DPA is the Customer Data.

Time is Money Join Law Insider Premium to draft better contracts faster.