Common use of Detection Clause in Contracts

Detection. We designed our infrastructure to log extensive information about the system behavior, traffic received, system authentication, and other application requests. Internal and external systems (Security Operation Center) aggregate log data and alert (24/7/365) appropriate employees of malicious, unintended, or anomalous activities. Our personnel, including security, IT, Cloud Operations and support personnel, are responsive to known incidents.

Appears in 3 contracts

Sources: Data Processing Addendum, Data Processing Addendum, Data Processing Addendum