Log Collection Clause Samples
The Log Collection clause defines the process and permissions for gathering and storing system or application logs generated during the use of a service or software. Typically, this clause outlines what types of logs may be collected (such as access logs, error logs, or usage data), who is authorized to access them, and how long the logs will be retained. By establishing clear guidelines for log collection, this clause helps ensure transparency, supports troubleshooting and security monitoring, and addresses privacy or compliance concerns related to data handling.
Log Collection. Depending on the scope of the client’s environment, software agents will be deployed by Client on contracted Client-owned devices (as specified on the Service Order) to enable collection of logs for security event monitoring. Logs are aggregated and stored within the BlueVoyant Platform from many sources including endpoint (workstations, laptops, servers, etc.), network, applications, and cloud infrastructure. See Section 6 below for a detailed description of Log Collection.
Log Collection. Depending on the scope of the Client’s environment, log collector appliances or agents will be deployed by the Client on contracted Client-owned devices (as specified on the Service Order) to enable the collection of logs for security event monitoring. Logs are aggregated and stored within the Client’s instance of Splunk Cloud Platform. The BlueVoyant Platform will push security detection algorithms, in the form of Splunk Searches, to the Client’s Splunk Cloud Platform in order to detect anomalies from data sources ingested into the Client’s Splunk Cloud Platform, including endpoint (workstations, laptops, servers, etc.), network, applications, and cloud infrastructure. See Section 6 below for a detailed description of log Collection. If warranted in order to support further investigation of a Security Event, BlueVoyant SOC analysts may access the Splunk Cloud Platform instance via the BlueVoyant Platform to perform further analysis.
Log Collection. Configuration, deployment, and testing of Log collection and transmission as per the agreement in the introduction phase. Log Collection is described in Appendix B Section 5.
