Log Files Sample Clauses

Log Files. As is true of most websites, we gather certain information automatically and store it in log files. This information includes IP addresses, browser type, (ISP, referring/exit pages, operating system, date/time stamp, and clickstream data. We use this information to analyze trends, to administer the Website, to track users' movements around the Website and to improve our Website usability.
AutoNDA by SimpleDocs
Log Files. Upon written request by Primus, Distributor shall transmit to Primus a current, complete and correct copy of the log file for each server on which the Software is installed; provided, however, that unless review of a log file has indicated additional fees are due to Primus, Primus may not request a copy of any one log file more frequently than once a year.
Log Files. As is true of most websites, we gather certain information automatically and store it in log files. This information includes internet protocol (IP) addresses, browser type, internet service provider (ISP), referring/exit pages, operating system, date/time stamp, and clickstream data. We use this information, which does not identify individual users, to analyze trends, to administer the Website, to track users' movements around the Website and to improve our Website usability. We do not link this automatically-collected data to personally identifiable information, other than your IP address should it be determined to be personally identifiable information as required by law.
Log Files. Upon written request by Primus, Distributor shall, to the extent provided by the Software License Agreement, and except as restricted by applicable local law, transmit to Primus a current, complete and correct copy of the log file for each server of Distributor, its sub-distributors and of Authorized End-Users on which the Software is installed; provided, however, that unless review of a log file has indicated additional fees are due to Primus, Primus (i) may not request a copy of the log file more frequently than once a quarter, and (ii) shall pay Distributor's reasonable expenses incurred with respect to such transmission.
Log Files. 11.4.1. We collect statistical information about you from page hits. Every page, image or CGI program requested by your browser from our servers is logged in a log file, which also collects the following information: your remote IP address, the referring HTML page and the type of browser and computer that you are using. We use IP addresses to analyze trends, administer our site, track your movements, and gather broad demographic information for aggregate use. The statistical
Log Files. Our log tracking collects visitors’ IP addresses to analyze trends, administer our website, track visitor movement, and gather broad demographic information to help determine the type of information visitors are interested in seeing on our website. This tracking only collects IP addresses and not personally identifiable information. Visitors are not personally identifiable within our log files. Cobalt Ridge only uses this information for internal purposes and does not share this information with non-affiliated companies or institutions.
Log Files. 15.1. BiP uses IP addresses to analyse trends, administer the Service, track Users’ movement and activity, and gather broad demographic information for aggregate use.
AutoNDA by SimpleDocs
Log Files. You acknowledge that correspondence and log files generated in conjunction with a request for support services may contain sensitive, confidential or personal information. You are solely responsible for taking the steps necessary to protect such data, including obfuscating the logs or otherwise guarding such information prior to sending it to VMware
Log Files. Log files of access to Acquirer’s Confidential Information must be maintained for up to one year and must contain the date, time, requestor, and the nature of the access (i.e., read-only or modify).
Log Files. As is true of most Networks, we gather certain information automatically and store it in log files. This information includes Internet Protocol (IP) addresses, browser type, Internet Service Provider (ISP), referring/exit pages, operating system, date/time stamp, and movements around the Network, and to gather demographic information about our user base as a whole. We do not link this automatically collected data to personally identifiable information.
Time is Money Join Law Insider Premium to draft better contracts faster.