Log Management Sample Clauses

Log Management. Convercent shall deploy a log management solution and retain logs produced by firewalls and intrusion detection systems for a minimum period of one (1) year.
AutoNDA by SimpleDocs
Log Management. You shall deploy a log management solution and retain logs produced by firewalls and intrusion detection systems for a minimum period of one (1) year.
Log Management. Market Logic shall ensure that all systems, incl. firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralized server for a minimum period of 3 months.
Log Management. All IT systems need to collect the appropriate level of logs.
Log Management. Manually or automatically back up important log files and store and maintain them in special equipments, so that when anything wrong should happen, the Esunny staff will be able to call the logs for detailed investigation;
Log Management. Maintel shall provide network security activity logs over a 6-months period from the date Services are taken, on a rolling basis. The proposed log retention policy can be extended upon Partner request, and the Partner agrees that associated Charges may be incurred.
Log Management. To maintain the operation status of its own resources, the Internet-based online sale system keeps operation records of its routine events, and that is so-called system log. System log can be used to monitor system resources, examine users’ behavior, issue alarm on suspicious action, ascertain the scope of intrusion and assist in system recovery. The types of system management log include: Operation log: record the operations of external customers and internal users within the system. Operation types include: logon, push-out, click, order placement, payment, information maintenance, etc. System log: record system operation status It records system operating status, and uses such records as the basis for system monitoring.
AutoNDA by SimpleDocs

Related to Log Management

  • Traffic Management The Customer will not utilize the Services in a manner which, in the view of the Centre Operator, significantly distorts traffic balance on the Centre Operator’s circuits which are shared with other users. If, in the reasonable view of the Centre Operator, the Customer’s traffic patterns cause or may cause such distortion, the Customer should have a dedicated circuit capability. If the Customer declines to do so then the Centre Operator may suspend the Services while the matter is being resolved. If there is no resolution within 5 business days then either party may terminate the Agreement.

  • SITE MANAGEMENT We reserve the right, but not the obligation, to: (1) monitor the Site for violations of these Terms of Use; (2) take appropriate legal action against anyone who, in our sole discretion, violates the law or these Terms of Use, including without limitation, reporting such user to law enforcement authorities; (3) in our sole discretion and without limitation, refuse, restrict access to, limit the availability of, or disable (to the extent technologically feasible) any of your Contributions or any portion thereof; (4) in our sole discretion and without limitation, notice, or liability, to remove from the Site or otherwise disable all files and content that are excessive in size or are in any way burdensome to our systems; and (5) otherwise manage the Site in a manner designed to protect our rights and property and to facilitate the proper functioning of the Site.

  • Patch Management All workstations, laptops and other systems that process and/or 22 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 23 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 24 necessary. There must be a documented patch management process which determines installation 25 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 26 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 27 and systems that cannot be patched due to operational reasons must have compensatory controls 28 implemented to minimize risk, where possible.

  • Network Management 60.1 CLEC and CenturyLink will exchange appropriate information (e.g., network information, maintenance contact numbers, escalation procedures, and information required to comply with requirements of law enforcement and national security agencies) for network management purposes. In addition, the Parties will apply sound network management principles to alleviate or to prevent traffic congestion and to minimize fraud associated with third number billed calls, calling card calls, and other services related to this Agreement.

  • General Management In the discharge of its general duty to manage the successful performance of the Services, Vendor shall:

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Information Management Information and Records

  • Investment Management If and to the extent requested by the Advisor, the Sub-Advisor shall, subject to the supervision of the Advisor, manage all or a portion of the investments of the Portfolio in accordance with the investment objective, policies and limitations provided in the Portfolio's Prospectus or other governing instruments, as amended from time to time, the Investment Company Act of 1940 (the "1940 Act") and rules thereunder, as amended from time to time, and such other limitations as the Trust or Advisor may impose with respect to the Portfolio by notice to the Sub-Advisor. With respect to the portion of the investments of the Portfolio under its management, the Sub-Advisor is authorized to make investment decisions on behalf of the Portfolio with regard to any stock, bond, other security or investment instrument, and to place orders for the purchase and sale of such securities through such broker-dealers as the Sub-Advisor may select. The Sub-Advisor may also be authorized, but only to the extent such duties are delegated in writing by the Advisor, to provide additional investment management services to the Portfolio, including but not limited to services such as managing foreign currency investments, purchasing and selling or writing futures and options contracts, borrowing money or lending securities on behalf of the Portfolio. All investment management and any other activities of the Sub-Advisor shall at all times be subject to the control and direction of the Advisor and the Trust's Board of Trustees.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.

Time is Money Join Law Insider Premium to draft better contracts faster.