Logging Requirements Sample Clauses

The Logging Requirements clause sets out the obligations for maintaining records of specific activities, transactions, or system events. Typically, it details what information must be logged, the format and retention period for logs, and who is responsible for maintaining them. For example, it may require a service provider to keep detailed access logs for all user interactions with a system for a minimum of one year. This clause ensures accountability and traceability, helping to facilitate audits, resolve disputes, and support compliance with regulatory or contractual obligations.
Logging Requirements. 3.1.5.1. CTI shall record the following information for every Station as part of the continuous monitoring process outlined in paragraph ▇.▇.▇.:
Logging Requirements. A. Boundary Lines, Survey Monuments, Mining Claim Witness Monuments. The BUYER(S) must paint or tag trees that mark the boundary of the Sale Area at their own expense. No blazed tree on any survey line or any witness tree to any survey corner, mining claim, or monument, shall be severed or removed, nor shall any survey corner be damaged or destroyed. Any violation of this section will require the BUYER(S) to bear the expense of re-establishing such lines, corners, or monuments including, but not limited to, survey costs and damages.
Logging Requirements. Data importerw shall ensure the following: 1) Significant security and system events are logged and reviewed; 2) Audit logs for systems in data importer-hosted environments used to provide services are retained for a minimum of twelve (12) months; 3) System audit logs are reviewed for anomalies; and 4) Log facilities and systems information are reasonably protected against tampering and unauthorized access.
Logging Requirements. Iron Mountain shall ensure the following: 6.15.1 Significant security and systems events are logged and reviewed; 6.15.2 Audit logs are retained for a minimum of one year for systems in Iron Mountain-hosted environment(s) used by Iron Mountain to provide services; 6.15.3 System audit logs are reviewed for anomalies; and 6.15.4 Log facilities and systems information are reasonably protected against tampering and unauthorized access.
Logging Requirements. Appendix 2A.1 (IT Service Management and Life Cycle Management Tools) to Schedule 2A (IT Service Management and Life Cycle Services SOW) to the Agreement is hereby deleted in its entirety and replaced with the Appendix 2A.1 (IT Service Management and Life Cycle Management Tools) to Schedule 2A (IT Service Management and Life Cycle Services SOW) attached as Exhibit 12 to this Amendment.