Common use of Logging Clause in Contracts

Logging. The ISP will require the maintenance of network and application logs as part of BNYM’s security information and event management processes. Logs are retained in accordance with law applicable to BNYM’s provision of the Services as well as BNYM’s applicable policies. BNYM uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.

Appears in 7 contracts

Sources: Transfer Agency and Shareholder Services Agreement (Laudus Trust), Transfer Agency and Shareholder Services Agreement (Schwab Investments), Transfer Agency and Shareholder Services Agreement (Touchstone Strategic Trust)

Logging. The ISP will require the maintenance of network and application logs as part of BNYM’s security information and event management processes. Logs are retained in accordance with law applicable to BNYM’s provision of the Services services as well as BNYM’s applicable policies. BNYM uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.

Appears in 4 contracts

Sources: Transfer Agency and Shareholder Services Agreement (Pioneer Real Estate Shares), Transfer Agency and Shareholder Services Agreement (Pioneer Series Trust Viii), Transfer Agency and Shareholder Services Agreement (Pioneer Core Trust I)

Logging. The ISP will require the maintenance of network and application logs as part of BNYMBNY ’s security information and event management processes. Logs are retained in accordance with law applicable to BNYMBNY ’s provision of the Services as well as BNYMBNY ’s applicable policies. BNYM BNY uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.

Appears in 2 contracts

Sources: Custody Agreement (WisdomTree Bitcoin Fund), Custody Agreement (WisdomTree Bitcoin Fund)

Logging. The ISP will require the maintenance of network and application logs as part of BNYMBNY’s security information and event management processes. Logs are retained in accordance with law applicable to BNYMBNY’s provision of the Services services as well as BNYMBNY’s applicable policies. BNYM BNY uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture. Logs may be centralized and correlated for security event alerting.

Appears in 2 contracts

Sources: Custody Agreement (Morgan Stanley Bitcoin Trust), Fund Administration and Accounting Agreement (Morgan Stanley Bitcoin Trust)

Logging. The ISP will require the maintenance of network and application logs as part of BNYMBNY’s security information and event management processes. Logs are retained in accordance with law applicable to BNYMBNY’s provision of the Services as well as BNYMBNY’s applicable policies. BNYM BNY uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.

Appears in 1 contract

Sources: Custody Agreement (Blackstone Private Real Estate Credit & Income Fund)

Logging. The ISP will require the maintenance of network and application logs as part of BNYM’s security information and event management processes. Logs are retained in accordance with law applicable to BNYM’s provision of the Services as well as BNYM’s applicable policies. BNYM uses various tools in Confidential And Proprietary Execution Version conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.

Appears in 1 contract

Sources: Transfer Agency and Shareholder Services Agreement (Touchstone Funds Group Trust)

Logging. The ISP will require the maintenance of network and application logs as part of BNYMBNY’s security information and event management processes. Logs are retained in accordance with law applicable to BNYMBNY’s provision of the Services services as well as BNYMBNY’s applicable policies. BNYM BNY uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.. Logs may be centralized and correlated for security event alerting. BNY AND CUSTOMER CONFIDENTIAL EXECUTION VERSION

Appears in 1 contract

Sources: Custody Agreement (Morgan Stanley Bitcoin Trust)