System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.
Signaling Link Transport 9.2.1 Signaling Link Transport is a set of two or four dedicated 56 kbps transmission paths between Global Connection-designated Signaling Points of Interconnection that provide appropriate physical diversity.
Crane Erection & Jumping (a) Cranes and man/material hoists may be erected, altered, climbed and dismantled during times when ordinary production works are in progress subject to the work being done in full compliance with a relevant operational safety zone (OSZ) plan which has been developed specifically for that operation with consideration to overall site safety. (b) The crane crew for each tower crane (Crane Crew) must consist of the following: (i) crane driver; and (ii) three (3) dogmen. (c) In addition to the appropriate tickets held by the crane driver and the dogmen, the following high risk licences must be held amongst the Crane Crew: (i) rigging; and (ii) material handling. (d) Where a Project consists of a single Crane Crew, the Employer should endeavour to ensure another member of the Crane Crew holds a crane driver licence.
Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.
Logging The ISP will require the maintenance of network and application logs as part of BNY Mellon’s security information and event management processes. Logs are retained in accordance with law applicable to BNY Mellon’s provision of the services as well as BNY Mellon’s applicable policies. BNY Mellon uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.