Common use of SECURITY GUIDELINES Clause in Contracts

SECURITY GUIDELINES. 37.2.1 Both Parties will maintain accurate records, subject to audit, that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 2 contracts

Samples: Interconnection Agreement, Interconnection Agreement

AutoNDA by SimpleDocs

SECURITY GUIDELINES. 37.2.1 40.2.1 Both Parties will maintain accurate records, subject to audit, that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 1 contract

Samples: Interconnection Agreement

AutoNDA by SimpleDocs

SECURITY GUIDELINES. 37.2.1 (1) Both Parties will maintain accurate records, subject to audit, and auditable records that monitor user authentication and machine integrity and confidentiality (e.g., password assignment and aging, chronological logs configured, system accounting data, etc.).

Appears in 1 contract

Samples: Interconnection Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.