Common use of Security Logs Clause in Contracts

Security Logs. Logs are generated for security-relevant activities on operating systems. Systems are configured to log default security activities, access to information or programs, system events such as alerts, console messages, and system errors. Oracle reviews logs for forensic purposes and incidents; identified anomalous activities feed into the incident management process. Security logs are stored within the Security Information and Event Management system in a native, unaltered format and retained in accordance with Oracle's internal policies. Such logs are retained online for a minimum of ninety (90) days, or as otherwise required by an applicable regulatory framework.

Appears in 2 contracts

Sources: Order Form, Order Form