ACCESS TO SECURITY LOGS AND REPORTS Sample Clauses

ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.
AutoNDA by SimpleDocs
ACCESS TO SECURITY LOGS AND REPORTS. The Contractor shall provide reports on a schedule specified in the SLA to the Purchasing Entity in a format as specified in the SLA agreed to by both the Contractor and the Purchasing Entity. Reports shall include latency statistics, user access, user access IP address, user access history and security logs for all public jurisdiction files related to this Master Agreement and applicable Participating Addendum.
ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement. CONTRACTOR PERFORMANCE AUDIT‌ The Contractor shall allow the Authorized User to assess Contractor’s performance by providing any materials requested in the Authorized User Agreement (e.g., page load times, response times, uptime, and fail over time). The Authorized User may perform this Contractor performance audit with a third party at its discretion, at the Authorized User’s expense. The Contractor shall perform an independent audit of its Data Centers, at least annually, at Contractor expense. The Contractor will provide a data owner facing audit report upon request by the Authorized User. The Contractor shall identify any confidential, trade secret, or proprietary information in accordance with Appendix B, Section 9(a), Confidential/Trade Secret Materials. PERSONNEL‌
ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement. CONTRACTOR PERFORMANCE AUDIT‌ The Contractor shall allow the Authorized User to assess Contractor’s performance by providing any materials requested in the Authorized User Agreement (e.g., page load times, response times, uptime, and fail over time). The Authorized User may perform this Contractor performance audit with a third party at its discretion, at the Authorized User’s expense. The Contractor shall perform an independent audit of its Data Centers, at least annually, at Contractor expense. The Contractor will provide a data owner facing audit report upon request by the Authorized User. The Contractor shall identify any confidential, trade secret, or proprietary information in accordance with Appendix B, Section 9(a), Confidential/Trade Secret Materials. PERSONNEL‌ Background Checks‌ The Authorized User Agreement may require the Contractor to conduct background checks on certain Contractor staff at no charge to the Authorized User. Separation of Duties‌ The Authorized User Agreement may require the separation of job duties, and that Contractor staff knowledge of Data be limited to that which is absolutely needed to perform job duties. BUSINESS CONTINUITY/DISASTER RECOVERY (BC/DR) OPERATIONS‌ If required in the Authorized User Agreement, the Contractor shall provide a Business Continuity and Disaster Recovery plan specific to the entire Cloud Solution provided. The Contractor shall specify how the BC/DR plan will impact access to the required features and functionality of the Cloud Product associated with the Authorized User Agreement.
ACCESS TO SECURITY LOGS AND REPORTS a. The Contractor shall provide reports on a schedule specified in the SLA to the Contractor directly related to the infrastructure that the Contractor controls upon which the Purchasing Entity’s account resides. Unless otherwise agreed to in the SLA, the Contractor shall provide the public jurisdiction a history or all API calls for the Purchasing Entity account that includes the identity of the API caller, the time of the API call, the source IP address of the API caller, the request parameters and the response elements returned by the Contractor. The report will be sufficient to enable the Purchasing Entity to perform security analysis, resource change tracking and compliance auditing
ACCESS TO SECURITY LOGS AND REPORTS. The contractor shall provide to the State reports on a schedule and in a format specified in the Service Level Agreement as agreed to by both the contractor and the State. Reports shall include latency statistics, user access, user access IP address, user access history, and security logs for all Data. The State’s audit requirements shall, if applicable, be defined in the Statement of Work.
ACCESS TO SECURITY LOGS AND REPORTS. Vendor shall provide security logs and reports to OCIO in a mutually agreeable format upon request. Such reports shall include at least latency statistics, user access summaries, user access IP address summaries, user access history and security logs for all State files related to the underlying agreement.
AutoNDA by SimpleDocs
ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Consultant shall provide reports to NYSDOT in a format as specified in the Contract.
ACCESS TO SECURITY LOGS AND REPORTS. The Contractor shall provide reports to the City in a format as agreed to by both the Contractor and the City. Reports shall include latency statistics, user access, user access IP address, API calls for the City’s account including the source IP address of the API caller, the request parameters and the response elements returned, user access history and security logs for all City Data and digital content related to this Agreement. The reports shall be sufficient to enable the City to perform security analysis, resource change tracking and compliance auditing and can be requested upon knowledge of a security incident or security breach.
ACCESS TO SECURITY LOGS AND REPORTS. Vendor shall provide security logs and reports to the State of Iowa in a mutually agreeable format. Such reports shall include at least latency statistics, user access summaries, user access IP address summaries, user access history and security logs for all State of Iowa files related to this Agreement. Section 13, and Vendor’s duties, obligations and liability under this Section 13 shall survive termination or expiration of this Agreement. Disaster Recovery/Business Continuity/Data Backup/Loss of Data. Creation, Maintenance and Testing. Vendor shall maintain a Business Continuity and Disaster Recovery Plan for the Services (the “Plan”), and implement such plan in the event of any unplanned interruption of the Services. On or before the Effective Date, Vendor shall provide the State of Iowa with a copy of Vendor’s current Plan, revision history, and any reports or summaries relating to past testing of the Plan. Vendor shall actively test, review, and update the Plan on at least an annual basis using American Institute of Certified Public Accountants standards and other industry best practices as guidance. Vendor shall promptly provide the State of Iowa with copies of all reports and/or summaries resulting from any testing of the Plan and with copies of all such updates to the Plan. All updates shall be subject to the requirements of this Section 14 (Disaster Recovery/Business Continuity). Any future updates or revisions to the Plan shall be no less protective than the plan in effect as of the Effective Date. Throughout the Term, Vendor shall maintain disaster avoidance procedures designed to safeguard the State of Iowa's Confidential Information and the data processing capability and availability of the Services. Additional disaster recovery/business continuity requirements may be set forth in individual Statement(s) of Work.
Time is Money Join Law Insider Premium to draft better contracts faster.