Logging and Monitoring Sample Clauses

Logging and Monitoring. The production infrastructure log activities are centrally collected and are secured in an effort to prevent tampering and are monitored for anomalies by a trained security team.
AutoNDA by SimpleDocs
Logging and Monitoring. Log files are activated for each system/application used for the processing of personal data. They include all types of access to data (view, modification, deletion).
Logging and Monitoring. Cisco shall maintain logs of administrator and operator activity and data recovery events related to Protected Data.
Logging and Monitoring. Genesys will log security events from the operating perspective for all servers providing the Genesys PureConnect Cloud Service to Customer. Genesys will monitor and investigate events that may indicate a security incident or problem. Event records will be retained for ninety (90) days.
Logging and Monitoring. Unless prohibited by applicable law, Contractor shall, and shall require subcontractors to, continuously monitor its networks and personnel for malicious activity and other activity that may cause damage or vulnerability to City Data. Contractor shall maintain logs of administrator and operator activity and data recovery events related to City Data.
Logging and Monitoring. Logging mechanisms will be in place sufficient to identify security incidents, establish individual accountability, and reconstruct events. Audit logs will be retained in a protected state (i.e., encrypted, or locked) with a process for periodic review.
Logging and Monitoring. Copper will log and monitor access to Customer Personal Information on networks, systems and devices operated by Copper.
AutoNDA by SimpleDocs
Logging and Monitoring. NetDocuments will employ logging mechanisms within the Service to permit Customer to review document-level events and administrative changes for the previous 90 days. Details about the Consolidated Activity Log and Administrative Activity Log can be found on the NetDocuments support website. NetDocuments also logs comprehensive information regarding the functionality of the ND Network. NetDocuments maintains its log information for at least 1 year.
Logging and Monitoring. Logging and monitoring of security logs via a Security Incident Event Management (“SIEM”) system and alerting to a dedicated Incident Response team upon the detection of suspicious system and/or user behaviors;
Logging and Monitoring. Logging activities must be documented and performed in accordance with common security standards (e.g., ISO, NIST). Monitoring for anomalies in activity is preferred.
Time is Money Join Law Insider Premium to draft better contracts faster.