Measures for ensuring events logging Sample Clauses

Measures for ensuring events logging. Implementation of logging and alerting controls which include alerting of significant events; • Implementation of intrusion prevention and detection systems to monitor and log system resources for potential unauthorized access and generate alerts on attempted attacks; • Maintenance of retention policies for logs, audit trails and other documentation that provides evidence of security, systems, and audit processes and procedures related to Subscriber Data.
AutoNDA by SimpleDocs
Measures for ensuring events logging. All systems generate logs (from the VPN access to database queries, end-to-end) and alert in case of logging capabilities failure. All system logs are recorded and stored online for 90 days and in cold storage for 1 year. Running native on AWS Cloud, Cloudinary uses a set of Cloud-native tools that monitor activity and mitigate risks and configuration mistakes. Audit logs are kept in highly privileged, dedicated, S3 buckets and log file access is granted according to the principle of 'need to have' and is fully monitored. Cloudinary employs 24x7 system monitoring and ops personnel on call. When a service issue is identified, Cloudinary updates the system status at xxxx://xxxxxx.xxxxxxxxxx.xxx. Cloudinary measures multiple metrics to scale and accommodate changes in incoming load. The system has an automatic pre-emptive scale up events feature, based on known usage patterns which are unique to each data center. Cloudinary employs intrusion detection systems and uses commercial and customized tools to collect and examine Cloudinary’s application and system logs, to detect anomalies.
Measures for ensuring events logging. All critical devices, systems, datastores, and applications have event logging enabled. Logging events must contain what occurred, who or what caused the event, when the event occurred (i.e. timestamp), and the associated system applications or data affected by the events. Where possible, the following system, datastore, and application types of events should be logged: ● All authentication events (success and fail) ● Account or role creation, modification, or deletion ● Changes to system or application configuration ● All alerts raised by the access control system ● Administrator or operator activities Centrally collected event logs from systems, datastores, and applications. Access to centrally collected event logs is controlled by these teams and limited to “need to know” scenarios. Centrally collected event logs are retained for a period of no less than 12 months. Tonic uses AWS Control Tower to manage our AWS accounts and aggregate logs into audit and security environments to prevent tampering. Measures for ensuring system configuration, including default configuration Tonic uses Infrastructure as Code (IaC) codebooks for the construction of our networks to ensure they can be rebuilt quickly and uniformly in the event of a catastrophic incident resulting in the loss of a network. Tonic has developed system baselines and standards for production and development workloads. These baselines and standards are updated on a regular basis based on industry guidance. Tonic uses AWS and other commercial monitoring tools, and preventive and detective controls to ensure deployed devices align with our configuration standards. Measures for internal IT and IT security governance and management Personal data is protected with least privilege access and handled with appropriate operational procedures. Access shall be limited to the minimum necessary to perform the assigned duties (principle of least privilege). Tonic has developed system baselines and standards for workstations and mobile devices. These baselines and standards are updated on a regular basis based on industry guidance. These standards include (but are not limited to): ● Centralized management of devices (lock, erase, push policy, push configuration) ● Full disk encryption ● Access to device must be authenticated ● Anti-malware system is installed and operational ● Password meets password policy ● Secure defaults are configured ● Auto-lock after timeout ● Operating system is automatically updated with ...
Measures for ensuring events logging. To ensure the secure access of C2 services, we have a strict process for regulating and monitoring external logins through Synology Accounts. We have implemented measures to protect against potential threats, including detecting and blocking suspicious or abnormal login attempts from specific IP addresses or accounts, as well as maintaining proper permissions to ensure that only authorized users can access our services. Synology logs all login and data access events to manage user identity. Only specific team members have the authority to access the information security management systems. IP addresses with repeated unsuccessful login attempts to the VPN will be blocked. We also send the daily login records to both the respective users and our IT department for auditing purpose.
Measures for ensuring events logging. 9. Opatření pro zajištění protokolování událostí o Security Incident & Event Management (SIEM) solution in use for access log monitoring. o Používané řešení pro správu bezpečnostních incidentů a událostí (SIEM) pro monitorování záznamu o přístupu. o Multiple layers of monitoring tools in use analyzing behavior anomalies across the network. o Používané víceúrovňové monitorovací nástroje, které analyzují anomálie chování v celé síti.
Measures for ensuring events logging. ConnectWise monitors access to applications, tools, and resources that process or store Customer Data, including cloud services. Monitoring of security logs is centralized by the security team. Log activities are investigated when necessary and escalated appropriately. Measures for ensuring systems configuration, including default configuration. ConnectWise applies Secure Software Development Lifecycle (Secure SDLC) standards to perform numerous security-related activities for the Offerings across different phases of the product creation lifecycle from requirements gathering and product design all the way through product deployment. These activities include, but are not limited to, the performance of (a) internal security reviews before new Offerings are deployed; (b) annual penetration testing by independent third parties; and (c) threat models for new Offerings to detect any potential security threats and vulnerabilities. ConnectWise adheres to a change management process to administer changes to the production environment for the Offerings, including changes to its underlying software, applications, and systems.

Related to Measures for ensuring events logging

  • Benchmarks for Measuring Accessibility For the purposes of this Agreement, the accessibility of online content and functionality will be measured according to the W3C’s Web Content Accessibility Guidelines (WCAG) 2.0 Level AA and the Web Accessibility Initiative Accessible Rich Internet Applications Suite (WAI-ARIA) 1.0 for web content, which are incorporated by reference. Adherence to these accessible technology standards is one way to ensure compliance with the College’s underlying legal obligations to ensure that people with disabilities are able to acquire the same information, engage in the same interactions, and enjoy the same benefits and services within the same timeframe as their nondisabled peers, with substantially equivalent ease of use; that they are not excluded from participation in, denied the benefits of, or otherwise subjected to discrimination in any College programs, services, and activities delivered online, as required by Section 504 and the ADA and their implementing regulations; and that they receive effective communication of the College’s programs, services, and activities delivered online.

  • PROCEDURES FOR EVALUATION A. The evaluations of school year employees covered by this agreement shall be completed no later than May 30 of each school year for 9-month employees and by June 30 for 10/12-month employees. The evaluation shall be reviewed with the employee, with a copy given to the employee at the conclusion of the review. An employee may present written comments, which shall be attached to the written evaluation document. The evaluator and employee shall sign the evaluation document. The employee’s signature does not constitute approval or disapproval, but only that the evaluation has been reviewed with the employee.

  • Criteria for Evaluation Criteria for employee performance review shall be made available to the employee before the start of the evaluation period and shall remain unchanged during the evaluation period unless the employee is made aware of the changes.

  • Human and Financial Resources to Implement Safeguards Requirements 6. The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

  • NOTIFICATION OF PUBLIC EVENTS AND MEETINGS 2 A. CONTRACTOR shall notify ADMINISTRATOR of any public event or meeting funded in 3 whole or in part by the COUNTY, except for those events or meetings that are intended solely to serve 4 clients or occur in the normal course of business.

  • PROCEDURES FOR CONDUCTING NEGOTIATIONS Either party may request negotiations for a successor Agreement by issuing a notice to negotiate to the other party between one hundred twenty (120) and ninety (90) days prior to the expiration of this Agreement. The State Employment Relations Board will also be notified of the intent to open negotiations at this time. Within fifteen (15) days of receipt of said notice, representatives of the parties shall meet and submit proposals for the successor Agreement. Said proposals shall be comprehensive in nature and no additional issues shall be introduced after the first session without mutual agreement. Subsequent bargaining sessions shall be set at times and dates as are mutually agreed to by the teams. Negotiation teams will be limited to five (5) members each. Both sides may agree to change this size by mutual agreement. Negotiation sessions shall be conducted in executive session; however, this does not prohibit the flow of information to either party’s constituency. The style of bargaining shall be mutually decided by the parties prior to negotiations. Upon request of either bargaining team, a bargaining session may be recessed to permit a caucus. When negotiations are conducted during regular school hours, release time shall be provided for the Association’s bargaining team. (Reference: Article 18) There shall be three (3) signed copies of the final agreement. One (1) copy shall be retained by the Board, one (1) by the Association, and one (1) shall be submitted to the State Employment Relations Board. As tentative agreement is reached on each issue, it shall be so noted and initialed by each party. When consensus is reached covering the areas under discussion, the proposed Agreement shall be reduced to writing as a tentative agreement and submitted to the Association and the Board for approval. Following approval by the Association and Board, a contract shall be entered into by both parties. The Association and the Board agree to abide by the terms of the Agreement. The final Agreement, as adopted by the Board and ratified by the Association, will be printed and presented within thirty (30) days. The cost of such printing, including labor and material shall be borne by the Board In the event an agreement is not reached after forty-five (45) days from the first bargaining session, either of the parties shall have the option of requesting the assistance of a federal mediator under the guidelines of the Federal Mediation and Conciliation Service. In the event that the services of a mediator are called upon, the mediation process will last twenty-one

  • Standards for Network Elements 1.8.1 BellSouth shall comply with the requirements set forth in the technical references, as well as any performance or other requirements identified in this Agreement, to the extent that they are consistent with the greater of BellSouth’s actual performance or applicable industry standards.

  • Linking to the Website and Social Media Features You may link to our homepage, provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval, or endorsement on our part. This Website may provide certain social media features that enable you to: • Link from your own or certain third-party websites to certain content on this Website. • Send emails or other communications with certain content, or links to certain content, on this Website. • Cause limited portions of content on this Website to be displayed or appear to be displayed on your own or certain third-party websites. You may use these features solely as they are provided by us, and solely with respect to the content they are displayed with, and otherwise in accordance with any additional terms and conditions we provide with respect to such features. Subject to the foregoing, you must not: • Establish a link from any website that is not owned by you. • Cause the Website or portions of it to be displayed on, or appear to be displayed by, any other site, for example, framing, deep linking, or in-line linking. • Link to any part of the Website other than the homepage. • Otherwise take any action with respect to the materials on this Website that is inconsistent with any other provision of these Terms of Use. The website from which you are linking, or on which you make certain content available, must comply in all respects with the Content Standards set out in these Terms of Use. You agree to cooperate with us in causing any unauthorized framing or linking immediately to stop. We reserve the right to withdraw linking permission without notice. We may disable all or any social media features and any links at any time without notice in our discretion.

  • Events Beyond Our Control If an Event Beyond Our Control occurs and prevents Us from performing any of Our obligations under this Contract to any extent, then We are not required to perform that obligation to the extent and for as long as We are prevented by that Event Beyond Our Control. If such an Event Beyond Our Control occurs and We consider it appropriate to do so, We may notify You of the Event Beyond Our Control by any reasonable means, including by a public announcement.

  • Aggravating and Mitigating Factors The penalties in this matter were determined in consideration of all relevant circumstances, including statutory factors as described in CARB’s Enforcement Policy. CARB considered whether the violator came into compliance quickly and cooperated with the investigation; the extent of harm to public health, safety and welfare; nature and persistence of the violation, including the magnitude of the excess emissions; compliance history; preventative efforts taken; innovative nature and the magnitude of the effort required to comply, and the accuracy, reproducibility, and repeatability of the available test methods; efforts to attain, or provide for, compliance prior to violation; action taken to mitigate the violation; financial burden to the violator; and voluntary disclosure. The penalties are set at levels sufficient to deter violations, to remove any economic benefit or unfair advantage from noncompliance, to obtain swift compliance, and the potential costs, risks, and uncertainty associated with litigation. Penalties in future cases might be smaller or larger depending on the unique circumstances of the case.

Time is Money Join Law Insider Premium to draft better contracts faster.