Policies and Logging Sample Clauses

Policies and Logging. The Braze Services are operated in accordance with the following procedures to enhance security: ● User passwords are never transmitted or stored in clear text ● Braze uses industry-standard methods to determine password validity ● API key information for third-party services provided by the customer are encrypted for storage ● Braze keeps audit logs for all access to production servers ● Server access is controlled via public key access, instead of passwords, and only permitted while on VPN that requires multi-factor authentication ● Logs are stored in a secure centralized host to prevent tampering ● Braze application and ssh audit logs are stored for one year ● Passwords are not logged under any circumstances ● Access to Braze mail and document services is only allowed on approved mobile devices that have automated security policies enforced, such as encryption, autolock and passwords ● All access to customer dashboard accounts by Braze Employees must be done through an internal service that is accessible via a 3-factor VPN only ● As part of Xxxxx’s Employee Information Security Policy, employees may not store any Customer Data on removable media
AutoNDA by SimpleDocs
Policies and Logging. The ET Services are operated in accordance with the following procedures to enhance security: • User passwords are never transmitted unencrypted. • User access log entries will be maintained, containing date, time, URL executed or identity ID operated on, operation performed (viewed, edited, etc.) and source IP address. • Logs will be stored in a secure centralized host to prevent tampering. • Passwords are not logged under any circumstances. • Watchdog Behavioral Monitoring Program alerts ET Security to anomalous behavior within the ET Services.
Policies and Logging. The Service is operated in accordance with the following procedures to enhance security: User passwords are stored using a one-way hashing algorithm (SHA-256) and are never transmitted unencrypted. User access log entries will be maintained, containing date, time, User ID, URL executed or entity ID operated on, operation performed (viewed, edited, etc.) and source IP address. Note that source IP address might not be available if NAT (Network Address Translation) or XXX (Port Address Translation ) is used by Customer or its ISP. If there is suspicion of inappropriate access, SFDC can provide Customer log entry records to assist in forensic analysis. This service will be provided to Customer on a time and materials basis. Logging will be kept for a minimum of 90 days. Logging will be kept in a secure area to prevent tampering. Passwords are not logged under any circumstances. Certain administrative changes to the Service (such as password changes and adding custom fields) are tracked in an area known as the “Setup Audit Log” and are available for viewing by Customer’s system administrator. Customer may download and store this data locally. SFDC personnel will not set a defined password for a User. Passwords are reset to a random value (which must be changed on first use) and delivered automatically via email to the requesting User. Intrusion Detection. SFDC, or an authorized third party, will monitor the Service for unauthorized intrusions using network-based intrusion detection mechanisms. User Authentication. Access to the Service requires a valid User ID and password combination, which are encrypted via SSL while in transmission. Following a successful authentication, a random session ID is generated and stored in the user’s browser to preserve and track session state. Security Logs. SFDC shall ensure that all SFDC systems, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralized syslog server (for network systems) in order to enable the security audits referred to herein.

Related to Policies and Logging

  • Log and Load Reporting Service This contract may at the States discretion, require the services of a State approved third party log and load reporting service. Purchaser shall ensure log volume measurement, weight, or scale and weight data for each load is received by the log and load reporting service within 1 business day of logs being measured or weighed. If during the term of this contract, the State discontinues use of the Log and Load Reporting Service, the State will notify the Purchaser in writing, and will approve an alternative log and load reporting process. L-080 Scaling Rules Determination of volume and grade of any forest products shall be conducted by a state approved third party scaling organization and in accordance with the Westside log scaling and grading rules and Xxxxxxxx Volume Table, revised July 1, 1972, contained in the Northwest Log Rules Eastside and Westside Log Scaling Handbook (developed and produced by the Northwest Log Rules Advisory Group) and in effect on the date of confirmation of this contract. Special scaling specifications shall be noted on the State’s Brand Designation form which is hereby incorporated to this contract by reference. X-000 Xxxxx Xxxxxxxx of Log Scaling and Weighing Locations Forest Product measurement and weighing facilities required by this contract must be approved by the State. Forest products sold under the contract which require log scaling shall be scaled, measured, or counted by a State approved third party log scaling organization. Forest products sold under the contract which require weighing shall be weighed at a location that meets Washington State Department of Agriculture approval. Prior to forest products being hauled, the Contract Administrator must authorize in writing the use of State approved measurement and/or weighing facilities that are at or en-route to final destinations. Forest products from this sale shall be measured or weighed at facilities, which are currently approved for use by the State and are currently authorized for this sale. The State reserves the right to verify load volume and weights with State employees or contractors at the State's own expense. The State reserves the right to revoke the authorization of previously approved measurement locations.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Travel, Meals and Lodging When provided for in the Mini-Bid and resultant Authorized User Agreement, an Authorized User may reimburse travel expenses. All rules and regulations associated with this travel can be found at xxxx://xxx.xxxxx.xx.xx/agencies/travel/travel.htm. In no case will any travel reimbursement be paid that exceeds these rates. All travel will be paid only as part of a deliverable specified within the Authorized User Agreement and must be billed with that associated Invoice with receipts attached. The Contractor shall receive prior approval from the Authorized User for any travel that occurs during the term of an Authorized User Agreement. Parking fees and/or parking tickets may not be paid by an Authorized User. Unless otherwise specified in writing by the Authorized User, a vehicle will not be provided by Authorized User to the Contractor for travel. Therefore, the Contractor will be responsible for ensuring that the Contractor has access to an appropriate vehicle (e.g., personal vehicle or rental vehicle) or common carrier with which to carry out any necessary travel. For the Contractor to obtain reimbursement for the use of a rental vehicle, such use must be justified as the most cost-effective mode of transportation under the circumstances (including consideration of the most effective use of time). The Contractor shall provide evidence of three (3) written or telephone price quotes, and the paid invoice must detail the type of vehicle rented, miles traveled, license plate number, and time of pickup and return. The Contractor is responsible for keeping adequate records to substantiate any claims for reimbursement, by personnel for travel in performance of the services.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Meals and Lodging (a) Meal and lodging expenses shall not be allowed without prior approval of the appointing authority or designee as necessary for the purpose of conducting County business. Excess charges greater than the amounts listed below in paragraphs (b) and (c) may be authorized under special conditions, such as a convention requirement or in an area of unusually high cost (such as San Francisco Bay area, Sacramento, Los Angeles and San Diego). Original receipts are mandatory to obtain reimbursement for all lodging expenses, and except as provided below for all meal expenses claimed.

  • Responsibilities of Business Associate Business Associate agrees:

  • KEYS AND LOCKS Landlord will furnish Tenant, free of charge, two keys to each door or lock in the Premises. Landlord may make a reasonable charge for any additional or replacement keys. Tenant will not duplicate any keys, alter any locks or install any new or additional lock or bolt on any door of its Premises or on any other part of the Building without the prior written consent of Landlord and, in any event, Tenant will provide Landlord with a key for any such lock. On the termination of the Lease, Tenant will deliver to Landlord all keys to any locks or doors in the Building which have been obtained by Tenant.

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • FORMAT AND CONTENT FOR REGISTRY OPERATOR MONTHLY REPORTING Registry Operator shall provide one set of monthly reports per gTLD, using the API described in draft-­‐xxxxxx-­‐icann-­‐registry-­‐interfaces, see Specification 2, Part A, Section 9, reference 5, with the following content. ICANN may request in the future that the reports be delivered by other means and using other formats. ICANN will use reasonable commercial efforts to preserve the confidentiality of the information reported until three (3) months after the end of the month to which the reports relate. Unless set forth in this Specification 3, any reference to a specific time refers to Coordinated Universal Time (UTC). Monthly reports shall consist of data that reflects the state of the registry at the end of the month (UTC).

Time is Money Join Law Insider Premium to draft better contracts faster.