Security Logs Sample Clauses

Security Logs. All Braze systems used in the provision of the Braze Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized syslog server (for network systems) in order to enable security reviews and analysis. Braze has automated alerts and searches on these logs.
AutoNDA by SimpleDocs
Security Logs. FF shall ensure that all FF or Sub-processor systems used to store Customer Data, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralised syslog server (for network systems).
Security Logs. As it relates to the Cloud Services, the CSP and CSP Contractors shall provide security logs and reports to the Governmental Entity or its Authorized Contractors in a mutually agreeable format upon request. Such reports shall include at least latency statistics, user access summaries, user access IP address summaries, user access history and security logs for all Customer Data.
Security Logs. All PassKit systems used in the provision of the PassKit Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized logging service (for cloud systems) in order to enable security reviews and analysis. PassKit has automated alerts and searches on these logs.
Security Logs. Systems used in the provision of the Polygon services log information to the system log facilities or a centralized logging service (for network systems) in order to enable security reviews and analysis. Polygon maintains an extensive centralized logging environment in the production environment which contains information pertaining to security, monitoring, availability, access and other metrics about the Polygon services.
Security Logs. All xxxxxxxxxx.xxx systems used in the provision of the ET Services, including firewalls, routers, network switches and operating systems, log information to their re- spective system log facility or a centralized syslog server (for network systems) in order to enable security audits. PhysicalSecurity Production data centers used to provide the ET Services have access control systems. These systems permit only authorized personnel to have access to secure are- as. These facilities are designed to withstand adverse weather and other reasonably predictable natural conditions, are secured by around-the-clock guards, two-factor card key and biometric access screening and escort-controlled access, and are also supported by on-site back-up generators in the event of a power failure.
Security Logs. Third Party shall employ procedures that all systems, including firewalls, routers, network switches and operating systems, log information to their respective system log facility or a centralized logging system in order to enable the security audits referred to below. Additionally, Third Party shall employ the following procedures:
AutoNDA by SimpleDocs
Security Logs. All Insider systems used in the provision of the Insider Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility in order to enable security reviews and analysis.
Security Logs. Logs are generated for security-relevant activities on operating systems. Systems are configured to log default security activities, access to information or programs, system events such as alerts, console messages, and system errors. Oracle reviews logs for forensic purposes and incidents; identified anomalous activities feed into the incident management process. Security logs are stored within the Security Information and Event Management system (or equivalent system) in a native, unaltered format and retained in accordance with Oracle's internal policies. Such logs are retained online for a minimum of 1 year, or as otherwise required by an applicable regulatory framework. These logs are retained and used by Oracle for our internal security operations for Cloud Services.
Security Logs. All Loopy Loyalty systems used in the provision of the Loopy Loyalty Services, including firewalls, routers, network switches, and operating systems log information to their respective system log facility or a centralized logging service (for cloud systems) in order to enable security reviews and analysis. Loopy Loyalty has automated alerts and searches on these logs.
Time is Money Join Law Insider Premium to draft better contracts faster.