Access Logs Sample Clauses

The Access Logs clause requires parties to maintain records of who accesses certain systems, data, or facilities. Typically, this involves keeping detailed logs that record the identity, time, and nature of each access event, and may specify how long these records must be retained or who can review them. This clause helps ensure accountability and traceability, making it easier to investigate security incidents or unauthorized access.
POPULAR SAMPLE Copied 3 times
Access Logs. Participant will maintain records of Participant’s and Participant Users’ access to and use of the HIE in accordance with its usual practices and CRISP will maintain records of it or members of its Work Force’s access to and use of the HIE in accordance with its usual practices, provided that in both cases, the usual practices must conform to Applicable Law and with recognized health care industry standards for electronic medical records systems, including maintaining records such as access logs for a reasonable time. Each party will, upon request, provide the other with information from its access logs if reasonably required for the requesting party to comply with Applicable Law. In addition, Participant will not unreasonably refuse to provide CRISP with a copy of information from its access logs if CRISP demonstrates a specific need for such information relating to the operation of the HIE and CRISP will provide Participant with information from its access logs in accordance with the requirements of the Business Associate Agreement attached as Exhibit C. Information from access logs provided pursuant to this Agreement shall be treated as Confidential Information by the recipient subject to the provisions of Section 16 of these Terms and Conditions unless, as to CRISP, the information is subject to the restrictions and protections of the Business Associate Agreement forming a part of this Agreement as Exhibit C, in which case the Business Associate Agreement will govern.
Access Logs. The PARTIES undertake to access the database integrated in the ATOSS PRODUCTS and the personal data processed therein exclusively by using separate user IDs. This requires that the CUSTOMER allocates corresponding separate user IDs for ATOSS and cooperates in setting them up to the extent required. ATOSS shall make these user IDs accessible exclu- sively to the personnel required for the performance of the services and shall secure them against unauthorised inspection and use by taking suitable and appropriate measures.
Access Logs. Data Recipients will maintain records of access to and use of the HIE System in accordance with usual practices. CORHIO will maintain records of use of the HIE System in accordance with CORHIO Policies, provided that such Policies conform to Applicable Law and with recognized health care industry standards. Each Party will, upon request, provide the other with information from its access logs if reasonably required for the requesting Party to comply with Applicable Law. In addition, Participant will not unreasonably refuse to provide CORHIO with a copy of information from its access logs if CORHIO demonstrates a specific need for such information relating to the operation of the HIE System. CORHIO will provide Participant with information from its access logs in accordance with the requirements of the applicable Business Associate Agreement and CORHIO Policies. Information from access logs provided pursuant to this Agreement shall be treated as Confidential Information by the recipient subject to the provisions of this Agreement.
Access Logs. Netscape may require Participant to furnish to Netscape access logs for the Services on a quarterly basis. If daily Page Views exceed [*] per day, such logs will be required daily. Access logs will be subject to review or audit by I/Pro at Netscape's request in addition to the audit requirements set forth in the Agreement.

Related to Access Logs

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If WCS chooses to subtend a Verizon access Tandem, WCS’s NPA/NXX must be assigned by WCS to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 WCS shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from WCS’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office WCS utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow WCS’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Access to Project Site ‌ City will make available, no later than the commencement date designated in the current construction Schedule accepted by City, the lands and facilities upon which the Work is to be performed, including such access and other lands and facilities designated in the Contract Documents, for use by Contractor.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.