Common use of ACCESS TO SECURITY LOGS AND REPORTS Clause in Contracts

ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

Appears in 95 contracts

Sources: Contract for the Acquisition of Information Technology Commodities and/or Services, Contract for the Acquisition of Information Technology Commodities and/or Services, Contract for the Acquisition of Information Technology Commodities and/or Services

ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User Agreement.

Appears in 55 contracts

Sources: Contract for the Acquisition of Information Technology Commodities and/or Services, Contract for the Acquisition of Information Technology Commodities and/or Services, Contract for the Acquisition of Information Technology Commodities and/or Services

ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User AgreementAgreement or Purchase Order.

Appears in 3 contracts

Sources: Contract for the Acquisition of Electronic Poll Book Systems, Contract for the Acquisition of Electronic Poll Book Systems, Contract for the Acquisition of Electronic Poll Book Systems

ACCESS TO SECURITY LOGS AND REPORTS. Upon request, the Contractor shall provide access to security logs and reports to the State or Authorized User in a format as specified in the Authorized User AgreementPurchase Order.

Appears in 1 contract

Sources: Centralized Contract for the Acquisition of Voting Systems and Related Services and Accessories