Circumstantial information. This is information logged for security auditing purposes such as the IP address from which Users connect or which records were created, accessed or changed. The Provider screens and anal- yses these logs solely for the purpose of securing the deployment and protecting the information therein. The Provider deletes logs after 90 days.
Appears in 3 contracts
Sources: Software Service Agreement, Terms and Conditions for Software Service, Terms and Conditions for Software Service
Circumstantial information. This is information logged for security auditing purposes such as the IP address ad- dress from which Users connect or which records were created, accessed accessed, or changed. The Provider screens and anal- yses analyses these logs solely for the purpose of securing the deployment and protecting the information therein. The Provider deletes logs after 90 days.
Appears in 2 contracts
Sources: Terms and Conditions for Personal Subscriptions, Terms and Conditions for Personal Subscriptions
Circumstantial information. This is information logged for security auditing purposes such as the IP address from which Users connect or which records were created, accessed accessed, or changed. The Provider screens and anal- yses these logs solely for the purpose of securing the deployment and protecting the information therein. The Provider deletes logs after 90 days.
Appears in 2 contracts
Sources: Terms of Use for Trials, Terms of Use
Circumstantial information. This is information logged for security auditing purposes such as the IP address from which Users connect or which records were created, accessed accessed, or changed. The Provider screens and anal- yses analyses these logs solely for the purpose of securing the deployment and protecting the information therein. The Provider deletes logs after 90 days.
Appears in 2 contracts
Sources: Terms and Conditions for Personal Subscriptions, Terms and Conditions
Circumstantial information. This is information logged for security auditing purposes such as the IP address from which Users connect or which records were created, accessed accessed, or changed. The Provider screens and anal- yses analyzes these logs solely for the purpose of securing the deployment and protecting the information therein. The Provider deletes logs after 90 days.
Appears in 1 contract
Sources: Terms and Conditions