Common use of Entry control Clause in Contracts

Entry control. Measures to ensure that it can be subsequently reviewed and determined if and from whom Personal Data was entered, altered, or deleted in the IT system: (a) Systems are monitored for security events to ensure quick resolution. (b) Logs are centrally stored and indexed. Critical logs, such as security logs, are retained for at least 2 months. Logs can be traced back to individual unique usernames with timestamps to investigate nonconformities or security events.

Appears in 3 contracts

Sources: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement