Incident Logging Sample Clauses

Incident Logging. The Customer shall ensure the Company is informed by notification to the Company’s nominated service control (as notified to the Customer in writing from time to time) in a reasonable period of time, of any Equipment failure or potential failure, and shall as applicable permit or arrange with the End User for the Company to have the necessary access to the Equipment and use of necessary tools, machines and devices in the Customer’s or End User’s possession. The Customer shall maintain or take reasonable efforts to ensure the End User maintains accurate and current logs and records concerning the operation of the Equipment
Incident Logging. An Incident can be logged by the client by one of the following methods:
Incident Logging. The Customer’s primary IT contact must contact the Correct Solutions technical services team either by telephone, email, web portal or any other form of communication as offered by Correct Solutions from time to time. Any such contact will be a RFS.
Incident Logging. The Customer’s Service Desk will contact MEDILOGIK to log an Incident. Contact is made by ringing the dedicated MEDILOGIK EMS support line +▇▇ ▇▇▇▇ ▇▇▇▇▇▇ or by emailing ▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇.▇▇.▇▇ which will automatically create a support ticket on our Zendesk system. MEDILOGIK will assess and prioritise the Incident in line with the agreed Incident Severity Matrix. MEDILOGIK may amend the severity level after initial investigation and will notify the Customer of any changes in priority. The Customer will provide the Supplier’s Helpdesk with full details of the Incident, including any investigative or remedial actions taken locally prior to referral.
Incident Logging. Any agreed alerts and alarms which are generated from the Clients SIEM solution will be investigated by the Suppliers security team. The Suppliers security team will assess the alarm or alert and decide if it should be logged as an incident for further investigation based on criteria agreed with the Client. Incidents will be logged in the Suppliers CRM system and the Client will be notified of agreed incidents that have been logged via an email generated by the Suppliers CRM system. During the onboarding project the Supplier and Client will agree on if/how incidents will be logged in the Clients CRM system, including how systems may integrate if required. All incidents logged are subject to the response times detailed in the Managed Security Services Schedule.
Incident Logging. The Company shall ensure the Subcontractor is informed by notification to the Subcontractor’s nominated service control (as notified to the Company in writing from time to time), in a reasonable period of time, of Equipment failure or potential failure, and shall as applicable permit or arrange with the End User for the Subcontractor to have necessary access to the Equipment and use of necessary tools, machines and devices in the Company’s or End User’s possession. The Company shall maintain or take reasonable efforts to ensure the End User maintains accurate and current logs and records concerning the operation of the Equipment.
Incident Logging. Customer’s Authorised Support Users may submit Incidents to the Help Desk during normal working hours (09:00 – 17:30 GMT). Incidents are submitted via email to ▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇.▇▇▇. Each Incident will be given a unique Incident log number which will be passed to the Customer. Workvivo undertakes to aid the resolution of Incidents as rapidly as the circumstances allow and based on the terms of this Support Policy. Resolutions may take the form of a repair, bypass or other reasonable solution agreed between Workvivo and the Customer.
Incident Logging 

Related to Incident Logging

  • Logging The ISP will require the maintenance of network and application logs as part of BNY Mellon’s security information and event management processes. Logs are retained in accordance with law applicable to BNY Mellon’s provision of the services as well as BNY Mellon’s applicable policies. BNY Mellon uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Dewatering (a) Where the whole of a site is so affected by surface water following a period of rain that all productive work is suspended by agreement of the Parties, then dewatering shall proceed as above with Employees so engaged being paid at penalty rates as is the case for safety rectification work. This work is typically performed by Employees engaged within CW1, CW2 or CW3 classifications. When other Employees are undertaking productive work in an area or areas not so affected then dewatering will only attract single time rates. (b) Where a part of a site is affected by surface water following a period of rain, thus rendering some areas unsafe for productive work, consistent with the Employer’s obligations under the OH&S Act, appropriate Employees shall assist in the tidying up of their own work site or area if it is so affected. Where required, appropriate Employees will be provided with the appropriate PPE. Such work to be paid at single time rates. Productive work will continue in areas not so affected. (c) To avoid any confusion any ‘dewatering’ time which prevents an Employee from being engaged in their normal productive work is not included in any calculation for the purposes of determining whether an Employee is entitled to go home due to wet weather (refer clauses 32.4 and 32.5)

  • Program Monitoring The Contractor will make all records and documents required under this Agreement as outlined here, in OEC Policies and NHECC Policies available to the SRO or its designee, the SR Fiscal Officer or their designee and the OEC. Scheduled monitoring visits will take place twice a year. The SRO and OEC reserve the right to make unannounced visits.

  • Processing operations The personal data transferred will be subject to the following basic processing activities (please specify):