Common use of Infrastructure Logs Clause in Contracts

Infrastructure Logs. Monitoring tools or services, such as host-based intrusion detection tools, are utilized to log certain activities and changes within the Cloud Environment. These logs are further monitored, analyzed for anomalies, and are securely stored to prevent tampering for at least one year.

Appears in 7 contracts

Sources: Private Preview Agreement, Enterprise Master Services Agreement, Security Addendum

Infrastructure Logs. Monitoring tools or services, such as host-based intrusion detection tools, are utilized to log certain activities and changes within the Cloud Environment. These logs are further monitored, analyzed for anomalies, and are securely stored to prevent tampering for at least one year90 days.

Appears in 1 contract

Sources: Slope Security Policy

Infrastructure Logs. Monitoring tools or services, such as host-based intrusion detection tools, are utilized to log certain activities and changes within the Cloud Environment. These logs are further monitored, analyzed for anomalies, and are securely stored to prevent tampering for at least one yeartwo years with the logs collated in the eGain Security Information and Event Management (SIEM) system.

Appears in 1 contract

Sources: Security Policy