Log Files Sample Clauses
POPULAR SAMPLE Copied 1 times
Log Files. As is true of most websites, we gather certain information automatically and store it in log files. This information includes IP addresses, browser type, (ISP, referring/exit pages, operating system, date/time stamp, and clickstream data. We use this information to analyze trends, to administer the Website, to track users' movements around the Website and to improve our Website usability.
Log Files. Upon written request by Primus, Distributor shall transmit to Primus a current, complete and correct copy of the log file for each server on which the Software is installed; provided, however, that unless review of a log file has indicated additional fees are due to Primus, Primus may not request a copy of any one log file more frequently than once a year.
Log Files. Upon written request by Primus, Distributor shall, to the extent provided by the Software License Agreement, and except as restricted by applicable local law, transmit to Primus a current, complete and correct copy of the log file for each server of Distributor, its sub-distributors and of Authorized End-Users on which the Software is installed; provided, however, that unless review of a log file has indicated additional fees are due to Primus, Primus (i) may not request a copy of the log file more frequently than once a quarter, and (ii) shall pay Distributor's reasonable expenses incurred with respect to such transmission.
Log Files. As is true of most websites, we gather certain information automatically and store it in log files. This information includes internet protocol (IP) addresses, browser type, internet service provider (ISP), referring/exit pages, operating system, date/time stamp, and clickstream data. We use this information, which does not identify individual users, to analyze trends, to administer the Website, to track users' movements around the Website and to improve our Website usability. We do not link this automatically-collected data to personally identifiable information, other than your IP address should it be determined to be personally identifiable information as required by law.
Log Files. Our log tracking collects visitors’ IP addresses to analyze trends, administer our website, track visitor movement, and gather broad demographic information to help determine the type of information visitors are interested in seeing on our website. This tracking only collects IP addresses and not personally identifiable information. Visitors are not personally identifiable within our log files. Cobalt Ridge only uses this information for internal purposes and does not share this information with non-affiliated companies or institutions.
Log Files. 8.7.1. We collect statistical information about you from page hits. Every page, image or cgi program requested by your browser from our servers is logged in a log file, which also collects the following information: your remote IP address, the referring HTML page and the type of browser and computer that you are using. We use IP addresses to analyse trends, administer our site, track your movements, and gather broad demographic information for aggregate use. The statistical information we gather is used internally for marketing analysis. This information and IP addresses are not linked to personally identifiable information.
Log Files. As is true of most Networks, we gather certain information automatically and store it in log files. This information includes Internet Protocol (IP) addresses, browser type, Internet Service Provider (ISP), referring/exit pages, operating system, date/time stamp, and movements around the Network, and to gather demographic information about our user base as a whole. We do not link this automatically collected data to personally identifiable information.
Log Files. 15.1. BiP uses IP addresses to analyse trends, administer the System, track Users’ movement and activity, and gather broad demographic information for aggregate use.
15.2. For the purposes of systems administration, detecting usage patterns, troubleshooting and support of audits, our web servers automatically log standard access information and certain User activities.
Log Files. 15.1. BiP uses IP addresses to analyse trends, administer the Service, track Users’ movement and activity, and gather broad demographic information for aggregate use.
15.2. For the purposes of systems administration, detecting usage patterns, troubleshooting and support of audits, our web servers automatically log standard access information and certain User activities. Activity log information may be shared within the originating organisation. A Suppliers’ activity log may also be shared for audit purposes with a Buyer’s organisation where the Supplier’s activity is related to a Procurement Exercise. BiP does not share this information with any third parties outside the originating organisation or outside the relevant Buyer organisation.
Log Files. Log files of access to Acquirer’s Confidential Information must be maintained for up to one year and must contain the date, time, requestor, and the nature of the access (i.e., read-only or modify).