Server Logs Sample Clauses

The Server Logs clause defines the requirements and procedures for collecting, storing, and accessing records of server activity. Typically, this clause outlines what types of data must be logged, such as user access times, error messages, or system changes, and may specify retention periods and access controls for these logs. Its core practical function is to ensure accountability, facilitate troubleshooting, and support security monitoring by maintaining a reliable record of server operations.
Server Logs. On the first day of every month, and at any other time as reasonably requested by Customer, Provider at its expense shall deliver to Customer in electronic form the server logs of Website activity (the “Server Logs”).
Server Logs. On a requested basis, MTS shall deliver to Customer in electronic form a copy of the server logs of the Website activity for Administrative and Subscriber Users. The logs will be provided for the three month period preceding the date of the formal request for such logs.
Server Logs. As requested by Customer, Blue Ocean Interactive Marketing Inc will deliver to Customer in electronic form the Server Log of Website activity. Customer will be entitled to one month of log storage free of charge. Blue Ocean Interactive Marketing Inc may, at its option, charge a fee to Customer for additional space required to store oversized logs.
Server Logs. NextTraffic shall also have the right to review the raw data contained in MegaMedia's server logs for an immediately preceding three (3) month period.
Server Logs. On the first day of every month, and at any other time as reasonably requested by Reseller, Zoovy at its expense shall deliver to Reseller in electronic form the server logs of Website activity (the "Server Logs").
Server Logs. Upon PETsMART's request (but no more than monthly), ▇▇▇▇▇▇▇▇.▇▇▇ will deliver to PETsMART in electronic format unprocessed server logs indicating activity in the PETsMART Pages and PETsMART E-Commerce Website.
Server Logs. On the first day of every month, and at any other time as reasonably requested by Customer, Neptune at its expense shall deliver to Customer in electronic form or such other form reasonably requested by Customer server logs containing traffic and security reporting and other Website activity.
Server Logs. On the first day of each month, and at any other time as reasonably requested by the Customer, the Provider at its expense will deliver to the Customer in the electronic form of a Website activity server log (Server Log). (F)
Server Logs. The Parties shall jointly own the server logs from such site and there shall be no restriction on either Party's use of such data, except in connection with deceptive sales practices, misrepresentation, or unfair competition in any manner that would violate any law or regulation or result in a loss of either Party's Customer Goodwill. All restrictions that relate to client protection of other ISO members are totally protected by the non circumvention in this agreement and neither party has the right to use financial or other data pertaining to those members or to attempt in any way to induce an ISO member to change affinity group or ISO affiliation.

Related to Server Logs

  • Server Software Subject to the terms and conditions of this ▇▇▇▇, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Server License We grant you a non-assignable, non-sublicensable, non-exclusive, worldwide right and license to internally use and install the Software on the number of Server(s) listed in the Order Form for Commercial purposes. Unless stated otherwise in the Order Form, for the purposes of this license grant, you may install the Software on one (1) Machine as a substitute for, and not in addition to, one (1) Server. The total count of Server(s) where the Software is installed must not exceed the number of licenses purchased on the applicable Order Form(s).

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/E-Verify.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If WCS chooses to subtend a Verizon access Tandem, WCS’s NPA/NXX must be assigned by WCS to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 WCS shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from WCS’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office WCS utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow WCS’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.