Common use of Access to Service Provider Systems Clause in Contracts

Access to Service Provider Systems. Customer will, and will require that all Recipient Personnel who have access to Service Provider Systems, including computer or electronic data storage systems, limit their access to those portions of such systems for which they are authorized in connection with their receipt and use of the Services. Customer will (i) limit such access to those Recipient Personnel who are authorized to use the Services, (ii) maintain and make available to Service Provider a written list of the names of each individual who will be granted such access, and (iii) adhere to Service Provider’s security rules and procedures for use of Service Provider Systems. All user identification numbers and passwords disclosed to Recipients to permit any Recipient Personnel to access the Service Provider Systems will be deemed to be, and will be treated as, Service Provider’s Confidential Information. Customer will cooperate with Service Provider in the investigation of any apparent unauthorized access by Recipient Personnel to Service Provider Systems.

Appears in 1 contract

Samples: Transition Services Agreement (Folgers Coffee CO)

AutoNDA by SimpleDocs

Access to Service Provider Systems. Customer will, and will require that all Recipient Personnel who have access to Service Provider SystemsSystems in accordance with the provisions of Section 11.3, including computer or electronic data storage systems, limit their access to those portions of such systems for which they are authorized in connection with their receipt and use of the Services. Customer will (i) limit such access to those Recipient Personnel who are authorized to use the ServicesServices in accordance with the provisions of Section 11.3, (ii) maintain and make available to Service Provider a written list of the names of each individual who will be granted such access, and (iii) adhere to Service Provider’s security rules and procedures for use of Service Provider Systems. All user identification numbers and passwords disclosed to Recipients to permit any Recipient Personnel to access the Service Provider Systems will be deemed to be, and will be treated as, Service Provider’s Confidential Information. Customer will cooperate with Service Provider in the investigation of any apparent unauthorized access by Recipient Personnel to Service Provider Systems. Service Provider shall, in its sole discretion, be entitled to approve or restrict access to Service Provider Systems by any Customer contractor.

Appears in 1 contract

Samples: Transition Services Agreement (Smucker J M Co)

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.