Common use of Access to Systems Clause in Contracts

Access to Systems. If any Party has been provided access (either on-site or remotely) to any other Party’s electronic information systems and records in connection with the Services, such Party shall limit such access solely to the use of such systems and records for purposes of the provision or receipt of the Services and shall not access, or attempt to access, the other Parties’ electronic information systems or records other than as may be agreed to by such Parties to the extent required for the provision or receipt of Services or those that are publicly available (e.g., public websites). Each Party shall limit such access to those of its employees, agents and representatives that have a bona fide need for such access in connection with the Services. Each Party shall follow, and shall cause all of its applicable employees, agents and representatives to follow, all of the other Parties’ security rules and procedures when accessing such Parties’ systems. All user identification numbers and passwords disclosed by a Party to any other Party and any information obtained by a Party as a result of such Party’s access to and use of any other Party’s computer systems shall be deemed to be, and treated as, Confidential Information of such other Party. Each Party shall cooperate in the investigation of any apparent unauthorized access to any electronic information system or records of any Party.

Appears in 3 contracts

Samples: Operational Services Agreement (Hess Midstream Partners LP), Operational Services Agreement (Hess Midstream Partners LP), Operational Services Agreement (Hess Midstream Partners LP)

AutoNDA by SimpleDocs

Access to Systems. If any Party has been provided access (either on-site or remotely) to any other Party’s electronic computer systems and/or information systems and records stores in connection with the Services, such Party shall limit such access solely to the use of such systems and records for purposes of the provision or receipt of the Services and shall not access, or attempt to access, the other Parties’ electronic information systems Party’s computer systems, files, or records software other than as may be those agreed to by such the Parties to the extent as being required for the provision or receipt of Services Services, or those that are publicly available (e.g., public websites). Each Party shall limit such access to those of its employees, agents agents, and representatives that have with a bona fide need for to have such access in connection with the Services. Each Party shall follow, and shall cause all of its applicable employees, agents agents, and representatives to follow, all of the other Parties’ security rules and procedures when accessing such the other Parties’ systems. All user identification numbers and passwords disclosed by a any Party to any other another Party and any information obtained by a any Party as a result of such Party’s access to and use of any other Party’s computer systems shall be deemed to be, and treated as, Confidential Information of such the other Party. Each Party The Chesapeake Entities and the Company Group shall cooperate in the investigation of any apparent unauthorized access to any electronic computer system and/or information system or records stores of any Party.

Appears in 2 contracts

Samples: Indemnity Agreement (Chesapeake Midstream Partners, L.P.), Services Agreement (Chesapeake Midstream Partners, L.P.)

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.