{"component": "clause", "props": {"groups": [{"size": 6, "snippet": "If required for Consultant to perform services under this Agreement, Consultant will have access to certain parts of the computer facilities and programs of the Company and its affiliates. Consultant agrees that such access shall be subject to the following conditions:\n(a) Access to computers of the Company and its affiliates shall be made only in the manner prescribed by a Company representative. Access shall be made using only terminals owned or controlled by the Company and its affiliates and only by Consultant.\n(b) Any user identification code provided by the Company or its affiliates shall be used solely for access to the computers for conduct of the services for the Company or its affiliates and only by Consultant.\n(c) Consultant shall not access software or data on the computer system of the Company and its affiliates other than Consultant\u2019s software or data without the Company\u2019s prior written consent.\n(d) If Consultant should accidentally or inadvertently access any software of the Company and its affiliates or data which Consultant is not authorized to access, then Consultant shall immediately inform the Company and shall deliver to the Company or destroy as the Company may advise any tangible materials (and all copies thereof) resulting from such improper access.\n(e) The Company or its affiliates may copy, use, disclose, distribute, dispose of or destroy anything placed on computer systems of the Company or any of its affiliates by Consultant.", "snippet_links": [{"key": "if-required", "type": "definition", "offset": [0, 11]}, {"key": "for-consultant", "type": "definition", "offset": [12, 26]}, {"key": "services-under-this-agreement", "type": "clause", "offset": [38, 67]}, {"key": "consultant-will", "type": "clause", "offset": [69, 84]}, {"key": "parts-of-the", "type": "clause", "offset": [108, 120]}, {"key": "facilities-and-programs", "type": "definition", "offset": [130, 153]}, {"key": "company-and-its-affiliates", "type": "clause", "offset": [161, 187]}, {"key": "consultant-agrees", "type": "clause", "offset": [189, 206]}, {"key": "subject-to-the-following-conditions", "type": "clause", "offset": [233, 268]}, {"key": "access-to-computers", "type": "clause", "offset": [274, 293]}, {"key": "company-representative", "type": "definition", "offset": [377, 399]}, {"key": "owned-or-controlled", "type": "definition", "offset": [443, 462]}, {"key": "by-the-company", "type": "clause", "offset": [463, 477]}, {"key": "by-consultant", "type": "clause", "offset": [506, 519]}, {"key": "identification-code", "type": "clause", "offset": [534, 553]}, {"key": "access-to-the", "type": "clause", "offset": [621, 634]}, {"key": "for-the-company", "type": "clause", "offset": [673, 688]}, {"key": "consultant-shall", "type": "clause", "offset": [735, 751]}, {"key": "access-software", "type": "clause", "offset": [756, 771]}, {"key": "the-computer-system", "type": "clause", "offset": [783, 802]}, {"key": "prior-written-consent", "type": "clause", "offset": [900, 921]}, {"key": "to-the-company", "type": "clause", "offset": [1157, 1171]}, {"key": "tangible-materials", "type": "clause", "offset": [1213, 1231]}, {"key": "resulting-from", "type": "definition", "offset": [1257, 1271]}, {"key": "dispose-of", "type": "definition", "offset": [1365, 1375]}, {"key": "computer-systems", "type": "clause", "offset": [1406, 1422]}], "samples": [{"hash": "a4HaKHNPuAL", "uri": "/contracts/a4HaKHNPuAL#computer-facilities", "label": "Separation Agreement (Harvest Natural Resources, Inc.)", "score": 21.0, "published": true}, {"hash": "NjzcgZt7Eq", "uri": "/contracts/NjzcgZt7Eq#computer-facilities", "label": "Separation Agreement (Harvest Natural Resources, Inc.)", "score": 21.0, "published": true}, {"hash": "foWPQ0gcHq0", "uri": "/contracts/foWPQ0gcHq0#computer-facilities", "label": "Consulting Agreement (Harvest Natural Resources, Inc.)", "score": 19.0, "published": true}], "hash": "825358202e8e4cb1a160daeaa4f5ad06", "id": 1}, {"size": 6, "snippet": "You will ensure that you have appropriate back-up, security and virus- checking procedures in place for any of your computer facilities. You will check all deliverables with an appropriate up-to-date virus checker prior to delivery.", "snippet_links": [{"key": "security-and", "type": "clause", "offset": [51, 63]}, {"key": "in-place", "type": "definition", "offset": [91, 99]}, {"key": "all-deliverables", "type": "clause", "offset": [152, 168]}, {"key": "an-appropriate", "type": "clause", "offset": [174, 188]}, {"key": "prior-to-delivery", "type": "clause", "offset": [214, 231]}], "samples": [{"hash": "kJsHZcgfUTp", "uri": "/contracts/kJsHZcgfUTp#computer-facilities", "label": "Outsourcing Agreement", "score": 22.9181887083, "published": true}, {"hash": "2hnjhnyquuA", "uri": "/contracts/2hnjhnyquuA#computer-facilities", "label": "Outsourcing Agreements", "score": 19.5786002605, "published": true}, {"hash": "52D5pOw8amP", "uri": "/contracts/52D5pOw8amP#computer-facilities", "label": "Outsourcing Agreements", "score": 19.5211155413, "published": true}], "hash": "baea6f86ba7c3980b6da14359b393695", "id": 2}, {"size": 2, "snippet": "If the Vendor wishes to use: Alberta Government computer hardware and software facilities for a longer period of time; different facilities; or Alberta Government computer hardware and software facilities for a use other than that stated in the Request for Proposals; it must obtain the written approval of the Minister. If approval is denied or if the hardware or software is unavailable for any reason, the Services and Materials shall still be completed on the date stated in clause 5.", "snippet_links": [{"key": "the-vendor", "type": "clause", "offset": [3, 13]}, {"key": "computer-hardware-and-software", "type": "clause", "offset": [48, 78]}, {"key": "period-of-time", "type": "clause", "offset": [103, 117]}, {"key": "request-for-proposals", "type": "definition", "offset": [245, 266]}, {"key": "approval-of", "type": "clause", "offset": [295, 306]}, {"key": "the-minister", "type": "clause", "offset": [307, 319]}, {"key": "for-any-reason", "type": "clause", "offset": [389, 403]}, {"key": "services-and-materials", "type": "clause", "offset": [409, 431]}, {"key": "clause-5", "type": "clause", "offset": [479, 487]}], "samples": [{"hash": "5htjPVQNCnk", "uri": "/contracts/5htjPVQNCnk#computer-facilities", "label": "Fixed Price Systems Development Contract", "score": 33.1758109965, "published": true}, {"hash": "bf9rcmuWP7S", "uri": "/contracts/bf9rcmuWP7S#computer-facilities", "label": "Fixed Price Systems Development Agreement", "score": 32.305328106, "published": true}], "hash": "87a08123eca0b7f175ef8b6c8c6e564d", "id": 3}, {"size": 2, "snippet": "4.1 Within seven (7) days of the date of this Agreement MVV shall pay to the Council the Computer Facilities Sum\n4.2 Before the Operational Date MVV shall consult with the North Yard Community Trust on the format of the Electronic Air Quality Monitoring Data and in finalising the format of the Electronic Air Quality Monitoring Data shall have reasonable regard to the comments of the North Yard Community Trust\n4.3 Subject to paragraph 4.2 with effect from the Operational Date MVV shall publish on the Community Website the Electronic Air Quality Monitoring Data\n4.4 Prior to the Operational Date to submit for approval in writing by the Council a Scheme of Interpretation", "snippet_links": [{"key": "date-of-this-agreement", "type": "definition", "offset": [33, 55]}, {"key": "pay-to", "type": "definition", "offset": [66, 72]}, {"key": "operational-date", "type": "clause", "offset": [128, 144]}, {"key": "north-yard", "type": "definition", "offset": [172, 182]}, {"key": "community-trust", "type": "definition", "offset": [183, 198]}, {"key": "the-electronic", "type": "clause", "offset": [216, 230]}, {"key": "monitoring-data", "type": "definition", "offset": [243, 258]}, {"key": "subject-to", "type": "definition", "offset": [417, 427]}, {"key": "the-community", "type": "clause", "offset": [501, 514]}, {"key": "prior-to-the", "type": "clause", "offset": [570, 582]}, {"key": "approval-in-writing", "type": "definition", "offset": [614, 633]}, {"key": "by-the-council", "type": "clause", "offset": [634, 648]}], "samples": [{"hash": "fBkccdXXzEq", "uri": "/contracts/fBkccdXXzEq#computer-facilities", "label": "Section 106 Agreement", "score": 19.0940861988, "published": true}, {"hash": "4OqOMVwcIbq", "uri": "/contracts/4OqOMVwcIbq#computer-facilities", "label": "Section 106 Agreement", "score": 19.0940861988, "published": true}], "hash": "d92feb16a7e6d8b423cdf6226f00ed56", "id": 4}, {"size": 2, "snippet": "College will make available use of computer facilities at reasonable times and in reasonable time increments to support system development, test, and installation activities. Special facility requirements, such as stress testing or conversion, shall be addressed in the appropriate planning documents or documented by the Contractor in a memorandum. ATTACHMENT V - INSURANCE REQUIREMENTS FOR CONTRACTORS", "snippet_links": [{"key": "make-available", "type": "definition", "offset": [13, 27]}, {"key": "time-increments", "type": "clause", "offset": [93, 108]}, {"key": "system-development", "type": "clause", "offset": [120, 138]}, {"key": "installation-activities", "type": "clause", "offset": [150, 173]}, {"key": "facility-requirements", "type": "clause", "offset": [183, 204]}, {"key": "stress-testing", "type": "definition", "offset": [214, 228]}, {"key": "planning-documents", "type": "clause", "offset": [282, 300]}, {"key": "by-the-contractor", "type": "clause", "offset": [315, 332]}, {"key": "insurance-requirements-for-contractors", "type": "clause", "offset": [365, 403]}], "samples": [{"hash": "gOrx0xeTvPT", "uri": "/contracts/gOrx0xeTvPT#computer-facilities", "label": "Consulting Services Contract", "score": 20.7782340862, "published": true}, {"hash": "6fiVbEqh3G9", "uri": "/contracts/6fiVbEqh3G9#computer-facilities", "label": "Consulting Services Contract", "score": 20.7782340862, "published": true}], "hash": "0a4e0620a443ef81c10b96136c1614be", "id": 5}, {"size": 2, "snippet": "State will make available use of computer facilities at reasonable times and in reasonable time increments to support system development, test, and installation activities. Special facility requirements, such as stress testing or conversion, shall be addressed in the appropriate planning documents or documented by the Contractor in a memorandum.", "snippet_links": [{"key": "make-available", "type": "definition", "offset": [11, 25]}, {"key": "time-increments", "type": "clause", "offset": [91, 106]}, {"key": "system-development", "type": "clause", "offset": [118, 136]}, {"key": "installation-activities", "type": "clause", "offset": [148, 171]}, {"key": "facility-requirements", "type": "clause", "offset": [181, 202]}, {"key": "stress-testing", "type": "definition", "offset": [212, 226]}, {"key": "planning-documents", "type": "clause", "offset": [280, 298]}, {"key": "by-the-contractor", "type": "clause", "offset": [313, 330]}], "samples": [{"hash": "lmKenNLcrM", "uri": "/contracts/lmKenNLcrM#computer-facilities", "label": "Data Processing Consulting Contract", "score": 28.5725744278, "published": true}, {"hash": "2bhqw6jQHQ6", "uri": "/contracts/2bhqw6jQHQ6#computer-facilities", "label": "Contract", "score": 22.8795345654, "published": true}], "hash": "5b1798afb2f7f6a93444365d2b3f819d", "id": 6}, {"size": 2, "snippet": "If required for Consultant to perform the services, Consultant will have access to certain parts of Harvest's and its affiliates computer facilities and programs. Consultant agrees that such access shall be subject to the following conditions:\n(a) Access to Harvest's or its affiliate's computers shall be made only in the manner prescribed by a Harvest representative. Access shall be made using only terminals owned or controlled by Harvest and its affiliates and only by Consultant.\n(b) Any user identification code provided by Harvest or its affiliates shall be used solely for access to the computers for conduct of the services for Harvest or its affiliates and only by Consultant.\n(c) Consultant shall not access software or data on Harvest's or its affiliate's computer system other than Consultant's software or data without Harvest's prior written consent.\n(d) In the event that Consultant should accidentally or inadvertently access any Harvest or Harvest affiliate software or data which Consultant is not authorized to access, then Consultant shall immediately inform Harvest and shall deliver to Harvest or destroy as Harvest may advise any tangible materials (and all copies thereof) resulting from such improper access.\n(e) Harvest or its affiliates may copy, use, disclose, distribute, dispose of or destroy anything placed on Harvest's or its affiliates computer systems by Consultant.", "snippet_links": [{"key": "if-required", "type": "definition", "offset": [0, 11]}, {"key": "for-consultant", "type": "definition", "offset": [12, 26]}, {"key": "consultant-will", "type": "clause", "offset": [52, 67]}, {"key": "facilities-and-programs", "type": "definition", "offset": [138, 161]}, {"key": "consultant-agrees", "type": "clause", "offset": [163, 180]}, {"key": "subject-to-the-following-conditions", "type": "clause", "offset": [207, 242]}, {"key": "owned-or-controlled", "type": "definition", "offset": [412, 431]}, {"key": "by-consultant", "type": "clause", "offset": [471, 484]}, {"key": "identification-code", "type": "clause", "offset": [499, 518]}, {"key": "access-to-the", "type": "clause", "offset": [582, 595]}, {"key": "services-for", "type": "clause", "offset": [625, 637]}, {"key": "consultant-shall", "type": "clause", "offset": [692, 708]}, {"key": "access-software", "type": "clause", "offset": [713, 728]}, {"key": "prior-written-consent", "type": "clause", "offset": [844, 865]}, {"key": "in-the-event", "type": "clause", "offset": [871, 883]}, {"key": "deliver-to", "type": "definition", "offset": [1099, 1109]}, {"key": "tangible-materials", "type": "clause", "offset": [1155, 1173]}, {"key": "resulting-from", "type": "definition", "offset": [1199, 1213]}, {"key": "dispose-of", "type": "definition", "offset": [1303, 1313]}, {"key": "computer-systems", "type": "clause", "offset": [1372, 1388]}], "samples": [{"hash": "naxt64tIdD", "uri": "/contracts/naxt64tIdD#computer-facilities", "label": "Separation Agreement (Harvest Natural Resources, Inc.)", "score": 18.0, "published": true}, {"hash": "hEpvoMLNRZf", "uri": "/contracts/hEpvoMLNRZf#computer-facilities", "label": "Consulting Agreement (Harvest Natural Resources, Inc.)", "score": 16.0, "published": true}], "hash": "48911095d7c491070122c0d9827ce1cf", "id": 7}, {"size": 1, "snippet": "As the Contractor will be required to use his/her own computer system the following requirements must be met: Council\u2019s accounts must be kept up to date and updated on a daily basis. The Council must be able to fully access any account through a remote link for enquiry purposes; Provision of all communication links and interfaces will be the responsibility of the Contractor and must conform to all reasonable requirements of the Council' s Information Systems; The housing of the Contractor's computer equipment must provide full security and back up in the event of a disaster, and will be subject to the approval of the Council' s Head of Information Technology; The systems and procedures used must provide for secure operation and the use of passwords as appropriate and the Contractor will be responsible for ensuring compliance with the Data Protection Act; The printing of notices, standard letters and correspondence is the responsibility of the Contractor. All documentation to be used for communications with the public must be approved by the Council prior to use. The Contractor must be able to securely accept instructions and issue reports (both case reports and statistical reports) by email, electronic transfer, magnetic medium, or paper record, in a format to be identified by the Council. Where either party are sending personal or confidential data via electronic transfer, then such transfer will be encrypted and password protected to ensure that confidential or personal data is handled securely. The Contractor shall ensure that access to the collections systems and server are restricted to authorised personnel only.", "snippet_links": [{"key": "the-contractor-will", "type": "clause", "offset": [3, 22]}, {"key": "computer-system", "type": "clause", "offset": [54, 69]}, {"key": "up-to-date", "type": "definition", "offset": [142, 152]}, {"key": "daily-basis", "type": "definition", "offset": [170, 181]}, {"key": "link-for", "type": "definition", "offset": [253, 261]}, {"key": "provision-of", "type": "clause", "offset": [280, 292]}, {"key": "communication-links", "type": "clause", "offset": [297, 316]}, {"key": "responsibility-of-the-contractor", "type": "clause", "offset": [344, 376]}, {"key": "requirements-of-the", "type": "clause", "offset": [412, 431]}, {"key": "information-systems", "type": "definition", "offset": [443, 462]}, {"key": "computer-equipment", "type": "definition", "offset": [496, 514]}, {"key": "security-and", "type": "clause", "offset": [533, 545]}, {"key": "in-the-event-of-a", "type": "clause", "offset": [554, 571]}, {"key": "approval-of-the-council", "type": "definition", "offset": [609, 632]}, {"key": "information-technology", "type": "clause", "offset": [644, 666]}, {"key": "systems-and-procedures", "type": "clause", "offset": [672, 694]}, {"key": "provide-for", "type": "clause", "offset": [705, 716]}, {"key": "use-of-passwords", "type": "clause", "offset": [742, 758]}, {"key": "and-the-contractor", "type": "clause", "offset": [774, 792]}, {"key": "responsible-for", "type": "clause", "offset": [801, 816]}, {"key": "data-protection-act", "type": "clause", "offset": [846, 865]}, {"key": "communications-with-the-public", "type": "clause", "offset": [1002, 1032]}, {"key": "by-the-council", "type": "clause", "offset": [1050, 1064]}, {"key": "prior-to", "type": "definition", "offset": [1065, 1073]}, {"key": "the-contractor-must", "type": "clause", "offset": [1079, 1098]}, {"key": "case-reports", "type": "clause", "offset": [1163, 1175]}, {"key": "statistical-reports", "type": "clause", "offset": [1180, 1199]}, {"key": "by-email", "type": "clause", "offset": [1201, 1209]}, {"key": "electronic-transfer", "type": "definition", "offset": [1211, 1230]}, {"key": "paper-record", "type": "definition", "offset": [1252, 1264]}, {"key": "either-party", "type": "definition", "offset": [1317, 1329]}, {"key": "confidential-data", "type": "definition", "offset": [1354, 1371]}, {"key": "to-ensure", "type": "clause", "offset": [1457, 1466]}, {"key": "personal-data", "type": "clause", "offset": [1488, 1501]}, {"key": "the-contractor-shall", "type": "clause", "offset": [1523, 1543]}, {"key": "access-to-the", "type": "clause", "offset": [1556, 1569]}, {"key": "authorised-personnel", "type": "definition", "offset": [1619, 1639]}], "samples": [{"hash": "1I49VBnXMSi", "uri": "/contracts/1I49VBnXMSi#computer-facilities", "label": "Debt Recovery Services Agreement", "score": 21.8501026694, "published": true}], "hash": "cc050ca0ae636b70b9ea2962d53c3239", "id": 8}, {"size": 1, "snippet": "1. The Parties recognise that each Party may have its own regulatory requirements relating to the use of computer facilities, including requirements that seek to ensure the security and confidentiality of communications.\n2. A Party may not require a person of the other Party to use or locate computer facilities in the territory of that Party as a condition of doing business in that territory.\n3. Nothing in this Article shall prevent a Party from adopting or maintaining measures inconsistent with paragraph 2 to pursue a legitimate public policy objective, provided that the measure is not applied in a manner that would constitute a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade.\n4. The Parties undertake to exchange best practices, experiences and existing regulatory frameworks with respect to IT facilities.", "snippet_links": [{"key": "the-parties", "type": "definition", "offset": [3, 14]}, {"key": "each-party", "type": "clause", "offset": [30, 40]}, {"key": "regulatory-requirements", "type": "definition", "offset": [58, 81]}, {"key": "relating-to", "type": "definition", "offset": [82, 93]}, {"key": "to-ensure", "type": "clause", "offset": [159, 168]}, {"key": "confidentiality-of-communications", "type": "clause", "offset": [186, 219]}, {"key": "a-party-may", "type": "clause", "offset": [224, 235]}, {"key": "a-person", "type": "clause", "offset": [248, 256]}, {"key": "other-party", "type": "definition", "offset": [264, 275]}, {"key": "in-the-territory", "type": "clause", "offset": [313, 329]}, {"key": "condition-of", "type": "clause", "offset": [349, 361]}, {"key": "doing-business", "type": "definition", "offset": [362, 376]}, {"key": "nothing-in-this-article", "type": "clause", "offset": [399, 422]}, {"key": "paragraph-2", "type": "clause", "offset": [501, 512]}, {"key": "policy-objective", "type": "clause", "offset": [543, 559]}, {"key": "provided-that", "type": "clause", "offset": [561, 574]}, {"key": "restriction-on", "type": "clause", "offset": [704, 718]}, {"key": "to-exchange", "type": "clause", "offset": [751, 762]}, {"key": "best-practices", "type": "clause", "offset": [763, 777]}, {"key": "with-respect-to", "type": "clause", "offset": [826, 841]}, {"key": "it-facilities", "type": "clause", "offset": [842, 855]}], "samples": [{"hash": "bRAkzioInmi", "uri": "/contracts/bRAkzioInmi#computer-facilities", "label": "Economic Complementation Agreement", "score": 27.4900752909, "published": true}], "hash": "70ecc798620bf2aa24fe2f6546a01b2f", "id": 9}, {"size": 1, "snippet": "Allow TFA staff to make reasonable use of a limited number of existing computer facilities with Internet access and printer capabilities throughout the Pre-Service Training. When utilizing District property and networks, TFA staff shall comply with the District's Acceptable Use Policy.", "snippet_links": [{"key": "reasonable-use", "type": "clause", "offset": [24, 38]}, {"key": "a-limited", "type": "clause", "offset": [42, 51]}, {"key": "number-of", "type": "clause", "offset": [52, 61]}, {"key": "internet-access", "type": "definition", "offset": [96, 111]}, {"key": "the-pre", "type": "clause", "offset": [148, 155]}, {"key": "service-training", "type": "clause", "offset": [156, 172]}, {"key": "district-property", "type": "definition", "offset": [189, 206]}, {"key": "the-district", "type": "clause", "offset": [249, 261]}, {"key": "acceptable-use-policy", "type": "definition", "offset": [264, 285]}], "samples": [{"hash": "9yv0MndhJto", "uri": "/contracts/9yv0MndhJto#computer-facilities", "label": "Memorandum of Agreement", "score": 32.9537324478, "published": true}], "hash": "52bc66f67866d701adeb7dd98ac7573a", "id": 10}], "next_curs": "ClwSVmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjgLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2Ihxjb21wdXRlci1mYWNpbGl0aWVzIzAwMDAwMDBhDKIBAmVuGAAgAA==", "clause": {"size": 30, "title": "Computer Facilities", "children": [], "parents": [["general-provisions", "General Provisions"], ["further-supplier-responsibilities", "Further Supplier Responsibilities"], ["resources", "Resources"], ["survival", "Survival"], ["certain-further-supplier-responsibilities", "Certain Further Supplier Responsibilities"]], "id": "computer-facilities", "related": [["teacher-facilities", "TEACHER FACILITIES", "TEACHER FACILITIES"], ["interconnection-facilities", "Interconnection Facilities", "Interconnection Facilities"], ["other-facilities", "Other Facilities", "Other Facilities"], ["interconnection-customers-interconnection-facilities", "Interconnection Customer\u2019s Interconnection Facilities", "Interconnection Customer\u2019s Interconnection Facilities"], ["services-and-facilities", "Services and Facilities", "Services and Facilities"]], "related_snippets": [], "updated": "2025-07-07T12:37:40+00:00", "also_ask": ["What minimum security and access controls should be mandated for computer facilities?", "How can liability for data breaches or system failures be allocated or limited?", "What are the key differences in treatment of computer facilities clauses across jurisdictions?", "Which terms are most commonly challenged or found unenforceable in court?", "How can the clause be leveraged to ensure ongoing compliance with evolving technology standards?"], "drafting_tip": "Specify permitted uses, restrict unauthorized access, and outline security obligations to protect data integrity and limit liability.", "explanation": "The Computer Facilities clause defines the terms under which one party provides access to its computer systems, hardware, or software to another party. Typically, this clause outlines the scope of permitted use, security requirements, and any restrictions on accessing or modifying the systems. For example, it may specify that the facilities are only to be used for project-related work and prohibit unauthorized data transfers. Its core function is to ensure that the use of computer resources is controlled and secure, thereby protecting the provider from misuse or security breaches."}, "json": true, "cursor": ""}}