Common use of Facilities and Systems Security Clause in Contracts

Facilities and Systems Security. If either party or its personnel will be given access to the other party’s facilities, premises, equipment or systems, such party will comply with all such other party’s written security policies, procedures and requirements made available by each party to the other, and will not tamper with, compromise, or circumvent any security or audit measures employed by such other party. Each party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.

Appears in 9 contracts

Samples: Intellectual Property Agreement (Stratex Networks Inc), Intellectual Property Agreement (Harris Corp /De/), Reverse Transition Services Agreement (Valor Communications Group Inc)

AutoNDA by SimpleDocs

Facilities and Systems Security. If either party Party or its personnel will shall be given access to the other partyParty’s facilities, premises, equipment or systems, such party will Party shall comply with all such other partyParty’s written security policies, procedures and requirements made available by each party Party to the other, and will shall not tamper with, compromise, or circumvent any security or audit measures employed by such other partyParty. Each party Party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party Party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.. [SIGNATURE PAGE FOLLOWS]

Appears in 1 contract

Samples: Operating Agreement (Applied Biosystems Inc.)

Facilities and Systems Security. If either party Party or its personnel will shall be given access to the other partyParty’s facilities, premises, equipment or systems, such party will Party shall comply with all such other partyParty’s written security policies, procedures and requirements made available by each party Party to the other, and will shall not tamper with, compromise, or circumvent any security or audit measures employed by such other partyParty. Each party Party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party Party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.

Appears in 1 contract

Samples: Transition Services Agreement (Celera CORP)

Facilities and Systems Security. If either party or its personnel will be given access to the other party’s facilities, premises, equipment or systems, such party will comply with all such other party’s written security policies, procedures and requirements made available by each party to the other, and will not tamper with, compromise, or circumvent any security or audit measures employed by such other party. Each party shall use its commercially reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.. ****************************************

Appears in 1 contract

Samples: Asset Sale Agreement (Nant Health, LLC)

AutoNDA by SimpleDocs

Facilities and Systems Security. If either party or its personnel will be given access to the other party’s facilities, premises, equipment or systems, such party will comply with all such other party’s written security policies, procedures and requirements made available by each party to the other, and will not tamper with, compromise, or circumvent any security or audit measures employed by such other party. Each party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.. [SIGNATURE PAGE FOLLOWS]

Appears in 1 contract

Samples: Reverse Transition Services Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.