Facilities and Systems Security. If either party or its personnel will be given access to the other party’s facilities, premises, equipment or systems, such party will comply with all such other party’s written security policies, procedures and requirements made available by each party to the other, and will not tamper with, compromise, or circumvent any security or audit measures employed by such other party. Each party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.
Appears in 9 contracts
Samples: Intellectual Property Agreement (Stratex Networks Inc), Intellectual Property Agreement (Harris Corp /De/), Reverse Transition Services Agreement (Valor Communications Group Inc)
Facilities and Systems Security. If either party Party or its personnel will shall be given access to the other partyParty’s facilities, premises, equipment or systems, such party will Party shall comply with all such other partyParty’s written security policies, procedures and requirements made available by each party Party to the other, and will shall not tamper with, compromise, or circumvent any security or audit measures employed by such other partyParty. Each party Party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party Party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.. [SIGNATURE PAGE FOLLOWS]
Appears in 1 contract
Facilities and Systems Security. If either party Party or its personnel will shall be given access to the other partyParty’s facilities, premises, equipment or systems, such party will Party shall comply with all such other partyParty’s written security policies, procedures and requirements made available by each party Party to the other, and will shall not tamper with, compromise, or circumvent any security or audit measures employed by such other partyParty. Each party Party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party Party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.
Appears in 1 contract
Facilities and Systems Security. If either party or its personnel will be given access to the other party’s facilities, premises, equipment or systems, such party will comply with all such other party’s written security policies, procedures and requirements made available by each party to the other, and will not tamper with, compromise, or circumvent any security or audit measures employed by such other party. Each party shall use its commercially reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.. ****************************************
Appears in 1 contract
Facilities and Systems Security. If either party or its personnel will be given access to the other party’s facilities, premises, equipment or systems, such party will comply with all such other party’s written security policies, procedures and requirements made available by each party to the other, and will not tamper with, compromise, or circumvent any security or audit measures employed by such other party. Each party shall use its reasonable best efforts to ensure that only those of its personnel who are specifically authorized to have access to the facilities, premises, equipment or systems of the other party gain such access, and to prevent unauthorized access, use, destruction, alteration or loss in connection with such access.. [SIGNATURE PAGE FOLLOWS]
Appears in 1 contract