Common use of IT Security Clause in Contracts

IT Security. (a) Service Recipient shall cause all of its personnel, employees, officers, contractors, consultants or other agents (collectively, the “Recipient Personnel”) having access to the Provider Systems to comply with all documented security guidelines applicable to Service Provider’s and its Subsidiaries’ personnel, employees, officers, contractors, consultants or other agents generally (including physical security, network access, data security and privacy guidelines and similar policies) of Service Provider and shall not knowingly tamper with, compromise or circumvent any security or audit measures employed by Service Provider. Service Recipient shall ensure that such access shall be made by such Recipient Personnel only as required in connection with, or as specifically contemplated by, the performance, delivery or receipt of a Service hereunder.

Appears in 2 contracts

Samples: Separation Agreement (Essendant Inc), Transition Services Agreement (Essendant Inc)

AutoNDA by SimpleDocs

IT Security. (a) Service Recipient shall cause all of its personnel, employees, officers, contractors, consultants or other agents (collectively, the “Recipient Personnel”) having access to the Provider Systems to comply with all documented security guidelines applicable to Service Provider’s and its Subsidiaries’ personnel, employees, officers, contractors, consultants or other agents generally (including physical security, network access, data security and privacy guidelines and similar policies) of Service Provider and shall not knowingly tamper with, compromise or circumvent any security or audit measures employed by Service Provider. Service Recipient shall ensure that such access shall be made by such Recipient Personnel only as required in connection with, or as specifically contemplated by, by the performance, delivery or receipt of a Service hereunder.

Appears in 2 contracts

Samples: Separation Agreement (Essendant Inc), Supply Chain Transition Services Agreement (Essendant Inc)

IT Security. (a) 3. Service Recipient shall cause all of its personnel, employees, officers, contractors, consultants or other agents (collectively, the “Recipient Personnel”) having access to the Provider Systems to comply with all documented security guidelines applicable to Service Provider’s and its Subsidiaries’ personnel, employees, officers, contractors, consultants or other agents generally (including physical security, network access, data security and privacy guidelines and similar policies) of Service Provider and shall not knowingly tamper with, compromise or circumvent any security or audit measures employed by Service Provider. Service Recipient shall ensure that such access shall be made by such Recipient Personnel only as required in connection with, or as specifically contemplated by, the performance, delivery or receipt of a Service hereunder.

Appears in 1 contract

Samples: Separation Agreement (Genuine Parts Co)

AutoNDA by SimpleDocs

IT Security. (a) 3. Service Recipient shall cause all of its personnel, employees, officers, contractors, consultants or other agents (collectively, the “Recipient Personnel”) having access to the Provider Systems to comply with all documented security guidelines applicable to Service Provider’s and its Subsidiaries’ personnel, employees, officers, contractors, consultants or other agents generally (including physical security, network access, data security and privacy guidelines and similar policies) of Service Provider and shall not knowingly tamper with, compromise or circumvent any security or audit measures employed by Service Provider. Service Recipient shall ensure that such access shall be made by such Recipient Personnel only as required in connection with, or as specifically contemplated by, by the performance, delivery or receipt of a Service hereunder.

Appears in 1 contract

Samples: Separation Agreement (Genuine Parts Co)

Time is Money Join Law Insider Premium to draft better contracts faster.