Security and Access Sample Clauses

Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.
AutoNDA by SimpleDocs
Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including, without limitation, those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, and passwords ("Facilities Information Technology and Access Resources"); (b) not to access or use any Facilities Information Technology and Access Resources except as authorized by the Company; and (iii) not to access or use any Facilities Information Technology and Access Resources in any manner after the termination of the Executive's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities Information Technology and Access Resources or other Company property or materials by others.
Security and Access. The Mandatary shall request and familiarise its employees with the Client security rules which is not included in this agreement.
Security and Access. The Executive agrees and covenants to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone and voicemail systems, facilities access, key cards, access codes, intranet and internet, social media, computer systems and networks, e-mail systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”), and not to access or use any Facilities and Information Technology Resources except as authorized by the Company. The Executive also agrees not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether such termination is voluntary or involuntary, without the Company’s consent.
Security and Access. 15.1 The Mandatary and his employees shall enter and leave the premises only through the main gate(s) and/or checkpoint(s) designated by the Employer. The Mandatary shall ensure that employees observe the security rules of the Employer at all times and shall not permit any person who is not directly associated with the work from entering the premises.
Security and Access. 14.1. Employees and agents of Cincinnati Bell and its subsidiaries, while on the premises of Customer, will comply with all reasonable rules, regulations and security requirements of Customer.
Security and Access. The Employee agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time, including without limitation, those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities Information Technology and Access Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Employee’s employment by the Company, whether termination is voluntary or involuntary. The Employee agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Access Resources or other Company property or materials by others.
AutoNDA by SimpleDocs
Security and Access. The Executive acknowledges that he has no reasonable expectation of privacy in any computer, technology system, email, handheld device, telephone, or documents that are used to conduct the business of the Company whether such device is personally owned or provided by the Company. As such, the Company has the right to audit and search all such items and systems, without further notice to Executive, to ensure that the Company is licensed to use the software on the Company’s devices in compliance with the Company’s software licensing policies, to ensure compliance with the Company’s policies, and for any other business-related purposes in the Company’s sole discretion. Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.
Security and Access. Employee agrees and covenants (i) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (ii) not to access or use any Facilities and Information Technology Resources except as authorized by Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Employee’s employment by the Company, whether termination is voluntary or involuntary. Employee agrees to notify the Company promptly in the event Employee learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others. Employee acknowledges and agrees that any property situated on the Company’s premises and owned by the Company, including disks and other storage media, filing cabinets, other work areas and other Facilities and Information Technology Resources, is subject to inspection by personnel of the Company at any time with or without notice. Employee acknowledges and agrees that Employee has no expectation of privacy with respect to the Company’s Facilities and Information Technology Resources and that Employee’s activity and any files or messages on or using any of such Facilities and Information Technology Resources may be monitored at any time without notice.
Time is Money Join Law Insider Premium to draft better contracts faster.