Security Relating to Competitors Sample Clauses

Security Relating to Competitors. (1) If Supplier intends to provide the Services from a Service Location that is shared with or used to provide services to a Customer Competitor, then, prior to providing any of the Services from such Service Location, Supplier shall develop a process, subject to Customer Party’s approval, to restrict access (electronically or physically, as applicable) in any such shared environment to Customer Confidential Information so that Supplier’s personnel providing services to such Customer Competitor do not have access to Customer Confidential Information.
AutoNDA by SimpleDocs
Security Relating to Competitors. If (1) IBM provides the Services to EMW from an IBM Service Location where it also provides similar services to a third party or third parties and (2) any part of the business of IBM or any such third party is now or in the future competitive with EMW's business, then IBM shall develop a process, subject to EMW's review, to restrict access in any such shared environment to EMW's Confidential Information so that IBM's employees or IBM Agents providing services to such competitive business do not have access to EMW's Confidential Information.
Security Relating to Competitors. [*] --------------------------------------
Security Relating to Competitors. In the event that (1) Virtusa intends to provide the Services from a Service Location (a) that Virtusa shares with a third party or third parties (other than Virtusa Agents providing Services under this Agreement) or (b) from which Virtusa provides services to any competitor of Metavante or (2) any part of the business of Virtusa is now or in the future competitive with Metavante’s business, then, prior to providing any of the Services from such a Service Location, Virtusa shall use all reasonable commercial efforts to restrict access in any such shared environment to Metavante’s Confidential Information by taking such actions as are required, including without limitation, enforcing the Data Security Policy, so that Virtusa’s employees or Virtusa Agents providing services to such competitive business are restricted from having access to Metavante’s Confidential Information. PORTIONS OF THIS EXHIBIT WERE OMITTED AND HAVE BEEN FILED SEPARATELY WITH THE SECRETARY OF THE COMMISSION PURSUANT TO AN APPLICATION FOR CONFIDENTIAL TREATMENT UNDER RULE 24B-2 OF THE SECURITIES EXCHANGE ACT; [***] DENOTES OMISSIONS.
Security Relating to Competitors. Services may not be performed by TCS in a shared Resource model, facilities, Hardware or Software environment (“Shared Environment”) except as may be approved in writing by Xxxxxxx pursuant to Section 6.3. If Xxxxxxx approves and TCS provides the Services to Xxxxxxx from a Shared Environment and any part of the business of TCS or any such third party is now or in the future becomes competitive with Xxxxxxx’x business, then TCS shall establish and comply with such security practices as are consistent with the obligations provided in Section 15.3, so that TCS or TCS Agents providing services to such competitive business shall have no access to Xxxxxxx’x Confidential Information.
Security Relating to Competitors. If BETA intends to provide the Services from a Service Location that is shared with (a) a third party or (b) any part of the business of BETA or any of its Affiliates that is competitive with AGE’s businesses, then prior to providing any of the Services from such a Service Location, BETA shall develop physical and logical security measures, subject to AGE’s prior approval, not to be unreasonably withheld or delayed, to restrict access in any such shared Service Location to AGE’s Confidential Information so that BETA’s other customers do not have access to AGE’s Confidential Information.
Security Relating to Competitors. If (1) PSC provides the Services to Xxxxx from a PSC Service Location that is shared with a third party or third parties and (2) any part of the business of PSC or any such third party is now or in the future competitive with Xxxxx’x business, then PSC, at THC’s request, shall develop a process, subject to approval of THC, to restrict access in any such shared environment to THC’s Confidential Information so that the PSC Personnel and PSC Company Contractors engaged in such competitive business shall have no access to THC’s Confidential Information. In the event of the occurrence of the situation described in this Section 12.03, PSC will document such process in the Management Procedures Manual.
AutoNDA by SimpleDocs
Security Relating to Competitors. 18 10.04 Access to Personnel and Resources . . . . . . . . . . . . . . 18
Security Relating to Competitors. If (1) Unisys provides the Services from an Unisys Service Location that is shared with a third party or third parties and (2) any part of the business of Unisys or any such third party is now or in the future identified by UHS as competitive with UHS' or its Affiliates' businesses, then Unisys, at UHS' request, shall develop a process, subject to approval of UHS, to restrict access in any such shared environment to UHS' Confidential Information so that Unisys Agents engaged in such competitive business shall have no access to UHS' Confidential Information.
Security Relating to Competitors. If (a) Supplier intends to provide the Services from a Service Location that is shared with a third party or third parties or (b) any part of the business of Supplier or any such third party is now or in the future competitive with PacifiCare Entities' business, then, prior to providing any of the Services from such a Service Location, Supplier shall develop a process, subject to PacifiCare's prior consent, to restrict access in any such shared environment to PacifiCare's Confidential Information so that Supplier's employees or Supplier Agents providing services to such competitive business do not have access to PacifiCare Confidential Information.
Time is Money Join Law Insider Premium to draft better contracts faster.