Common use of Software and Data Integrity Clause in Contracts

Software and Data Integrity. 6.2.9.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 14 contracts

Sources: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

Software and Data Integrity. 6.2.9.1 9.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 10 contracts

Sources: Interconnection Agreement, Interconnection Agreement, Interconnection Agreement

Software and Data Integrity. 6.2.9.1 8.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 7 contracts

Sources: Cellular/PCS Interconnection Agreement, Cellular/PCS Interconnection Agreement, Cellular/PCS Interconnection Agreement

Software and Data Integrity. 6.2.9.1 11.10.1 Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 3 contracts

Sources: MFN Agreement, Interconnection Agreement, Missouri 271 Agreement

Software and Data Integrity. 6.2.9.1 (1) Each Party shall use a comparable degree of care to protect the other Party’s software and data from unauthorized access, additions, changes and deletions as it uses to protect its own similar software and data. This may be accomplished by physical security at the work location and by access control software on the workstation.

Appears in 1 contract

Sources: Interconnection Agreement