System Access. If either Party is at any time given access (each in such capacity, a “Guest User”) to the other's computer system(s) or software (collectively, “Systems”) in connection with the performance of this Agreement, such Guest User shall comply with the other Party's (each in such capacity, a “Host”) Systems security policies, procedures and requirements which the Host makes available to the Guest User in writing upon request.
Appears in 3 contracts
Samples: Transition Services Agreement (UCP, Inc.), Transition Services Agreement (UCP, Inc.), Transition Services Agreement (UCP, Inc.)
System Access. (a) If either the Providing Party is or the Receiving Party are at any time given access (each in such capacity, a “Guest User”) to the other's ’s computer system(s) or software (collectively, “Systems”) in connection with the performance of this Agreement, such Guest User shall comply with the other Party's party’s (each in such capacity, a “Host”) Systems security policies, procedures and requirements which the Host makes available to the Guest User in writing upon requestfrom time to time.
Appears in 1 contract