System Resources and Security Sample Clauses

System Resources and Security. (a) Except as otherwise expressly provided in the Transaction Agreement, in any Ancillary Agreement, or any Long-Term Ancillary Agreement, or unless required in connection with the performance of or delivery of a Service, each Party shall have the discretion to determine whether to provide to the other Party access and connectivity to the Intranet of such first Party and other owned or licensed Software, networks, hardware or technology of such first Party and its Affiliates or computer-based resources which require a password or are available on a secured access basis. Each Party shall ensure that such access shall be used by such personnel only for the purposes contemplated by, and subject to the terms of, this Agreement, or as otherwise determined by the Parties, and shall access and use only those Systems for which such Party has been granted the right to access and use. In the event that any Service is terminated, the applicable Party’s access to the System required solely in connection with the performance of or delivery of such terminated Service shall also be terminated.
AutoNDA by SimpleDocs
System Resources and Security. (a) As of the Effective Date, unless required in connection with the performance of, delivery of, or receipt of a Service (and without limiting or expanding any rights expressly granted to a Party under any separate written agreement between the Parties or their respective Affiliates (including the JV Supply Agreement), to the extent such rights survive beyond the Effective Date in accordance with the terms and conditions of such agreements), each Recipient shall (i) cease to use and shall have no further access to, and Provider shall have no obligation to otherwise provide, Provider’s Intranet and other owned or licensed information technology related resources, including Software, networks, hardware, technology or computer based resources (collectively, the “Systems”) and (ii) have no access to, and Provider shall have no obligation to otherwise provide, computer-based resources (including e-mail and access to Providers’ computer networks and databases) which require a password or are available on a secured access basis. From and after the Effective Date, Recipient shall cause all of its Representatives having access to Providers’ Systems in connection with performance, receipt or delivery of a Service to (A) comply with all security guidelines (including physical security, network access, internet security, confidentiality and personal data security guidelines, policies, standards and similar requirements) of Provider (of which Provider provides Recipient prior written notice) and (B) not tamper with, compromise or circumvent any security or audit measures employed by Provider (of which Provider provides Recipient prior written notice); provided, however, that, in the case of each of clauses “(A)” and “(B),” no such prior notice shall be required to the extent the security guidelines or security or audit measures are materially the same as those applicable immediately prior to the Effective Date of which Provider has previously provided written notice to Recipient. Recipient shall ensure that such access shall be used by such Representatives only for the purposes contemplated by, and subject to the terms of, this Agreement, and such Representatives shall access and use only those Systems for which Recipient has been granted the right to access and use.

Related to System Resources and Security

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Safety and Security Contractor is responsible for maintaining safety in the performance of this Contract. Contractor shall be responsible for complying with the District’s rules and regulations pertaining to safety, security, and driving on school grounds, particularly when children are present.

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Health, Safety and Security 22.2.1 The University and the Association agree to promote safe, secure and healthy working conditions and procedures, and to encourage Members to adopt and follow sound health, safety and security procedures in the performance of their work.

  • Data Protection and Security A. In this Agreement the following terms shall have the meanings respectively ascribed to them:

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • Background Screening and Security 14 These General Contract Conditions supersede and replace in their entirety all General Contract Conditions, Form PUR 1000, which is incorporated by reference in Rule 60A-1.002, Florida Administrative Code (F.A.C.)

Time is Money Join Law Insider Premium to draft better contracts faster.