Common use of System Security Clause in Contracts

System Security. (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

Appears in 14 contracts

Samples: Transition Services Agreement (Babcock & Wilcox Co), Transition Services Agreement (Babcock & Wilcox Enterprises, Inc.), Transition Services Agreement (Babcock & Wilcox Co)

AutoNDA by SimpleDocs

System Security. (a) If any party hereto Party is given access to the other partyanother Party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 5 contracts

Samples: Employee Services Agreement (MPLX Lp), Management Services Agreement (MPLX Lp), Employee Services Agreement (MPLX Lp)

System Security. (a) If any party hereto Party or any of its Group members is given access to the other partyParty’s (or such other Party’s Group Members) computer systems or software (collectively, the “Systems”) in connection with the provision of any Services, the party Party and/or its Group Members given access (the “Availed Accessing Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Accessing Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty (or such other Party’s Group Members). The Availed Accessing Party shall access and use only those Systems of the other party for Party (or such other Party’s Group Members) or only the component, module, area or portion of any such system, where applicable, to which it has been granted the right to of access and use.

Appears in 3 contracts

Samples: Transition Services Agreement (Aaron's Company, Inc.), Transition Services Agreement (Aaron's SpinCo, Inc.), Transition Services Agreement (Aaron's SpinCo, Inc.)

System Security. (a) If any party hereto Party is given access to the other partyParty’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system System security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 3 contracts

Samples: Employee Services Agreement (MPLX Lp), Employee Services Agreement (MPLX Lp), Employee Services Agreement (MPLX Lp)

System Security. (a) If any party hereto Party or any of its Group members is given access to the other partyParty’s (or such other Party’s Group member’s) computer systems or software (collectively, the “Systems”) in connection with the Services, the party Party and/or Group members given access (the “Availed Accessing Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Accessing Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Accessing Party shall access and use only those Systems of the other party for Party to which it has been granted the right to of access and use.

Appears in 2 contracts

Samples: Transition Services Agreement (Energizer SpinCo, Inc.), Transition Services Agreement (Energizer Holdings Inc)

System Security. (a) If any party hereto Party is given access to the other partyParty’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party Party given access (the “Availed Accessing Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Accessing Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Accessing Party shall access and use only those Systems of the other party for Party to which it has been granted the right to of access and use.

Appears in 2 contracts

Samples: Transition Services Agreement (Phillips 66), Transition Services Agreement (Phillips 66)

System Security. (a) If any party hereto Party is given access to the other partyParty’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, the “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 2 contracts

Samples: Agreement and Plan of Merger (Oasis Midstream Partners LP), Agreement and Plan of Merger (Oasis Midstream Partners LP)

System Security. (a) If any party hereto either Party is given access to the other partyParty’s computer systems or software (collectively, the “Systems”) in connection with the Transition Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall will not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 2 contracts

Samples: Asset Sale and Purchase Agreement (Holly Energy Partners Lp), Asset Sale and Purchase Agreement (Holly Corp)

System Security. (a) If any party hereto Party is given access to the other partyanother Party’s computer systems or software (collectively, the “Systems”) in connection with the Management Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, the “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 2 contracts

Samples: Management Services Agreement (MPLX Lp), Management Services Agreement (MPLX Lp)

System Security. (a) If any party hereto Party is given access to the other partyParty’s computer systems or software (collectively, the “Systems”) in connection with the Transition Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 2 contracts

Samples: Transition Services Agreement (Marathon Petroleum Corp), Transition Services Agreement (Marathon Petroleum Corp)

System Security. (a) If any party hereto Party is given access to the other partyParty’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 2 contracts

Samples: Transition Services Agreement (Post Holdings, Inc.), Transition Services Agreement (Post Holdings, Inc.)

AutoNDA by SimpleDocs

System Security. (a) If any party hereto Party is given access to the other partyParty’s computer systems or software (collectively, the “Systems”) in connection with the Management Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, the “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 1 contract

Samples: Management Services Agreement (MPLX Lp)

System Security. (a) If any party hereto Party is given access to the other party’s another Party's computer systems or software (collectively, the “"Systems") in connection with the Services, the party Party given access (the "Availed Party") shall comply with all of the other party’s Party 's system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, the "Security Regulations"), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 1 contract

Samples: Employee Services Agreement (MPLX Lp)

System Security. (ac) If any party hereto Party is given access to the other partyParty’s computer systems systems, networks or software (collectively, the “Systems”) in connection with the Transition Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security and other company policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 1 contract

Samples: Transition Services Agreement (Occidental Petroleum Corp /De/)

System Security. (a) If any party hereto Party is given access to the other partyParty’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party Party given access (the “Availed Accessing Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Accessing Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Accessing Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 1 contract

Samples: Transition Services Agreement (EP Energy Corp)

System Security. (a) If any party hereto Party is given access to the other partyanother Party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, the “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 1 contract

Samples: Employee Services Agreement (MPLX Lp)

System Security. (a) If any party hereto Party is given access to the other partyParty’s computer systems systems, networks or software (collectively, the “Systems”) in connection with the Transition Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security and other company policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 1 contract

Samples: Transition Services Agreement (California Resources Corp)

System Security. (a) If any party hereto Party is given access to the other partyParty’s computer systems systems, networks or software (collectively, the “Systems”) in connection with the Transition Services, the party Party given access (the “Availed Party”) shall comply with all of the other partyParty’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other partyParty. The Availed Party shall access and use only those Systems of the other party Party for which it has been granted the right to access and use.

Appears in 1 contract

Samples: Transition Services Agreement (California Resources Corp)

Time is Money Join Law Insider Premium to draft better contracts faster.