Security and Access Sample Clauses

POPULAR SAMPLE Copied 6 times
Security and Access. Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of Executive’s employment by the Company, whether termination is voluntary or involuntary. Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.
Security and Access. 15.1 The Mandatary and his employees shall enter and leave the premises only through the main gate(s) and/or checkpoint(s) designated by the Employer. The Mandatary shall ensure that employees observe the security rules of the Employer at all times and shall not permit any person who is not directly associated with the work from entering the premises. 15.2 The Mandatary and his employees shall not enter any area of the premises that is not directly associated with their work. 15.3 The Mandatary shall ensure that all materials, machinery or equipment brought by him onto the premises are recorded at the main gate(s) and/or checkpoint(s). Failure to do this may result in a refusal by the Employer to allow the materials, machinery or equipment to be removed from the Employer’s premises.
Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time ("Facilities and Information Technology Resources"); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event the Executive learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.
Security and Access. The Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company Group intranet, internet, social media and instant messaging systems, computer systems, e-mail systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company Group facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive's employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he/she learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company Group property or materials by others.
Security and Access. The Mandatary shall request and familiarise its employees with the Client security rules which is not included in this agreement.
Security and Access. The Executive agrees and covenants to comply with all Company security policies and procedures as in force from time to time.
Security and Access. The Executive acknowledges that he has no reasonable expectation of privacy in any computer, technology system, email, handheld device, telephone, or documents that are used to conduct the business of the Company whether such device is personally owned or provided by the Company. As such, the Company has the right to audit and search all such items and systems, without further notice to Executive, to ensure that the Company is licensed to use the software on the Company’s devices in compliance with the Company’s software licensing policies, to ensure compliance with the Company’s policies, and for any other business-related purposes in the Company’s sole discretion. Executive agrees and covenants (a) to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone systems, voicemail systems, facilities access, monitoring, key cards, access codes, Company intranet, internet, social media and instant messaging systems, computer systems, email systems, computer networks, document storage systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”); (b) not to access or use any Facilities and Information Technology Resources except as authorized by the Company; and (iii) not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether termination is voluntary or involuntary. The Executive agrees to notify the Company promptly in the event he learns of any violation of the foregoing by others, or of any other misappropriation or unauthorized access, use, reproduction, or reverse engineering of, or tampering with any Facilities and Information Technology Resources or other Company property or materials by others.
Security and Access. 14.1. Employees and agents of Cincinnati Bell and its subsidiaries, while on the premises of Customer, will comply with all reasonable rules, regulations and security requirements of Customer.
Security and Access. The Executive agrees and covenants to comply with all Company security policies and procedures as in force from time to time including without limitation those regarding computer equipment, telephone and voicemail systems, facilities access, key cards, access codes, intranet and internet, social media, computer systems and networks, e-mail systems, software, data security, encryption, firewalls, passwords and any and all other Company facilities, IT resources and communication technologies (“Facilities and Information Technology Resources”), and not to access or use any Facilities and Information Technology Resources except as authorized by the Company. The Executive also agrees not to access or use any Facilities and Information Technology Resources in any manner after the termination of the Executive’s employment by the Company, whether such termination is voluntary or involuntary, without the Company’s consent.
Security and Access. Counterparty may access the Trading Services only through use of one or more passwords, security devices or other access methods as prescribed by BitGo Prime (collectively, “Access Methods”). Counterparty is solely responsible for ensuring that Counterparty’s Access Methods are known to and used by only those users that Counterparty authorizes (“Authorized Users”). Counterparty agrees to comply with any procedures established by BitGo Prime for the pre-approval and authorization of Authorized Users. Counterparty acknowledges that BitGo Prime, in its sole discretion, may deny access to the Trading Services to any user of Counterparty’s Access Methods. Counterparty will be (i) solely responsible for all acts or omissions of any person using the Trading Services through Counterparty’s Access Methods, (ii) solely responsible for any losses, damages or costs that Counterparty may incur as a result of errors made by, or the failure of, the software or equipment that Counterparty or any Authorized Users use to access the Trading Services, and (iii) without limitation of the foregoing or any other provision of this Agreement, bound by the terms of any and all Transactions executed and/or Trade Requests accepted through the Trading System using Counterparty’s Access Methods, in each case unless due to BitGo Prime’s willful misconduct. All transmissions generated by use of Counterparty’s Access Methods will be deemed to be authorized by Counterparty and made by an Authorized User whether or not BitGo Prime acknowledges receipt of such transmission and BitGo Prime shall be entitled to act in reliance on such deemed authorization, unless due to BitGo Prime’s willful misconduct. If any of Counterparty’s Access Methods have been modified, lost, stolen or compromised, Counterparty will promptly notify BitGo Prime. Upon receipt of this notice, such Access Methods will be cancelled or suspended as soon as is reasonably practicable, but Counterparty is responsible for any actions taken through the use of such Access Methods prior to such cancellation. Counterparty will immediately report any apparent malfunction or breach of security of which Counterparty becomes aware or experiences with the Trading Services. In the event of a dispute, BitGo Prime’s communications and transactions log of all Static Quotes, Streaming Quotes and CSF Quotes (each, a “BitGo Prime Quote”), Transactions and communications regarding Transactions by Counterparty or its Authorized Users or their Ac...