Computer-Based Resources Sample Clauses

Computer-Based Resources. (i) Prior to the Trigger Date, Company shall continue to have reasonable access to the Information Systems of Genworth (whether directly or remotely, and including reasonable physical or logical entry or access) consistent and in accordance with the Data Protection and Cyber Security Policy. On and after the Trigger Date, Company shall not have access to all or any part of the Information Systems of Genworth, except to the extent, and consistent and in accordance with the Data Protection and Cyber Security Policy, necessary for Company to perform Company Services or receive and enjoy the full benefit of, the Genworth Services (subject to Company complying with Genworth’s security policies, procedures and requirements (including physical security, network access, and confidentiality and personal data security guidelines); provided, that Company has had a commercially reasonable period of time in which to comply with such security measures).
AutoNDA by SimpleDocs
Computer-Based Resources. (a) Prior to the Trigger Date, Mortgage Entities shall continue to have access to the Information Systems of GEMH and its Subsidiaries. On and after the Trigger Date, Mortgage Entities shall not have any right to access all or any part of the Information Systems of GEMH or any of its Subsidiaries, except to the extent necessary for any Mortgage Entity to receive the GEMH Services or implement the Operating Plan (in addition and not in limitation of Section 2.05, subject to Mortgage Services complying with all reasonable security measures implemented by GEMH as deemed necessary by GEMH to protect its Information Systems and the Information Systems of its Subsidiaries, provided, that Mortgage Entities have had a commercially reasonable period of time to comply with such security measures).
Computer-Based Resources. (a) Management Services and Outdoor agree that (i) prior to the Trigger Date, the Outdoor Group will continue to have access to the Information Systems of the CCU Group, and (ii) on and after the Trigger Date, the Outdoor Group will not have access to all or any part of the Information Systems of the CCU Group, except to the extent necessary for the Outdoor Group to receive the Services (subject to the Outdoor Group complying with all reasonable security measures implemented by the CCU Group as deemed necessary by the CCU Group to protect its Information Systems; provided, that, the Outdoor Group has had a commercially reasonable period of time in which to comply with such security measures).
Computer-Based Resources. Each party (the “Accessing Party”) shall continue to have access to the Information Systems of the other party (the “Providing Party”), to the extent such access to such Information Systems was available to the Accessing Party immediately prior to the Closing and remains necessary for the Accessing Party to operate its business; provided, that (a) the LBHI Entities may take reasonable measures to restrict access by the LAMCO Entities to any systems or data unrelated to the Asset Management Business, (b) the LAMCO Entities may take reasonable measures to restrict access by the LBHI Entities, to any systems or data unrelated to the LBHI Business, and (c) such continued access shall be subject to the Accessing Party complying with all reasonable security measures implemented by the Providing Party as deemed necessary by such Providing Party to protect its Information Systems.
Computer-Based Resources. Helix and Cal Dive agree that (i) prior to the Trigger Date, the Recipient Group will continue to have access to the Information Systems of the Provider Group, and (ii) on and after the Trigger Date, the Recipient Group will not have access to all or any part of the Information Systems of the Provider Group, except to the extent necessary for the Recipient Group to receive the Services (subject to the Recipient Group complying with all reasonable security measures implemented by the Provider Group as deemed necessary by the Provider Group to protect its Information Systems; provided, that, the Recipient Group has had a commercially reasonable period of time in which to comply with such security measures).
Computer-Based Resources. (a) Management Services and CCOH agree that the Outdoor Group will not have access to all or any part of the Information Systems of the iHeart Group pursuant to this Agreement, except to the extent necessary for the Outdoor Group to receive the Services (subject to the Outdoor Group complying with all reasonable security measures implemented by the iHeart Group as deemed necessary by the iHeart Group to protect its Information Systems).
Computer-Based Resources. (a) Management Services and Entertainment agree that after the Distribution Date, the Entertainment Group will not have access to all or any part of the Information Systems of the CCU Group, except to the extent necessary for the Entertainment Group to receive the Services (subject to the Entertainment Group complying with all reasonable security measures implemented by the CCU Group as deemed necessary by the CCU Group to protect its Information Systems; provided, that, the Entertainment Group has had a commercially reasonable period of time in which to comply with such security measures).
AutoNDA by SimpleDocs
Computer-Based Resources. Commencing on the Closing Date, and for ninety (90) days thereafter, each party (the “Accessing Party”) shall continue to have access to the Information Systems of the other party (the “Providing Party”), to the extent such access to such Information Systems was available to the Accessing Party immediately prior to the Closing and remains necessary for the Accessing Party to operate its business; provided, that (a) the BarCap Entities may take reasonable measures to restrict access by the LBHI Entities to any systems or data unrelated to the Retained LBHI Business to which the LBHI Entities are not entitled to access, (b) the LBHI Entities may take reasonable measures to restrict access by the BarCap Entities, to any systems or data unrelated to the Business to which the BarCap Entities are not entitled to access, and (c) such continued access shall be subject to the Accessing Party complying with all reasonable security measures implemented by the Providing Party as deemed necessary by such Providing Party to protect its Information Systems. Commencing no later than ten Business Days after the Closing Date, representatives of BarCap and LBHI with authority in the area of Information Systems (the “IT Committee”) shall meet at such reasonable time, place and manner as they may agree, to develop a plan for migrating from the Information System infrastructure as deployed as of the Closing Date, to a final Information Systems infrastructure satisfactory to both BarCap and LBHI (the “IT Migration Plan”). The parties shall use reasonable efforts to enter into an IT Migration Plan no later than one month after the Closing Date and shall include, among other provisions, a time line for completing the migration of Information Services and a final migration deadline after which neither BarCap nor any LBHI Entity shall have access to all or any part of the Information Systems of the other party, except to the extent reasonably necessary for the receipt of the Services (subject to the accessing party complying with all reasonable security measures implemented by the providing party as deemed necessary by such providing party to protect its Information Systems), or as otherwise agreed in a separate agreement. When finalized in writing and executed by the authorized representatives of BarCap and the LBHI Entities, the IT Migration Plan shall be deemed to be incorporated into this Agreement as an amendment and addition hereto.
Computer-Based Resources. Commencing on the Commencement Date, and for twenty four (24) months thereafter, each party (the “Accessing Party”) shall continue to have access to the Information Systems owned or controlled by the other party (the “Providing Party”), to the extent such access to such Information Systems was available to the Accessing Party immediately prior to the 15 September 2008 and remains necessary for the Accessing Party to operate its operations, assets or properties; provided, that (a) Xxxxxx Europe may take reasonable measures to restrict access by the LBHI Entities to any systems or data unrelated to the needs of LBHI Entities (b) the LBHI Entities may take reasonable measures to restrict access by Xxxxxx Europe, to any systems or data unrelated to the needs of Xxxxxx Europe, (c) such continued access shall be subject to the Accessing Party complying with all reasonable security measures implemented by the Providing Party as deemed necessary by such Providing Party to protect its Information Systems and (d) the Providing Party shall not be obliged to continue access if the Providing Party is unable to do so due to regulatory or legal restrictions or it is no longer technically possible to do so in which event the Providing Party shall notify the Accessing Party and the parties shall enter into good faith discussions in order to determine whether suitable alternative arrangements can be put in place and if so, the nature of such arrangements (the costs of which shall be included within the Services Charges).
Computer-Based Resources. (a) Alon LP and Brands agree that (i) prior to the Trigger Date, the Brands Group will continue to have access to the Information Systems of the Alon USA Group, and (ii) on and after the Trigger Date, the Brands Group will not have access to all or any part of the Information Systems of the Alon USA Group, except to the extent necessary for the Brands Group to receive the Services (subject to the Brands Group complying with all reasonable security measures implemented by the Alon USA Group as deemed necessary by the Alon USA Group to protect its Information Systems; provided, that, the Brands Group has had a commercially reasonable period of time in which to comply with such security measures).
Time is Money Join Law Insider Premium to draft better contracts faster.